Skip to content

Commit a22da14

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into ultraSizeFix
2 parents 2d04d01 + 0fb4e63 commit a22da14

15 files changed

+615
-335
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-cloud/secret-scanning.md",
5+
"redirect_url": "/azure/defender-for-cloud/secrets-scanning-servers",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/defender-for-cloud/prevent-misconfigurations.md",
510
"redirect_url": "/azure/defender-for-cloud/manage-mcsb",

articles/azure-resource-manager/management/move-support-resources.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -191,7 +191,12 @@ Before starting your move operation, review the [checklist](./move-resource-grou
191191
> [!div class="mx-tableFixed"]
192192
> | Resource type | Resource group | Subscription | Region move |
193193
> | ------------- | ----------- | ---------- | ----------- |
194-
> | SqlServerInstances | No | No | No |
194+
> | datacontrollers | No | No | No |
195+
> | postgresinstances | No | No | No |
196+
> | sqlmanagedinstances | No | No | No |
197+
> | sqlserverinstances | No | No | No |
198+
> | sqlserverlicenses | No | No | No |
199+
195200

196201
## Microsoft.AzureData
197202

articles/cost-management-billing/manage/programmatically-create-subscription-microsoft-customer-agreement.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.custom: devx-track-azurepowershell, devx-track-azurecli, devx-track-arm-templ
1313

1414
# Programmatically create Azure subscriptions for a Microsoft Customer Agreement with the latest APIs
1515

16-
This article helps you programmatically create Azure subscriptions for a Microsoft Customer Agreement using the most recent API versions. If you are still using the older preview version, see [Programmatically create Azure subscriptions with legacy APIs](programmatically-create-subscription-preview.md).
16+
This article helps you programmatically create Azure subscriptions for a Microsoft Customer Agreement using the most recent API versions. If you're still using the older preview version, see [Programmatically create Azure subscriptions with legacy APIs](programmatically-create-subscription-preview.md).
1717

1818
In this article, you learn how to create subscriptions programmatically using Azure Resource Manager.
1919

@@ -77,7 +77,7 @@ Use the `displayName` property to identify the billing account for which you wan
7777
```azurepowershell
7878
Get-AzBillingAccount
7979
```
80-
You will get back a list of all billing accounts that you have access to
80+
You'll get back a list of all billing accounts that you have access to
8181

8282
```json
8383
Name : 5e98e158-xxxx-xxxx-xxxx-xxxxxxxxxxxx:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx_xxxx-xx-xx
@@ -95,7 +95,7 @@ Use the `displayName` property to identify the billing account for which you wan
9595
```azurecli
9696
az billing account list
9797
```
98-
You will get back a list of all billing accounts that you have access to
98+
You'll get back a list of all billing accounts that you have access to.
9999

100100
```json
101101
[
@@ -120,7 +120,7 @@ You will get back a list of all billing accounts that you have access to
120120
]
121121
```
122122

123-
Use the `displayName` property to identify the billing account for which you want to create subscriptions. Ensure, the agreementType of the account is *MicrosoftCustomerAgreement*. Copy the `name` of the account. For example, to create a subscription for the `Contoso` billing account, copy `5e98e158-xxxx-xxxx-xxxx-xxxxxxxxxxxx:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx_xxxx-xx-xx`. Paste the value somewhere so that you can use it in the next step.
123+
Use the `displayName` property to identify the billing account for which you want to create subscriptions. Ensure, the agreementType of the account is *MicrosoftCustomerAgreement*. Copy the `name` of the account. For example, to create a subscription for the `Contoso` billing account, copy `5e98e158-xxxx-xxxx-xxxx-xxxxxxxxxxxx:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx_xxxx-xx-xx`. Paste the value somewhere so that you can use it in the next step.
124124

125125
---
126126

@@ -218,7 +218,7 @@ Use the `id` property to identify the invoice section for which you want to crea
218218
Get-AzBillingProfile -BillingAccountName 5e98e158-xxxx-xxxx-xxxx-xxxxxxxxxxxx:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx_xxxx-xx-xx
219219
```
220220

221-
You will get the list of billing profiles under this account as part of the response.
221+
You'll get the list of billing profiles under this account as part of the response.
222222

223223
```json
224224
Name : AW4F-xxxx-xxx-xxx
@@ -240,28 +240,28 @@ Country : US
240240
PostalCode : 98052
241241
```
242242

243-
Note the `name` of the billing profile from the above response. The next step is to get the invoice section that you have access to underneath this billing profile. You will need the `name` of the billing account and billing profile
243+
Note the `name` of the billing profile from the above response. The next step is to get the invoice section that you have access to underneath this billing profile. You'll need the `name` of the billing account and billing profile.
244244

245245
```azurepowershell
246246
Get-AzInvoiceSection -BillingAccountName 5e98e158-xxxx-xxxx-xxxx-xxxxxxxxxxxx:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx_xxxx-xx-xx -BillingProfileName AW4F-xxxx-xxx-xxx
247247
```
248248

249-
You will get the invoice section returned
249+
You'll get the invoice section returned.
250250

251251
```json
252252
Name : SH3V-xxxx-xxx-xxx
253253
DisplayName : Development
254254
```
255255

256-
The `name` above is the Invoice section name you need to create a subscription under. Construct your billing scope using the format `/providers/Microsoft.Billing/billingAccounts/<BillingAccountName>/billingProfiles/<BillingProfileName>/invoiceSections/<InvoiceSectionName>`. In this example, this value will equate to `"/providers/Microsoft.Billing/billingAccounts/5e98e158-xxxx-xxxx-xxxx-xxxxxxxxxxxx:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx_xxxx-xx-xx/billingProfiles/AW4F-xxxx-xxx-xxx/invoiceSections/SH3V-xxxx-xxx-xxx"`.
256+
The `name` above is the Invoice section name you need to create a subscription under. Construct your billing scope using the format `/providers/Microsoft.Billing/billingAccounts/<BillingAccountName>/billingProfiles/<BillingProfileName>/invoiceSections/<InvoiceSectionName>`. In this example, this value equates to `"/providers/Microsoft.Billing/billingAccounts/5e98e158-xxxx-xxxx-xxxx-xxxxxxxxxxxx:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx_xxxx-xx-xx/billingProfiles/AW4F-xxxx-xxx-xxx/invoiceSections/SH3V-xxxx-xxx-xxx"`.
257257

258258
### [Azure CLI](#tab/azure-cli)
259259

260260
```azurecli
261261
az billing profile list --account-name "5e98e158-xxxx-xxxx-xxxx-xxxxxxxxxxxx:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx_xxxx-xx-xx" --expand "InvoiceSections"
262262
```
263263

264-
This API will return the list of billing profiles and invoice sections under the provided billing account.
264+
This API returns the list of billing profiles and invoice sections under the provided billing account.
265265

266266
```json
267267
[
@@ -336,7 +336,7 @@ The following example creates a subscription named *Dev Team subscription* for t
336336
### [REST](#tab/rest)
337337

338338
```json
339-
PUT https://management.azure.com/providers/Microsoft.Subscription/aliases/sampleAlias?api-version=2021-10-01
339+
PUT https://management.azure.com/providers/Microsoft.Subscription/aliases/{{guid}}?api-version=2021-10-01
340340
```
341341

342342
### Request body

articles/defender-for-cloud/TOC.yml

Lines changed: 21 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -213,6 +213,15 @@
213213
href: critical-assets-protection.md
214214
- name: Agentless machine scanning
215215
href: concept-agentless-data-collection.md
216+
- name: Secrets protection
217+
items:
218+
- name: Overview
219+
href: secrets-scanning.md
220+
- name: Protecting VM secrets
221+
href: secrets-scanning-servers.md
222+
- name: Protecting cloud deployment secrets
223+
href: secrets-scanning-cloud-deployment.md
224+
216225
- name: Integrations
217226
items:
218227
- name: ServiceNow
@@ -320,6 +329,12 @@
320329
- name: Attack path analysis and enhanced risk-hunting for containers
321330
displayName: attack paths, paths, security explorer, test
322331
href: how-to-test-attack-path-and-security-explorer-with-vulnerable-container-image.md
332+
- name: Secrets security posture
333+
items:
334+
- name: Remediate issues with VM secrets
335+
href: remediate-server-secrets.md
336+
- name: Remediate cloud deployment secrets
337+
href: remediate-cloud-deployment-secrets.md
323338
- name: Manage security standards and recommendations
324339
items:
325340
- name: Choose standards for your compliance dashboard
@@ -528,9 +543,13 @@
528543
- name: Agentless machine scanning
529544
displayName: agentless, scanning, virtual, machines, freshness, snapshot, snapshots
530545
href: concept-agentless-data-collection.md
531-
- name: Manage secrets with agentless secret scanning
546+
- name: Protect secrets
532547
displayName: secrets, secret scanning, agentless
533-
href: secret-scanning.md
548+
items:
549+
- name: Overview
550+
href: secrets-scanning-servers.md
551+
- name: Remediate VM secrets
552+
href: remediate-server-secrets.md
534553
- name: Protect servers with agentless malware scanning
535554
displayName: agentless, scanning, virtual, machines, freshness, snapshot, snapshots, Microsoft Defender Antivirus
536555
href: agentless-malware-scanning.md

articles/defender-for-cloud/concept-agentless-data-collection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Agentless scanning for virtual machines (VM) provides:
1919
- Broad, frictionless visibility into your software inventory using Microsoft Defender Vulnerability Management.
2020
- Deep analysis of operating system configuration and other machine meta data.
2121
- [Vulnerability assessment](enable-agentless-scanning-vms.md) using Defender Vulnerability Management.
22-
- [Secret scanning](secret-scanning.md) to locate plain text secrets in your compute environment.
22+
- [Secret scanning](secrets-scanning.md) to locate plain text secrets in your compute environment.
2323
- Threat detection with [agentless malware scanning](agentless-malware-scanning.md), using [Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows).
2424

2525
Agentless scanning assists you in the identification process of actionable posture issues without the need for installed agents, network connectivity, or any effect on machine performance. Agentless scanning is available through both the [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) plan and [Defender for Servers P2](plan-defender-for-servers-select-plan.md#plan-features) plan.
@@ -30,7 +30,7 @@ Agentless scanning assists you in the identification process of actionable postu
3030
|---------|---------|
3131
|Release state:| GA |
3232
|Pricing:|Requires either [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) or [Microsoft Defender for Servers Plan 2](plan-defender-for-servers-select-plan.md#plan-features)|
33-
| Supported use cases:| :::image type="icon" source="./media/icons/yes-icon.png"::: [Vulnerability assessment (powered by Defender Vulnerability Management)](deploy-vulnerability-assessment-defender-vulnerability-management.md)<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Software inventory (powered by Defender Vulnerability Management):::image type="icon" source="./media/icons/yes-icon.png"::: [Secret scanning](secret-scanning.md) <br />:::image type="icon" source="./media/icons/yes-icon.png"::: [Malware scanning (Preview)](agentless-malware-scanning.md) **Only available with Defender for Servers plan 2**|
33+
| Supported use cases:| :::image type="icon" source="./media/icons/yes-icon.png"::: [Vulnerability assessment (powered by Defender Vulnerability Management)](deploy-vulnerability-assessment-defender-vulnerability-management.md)<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Software inventory (powered by Defender Vulnerability Management):::image type="icon" source="./media/icons/yes-icon.png"::: [Secret scanning](secrets-scanning.md) <br />:::image type="icon" source="./media/icons/yes-icon.png"::: [Malware scanning (Preview)](agentless-malware-scanning.md) **Only available with Defender for Servers plan 2**|
3434
| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Azure Commercial clouds<br> :::image type="icon" source="./media/icons/no-icon.png"::: Azure Government<br>:::image type="icon" source="./media/icons/no-icon.png"::: Microsoft Azure operated by 21Vianet<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Connected AWS accounts<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Connected GCP projects |
3535
| Operating systems: | :::image type="icon" source="./media/icons/yes-icon.png"::: Windows<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Linux |
3636
| Instance and disk types: | **Azure**<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Standard VMs<br>:::image type="icon" source="./media/icons/no-icon.png"::: Unmanaged disks<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Virtual machine scale set - Flex<br>:::image type="icon" source="./media/icons/no-icon.png"::: Virtual machine scale set - Uniform<br><br>**AWS**<br>:::image type="icon" source="./media/icons/yes-icon.png"::: EC2<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Auto Scale instances<br>:::image type="icon" source="./media/icons/no-icon.png"::: Instances with a ProductCode (Paid AMIs)<br><br>**GCP**<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Compute instances<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Instance groups (managed and unmanaged) |
247 KB
Loading

0 commit comments

Comments
 (0)