Skip to content

Commit a499dde

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into yelevin/kusto-updates
2 parents b495b3b + 03f9ca3 commit a499dde

File tree

4 files changed

+25
-6
lines changed

4 files changed

+25
-6
lines changed

articles/backup/backup-blobs-storage-account-ps.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -206,8 +206,8 @@ To update the backup instance, run the following cmdlets:
206206
1. Fetch the backup instance that needs to be updated.
207207
208208
```azurepowershell
209-
C:\Users\dapatil> $instance = Search-AzDataProtectionBackupInstanceInAzGraph -Subscription "Demosub" -ResourceGroup Demo-BCDR-RG -Vault BCDR-BV-EastUS -DatasourceType AzureBlob
210-
PS C:\Users\dapatil> $instance
209+
C:\Users\testuser> $instance = Search-AzDataProtectionBackupInstanceInAzGraph -Subscription "Demosub" -ResourceGroup Demo-BCDR-RG -Vault BCDR-BV-EastUS -DatasourceType AzureBlob
210+
PS C:\Users\testuser> $instance
211211
Output
212212
Name BackupInstanceName
213213
---- ------------------
@@ -226,12 +226,12 @@ To update the backup instance, run the following cmdlets:
226226
1. Update the backup instance with new list of container (the existing backed up containers & new containers).
227227
228228
```azurepowershell
229-
PS C:\Users\dapatil> $updateBI = Update-AzDataProtectionBackupInstance -ResourceGroupName Daya-BCDR-RG -VaultName DPBCDR-BV-EastUS -BackupInstanceName $instance[0].Name -SubscriptionId "ef4ab5a7-c2c0-4304-af80-af49f48af3d1" -PolicyId $updatePolicy.id -VaultedBackupContainer $targetContainers.name
229+
PS C:\Users\testuser> $updateBI = Update-AzDataProtectionBackupInstance -ResourceGroupName Daya-BCDR-RG -VaultName DPBCDR-BV-EastUS -BackupInstanceName $instance[0].Name -SubscriptionId "ef4ab5a7-c2c0-4304-af80-af49f48af3d1" -PolicyId $updatePolicy.id -VaultedBackupContainer $targetContainers.name
230230
231231
232-
PS C:\Users\dapatil> $updateBI.Property.PolicyInfo.PolicyId
232+
PS C:\Users\testuser> $updateBI.Property.PolicyInfo.PolicyId
233233
/subscriptions/ef4ab5a7-c2c0-4304-af80-af49f48af3d1/resourceGroups/Daya-BCDR-RG/providers/Microsoft.DataProtection/backupVaults/DPBCDR-BV-EastUS/backupPolicies/continerdeltest-1
234-
PS C:\Users\dapatil> $updateBI.Property.PolicyInfo.PolicyParameter.BackupDatasourceParametersList[0].ContainersList
234+
PS C:\Users\testuser> $updateBI.Property.PolicyInfo.PolicyParameter.BackupDatasourceParametersList[0].ContainersList
235235
cont-01
236236
cont-02
237237
cont-03

articles/defender-for-iot/organizations/release-notes.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,7 @@ Cloud features may be dependent on a specific sensor version. Such features are
4242
| Version / Patch | Release date | Scope | Supported until |
4343
| ------- | ------------ | ----------- | ------------------- |
4444
| **24.1** | | | |
45+
| 24.1.8 |12/2024 | Minor |12/2025 |
4546
| 24.1.7 |12/2024 | Minor |12/2025 |
4647
| 24.1.6 |11/2024 | Minor |12/2025 |
4748
| 24.1.5 |09/2024 | Minor |09/2025 |
@@ -96,6 +97,14 @@ To understand whether a feature is supported in your sensor version, check the r
9697

9798
## Versions 24.1.x
9899

100+
### 24.1.8
101+
102+
**Release date**: 12/2024
103+
104+
**Supported until**: 12/2025
105+
106+
This version includes bug fixes for stability improvements.
107+
99108
### 24.1.7
100109

101110
**Release date**: 12/2024

articles/defender-for-iot/organizations/whats-new.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,16 @@ Features released earlier than nine months ago are described in the [What's new
2222

2323
The legacy on-premises management console won't be available for download after **January 1st, 2025**. We recommend transitioning to the new architecture using the full spectrum of on-premises and cloud APIs before this date. For more information, see [on-premises management console retirement](ot-deploy/on-premises-management-console-retirement.md).
2424

25+
## December 2024
26+
27+
|Service area |Updates |
28+
|---------|---------|
29+
| **OT networks** | - [Support Multiple Source Devices in DDoS Attack Alerts](#support-multiple-source-devices-in-ddos-attack-alerts) |
30+
31+
### Support Multiple Source Devices in DDoS Attack Alerts
32+
33+
Alert details now display up to 10 source devices involved in DDoS attack.
34+
2535
## October 2024
2636

2737
|Service area |Updates |

articles/virtual-network/ip-services/default-outbound-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ If you deploy a virtual machine in Azure and it doesn't have explicit outbound c
5555

5656
Some examples of configurations that won't work when using default outbound access:
5757
- When you have multiple NICs on the same VM, default outbound IPs won't consistently be the same across all NICs.
58-
- When scaling up/down Virtual Machine Scale sets, default outbound IPs assigned to individual instances can and change.
58+
- When scaling up/down Virtual Machine Scale sets, default outbound IPs assigned to individual instances can change.
5959
- Similarly, default outbound IPs aren't consistent or contiguous across VM instances in a Virtual Machine Scale Set.
6060

6161
## How can I transition to an explicit method of public connectivity (and disable default outbound access)?

0 commit comments

Comments
 (0)