Skip to content

Commit aa97367

Browse files
authored
Merge branch 'MicrosoftDocs:main' into CIAM-rename
2 parents 6f3d403 + 29a28c2 commit aa97367

File tree

8 files changed

+40
-27
lines changed

8 files changed

+40
-27
lines changed

articles/active-directory/governance/index.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,10 @@ landingContent:
3030
url: https://www.youtube.com/watch?v=bFfowdpApu4&list=PLQXpv_NQsPIBg3op2xONM9KgwlayFDue6
3131
- linkListType: reference
3232
links:
33+
- text: Microsoft Entra ID Governance licensing fundamentals
34+
url: licensing-fundamentals.md
3335
- text: Identity Governance dashboard (Preview)
34-
url: governance-dashboard.md
36+
url: governance-dashboard.md
3537

3638
# Card
3739
- title: Govern the lifecycle of access to groups, apps, and sites

articles/defender-for-cloud/adaptive-application-controls.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This document helps you use adaptive application control in Microso
44
author: dcurwin
55
ms.author: dacurwin
66
ms.topic: how-to
7-
ms.date: 06/14/2023
7+
ms.date: 08/09/2023
88

99
---
1010
# Use adaptive application controls to reduce your machines' attack surfaces
@@ -114,14 +114,16 @@ To edit the rules for a group of machines:
114114

115115
![Add a custom rule.](./media/adaptive-application/adaptive-application-add-custom-rule.png)
116116

117-
1. If you're defining a known safe path, change the **Rule type** to 'Path' and enter a single path. You can include wildcards in the path.
118-
117+
1. If you're defining a known safe path, change the **Rule type** to 'Path' and enter a single path. You can include wildcards in the path. The following screens show some examples of how to use wildcards.
118+
119+
:::image type="content" source="media/adaptive-application/wildcard-examples.png" alt-text="Screenshot that shows examples of using wildcards." lightbox="media/adaptive-application/wildcard-examples.png":::
120+
119121
> [!TIP]
120122
> Some scenarios for which wildcards in a path might be useful:
121123
>
122124
> - Using a wildcard at the end of a path to allow all executables within this folder and sub-folders.
123125
> - Using a wildcard in the middle of a path to enable a known executable name with a changing folder name (for example, personal user folders containing a known executable, automatically generated folder names, etc).
124-
126+
125127
1. Define the allowed users and protected file types.
126128

127129
1. When you've finished defining the rule, select **Add**.
89.2 KB
Loading

articles/defender-for-cloud/secret-scanning.md

Lines changed: 21 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,24 @@
11
---
2-
title: Manage secrets with agentless secret scanning
2+
title: Manage secrets with agentless secret scanning (preview)
33
description: Learn how to scan your servers for secrets with Defender for Server's agentless secret scanning.
44
ms.topic: overview
5-
ms.date: 07/18/2023
5+
ms.date: 08/15/2023
66
---
77

8-
# Manage secrets with agentless secret scanning
8+
# Manage secrets with agentless secret scanning (preview)
99

1010
Attackers can move laterally across networks, find sensitive data, and exploit vulnerabilities to damage critical information systems by accessing internet-facing workloads and exploiting exposed credentials and secrets.
1111

1212
Defender for Cloud's agentless secret scanning for Virtual Machines (VM) locates plaintext secrets that exist in your environment. If secrets are detected, Defender for Cloud can assist your security team to prioritize and take actionable remediation steps to minimize the risk of lateral movement, all without affecting your machine's performance.
1313

1414
By using agentless secret scanning, you can proactively discover the following types of secrets across your environments:
1515

16-
- **Insecure SSH private keys** - supports RSA algorithm for PuTTy files, PKCS#8 and PKCS#1 standards
17-
- **Plaintext Azure SQL connection strings** - supports SQL PAAS
18-
- **Plaintext Azure storage account connection strings**
19-
- **Plaintext Azure storage account SAS tokens**
20-
- **Plaintext AWS access keys**
21-
- **Plaintext AWS RDS SQL connection string** -supports SQL PAAS
16+
- **Insecure SSH private keys (Azure, AWS, GCP)** - supports RSA algorithm for PuTTy files, PKCS#8 and PKCS#1 standards
17+
- **Plaintext Azure SQL connection strings (Azure, AWS)** - supports SQL PAAS
18+
- **Plaintext Azure storage account connection strings (Azure, AWS)**
19+
- **Plaintext Azure storage account SAS tokens (Azure, AWS)**
20+
- **Plaintext AWS access keys (Azure, AWS)**
21+
- **Plaintext AWS RDS SQL connection string (Azure, AWS)** -supports SQL PAAS
2222

2323
In addition to detecting SSH private keys, the agentless scanner verifies whether they can be used to move laterally in the network. Keys that we didn't successfully verify are categorized as **unverified** in the **Recommendation** pane.
2424

@@ -68,6 +68,12 @@ Agentless secret scanning for AWS instances supports the following attack path s
6868

6969
- `Vulnerable EC2 instance has insecure secrets that are used to authenticate to an AWS RDS server`.
7070

71+
### GCP instances supported attack path scenarios
72+
73+
Agentless secret scanning for GCP VM instances supports the following attack path scenarios:
74+
75+
- `Exposed Vulnerable GCP VM instance has an insecure SSH private key that is used to authenticate to a GCP VM instance`.
76+
7177
**To investigate secrets with Attack path**:
7278

7379
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -88,6 +94,8 @@ If a secret is found on your resource, that resource triggers an affiliated reco
8894

8995
- **AWS resources**: `EC2 instances should have secret findings resolved`
9096

97+
- **GCP resources**: `VM instances should have secret findings resolved`
98+
9199
**To remediate secrets from the recommendations page**:
92100

93101
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -101,6 +109,7 @@ If a secret is found on your resource, that resource triggers an affiliated reco
101109
- **Azure resources**: `Machines should have secrets findings resolved`
102110

103111
- **AWS resources**: `EC2 instances should have secret findings resolved`
112+
- **GCP resources**: `VM instances should have secret findings resolved`
104113

105114
:::image type="content" source="media/secret-scanning/recommendation-findings.png" alt-text="Screenshot that shows either of the two results under the Remediate vulnerabilities security control." lightbox="media/secret-scanning/recommendation-findings.png":::
106115

@@ -130,9 +139,9 @@ The [cloud security explorer](concept-attack-path.md#what-is-cloud-security-expl
130139

131140
1. Select one of the following templates:
132141

133-
- **VM with plaintext secret that can authenticate to another VM** - Returns all Azure VMs or AWS EC2 instances with plaintext secret that can access other VMs or EC2s.
134-
- **VM with plaintext secret that can authenticate to a storage account** - Returns all Azure VMs or AWS EC2 instances with plaintext secret that can access storage accounts.
135-
- **VM with plaintext secret that can authenticate to a SQL database** - Returns all Azure VMs or AWS EC2 instances with plaintext secret that can access SQL databases.
142+
- **VM with plaintext secret that can authenticate to another VM** - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access other VMs or EC2s.
143+
- **VM with plaintext secret that can authenticate to a storage account** - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access storage accounts.
144+
- **VM with plaintext secret that can authenticate to a SQL database** - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access SQL databases.
136145

137146
If you don't want to use any of the available templates, you can also [build your own query](how-to-manage-cloud-security-explorer.md) on the cloud security explorer.
138147

articles/network-watcher/diagnose-network-security-rules.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ author: halkazwini
66
ms.author: halkazwini
77
ms.service: network-watcher
88
ms.topic: how-to
9-
ms.date: 07/25/2023
10-
ms.custom: template-how-to, devx-track-azurepowershell, devx-track-azurecli, engagement-fy23
9+
ms.date: 08/15/2023
10+
ms.custom: devx-track-azurepowershell, devx-track-azurecli
1111
---
1212

1313
# Diagnose network security rules
@@ -817,11 +817,11 @@ Use [az group delete](/cli/azure/group#az-group-delete) to remove the resource g
817817

818818
```azurecli-interactive
819819
# Delete the resource group and all the resources it contains.
820-
az group delete --name myResourceGroup --yes --no-wait
820+
az group delete --name 'myResourceGroup' --yes --no-wait
821821
```
822822

823823
---
824824

825825
## Next steps
826826
- To learn about other Network Watcher tools, see [Azure Network Watcher overview](network-watcher-monitoring-overview.md).
827-
- To learn how to troubleshoot virtual machine routing problems, see [Diagnose a virtual machine network routing problem](diagnose-vm-network-routing-problem.md).
827+
- To learn how to troubleshoot virtual machine routing problems, see [Diagnose a virtual machine network routing problem](diagnose-vm-network-routing-problem.md).

articles/reliability/availability-zones-service-support.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ The following regions currently support availability zones:
3030
|---|---|---|---|---|
3131
| Brazil South | France Central | Qatar Central | South Africa North | Australia East |
3232
| Canada Central | Italy North* | UAE North | | Central India |
33-
| Central US | Germany West Central | | | Japan East |
33+
| Central US | Germany West Central | Israel Central* | | Japan East |
3434
| East US | Norway East | | | Korea Central |
3535
| East US 2 | North Europe | | | Southeast Asia |
3636
| South Central US | UK South | | | East Asia |

articles/reliability/includes/reliability-recommendations-include.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
---
1111

1212

13-
This section contains recommendations for achieving resiliency and availability for your Azure Virtual Machines. All recommendations fall into one of two categories:
13+
This section contains recommendations for achieving resiliency and availability. Each recommendation falls into one of two categories:
1414

1515
- **Health items** cover areas such as configuration items and the proper function of the major components that make up your Azure Workload, such as Azure Resource configuration settings, dependencies on other services, and so on.
1616

articles/vpn-gateway/bgp-howto.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.author: cherylmc
1111
---
1212
# How to configure BGP for Azure VPN Gateway
1313

14-
This article helps you enable BGP on cross-premises site-to-site (S2S) VPN connections and VNet-to-VNet connections using the Azure portal. This article helps you enable BGP on cross-premises site-to-site (S2S) VPN connections and VNet-to-VNet connections using Azure PowerShell. You can also create this configuration using the [Azure portal](bgp-howto.md) or [PowerShell](vpn-gateway-bgp-resource-manager-ps.md) steps.
14+
This article helps you enable BGP on cross-premises site-to-site (S2S) VPN connections and VNet-to-VNet connections using the Azure portal. You can also create this configuration using the [Azure CLI](bgp-how-to-cli.md) or [PowerShell](vpn-gateway-bgp-resource-manager-ps.md) steps.
1515

1616
BGP is the standard routing protocol commonly used in the Internet to exchange routing and reachability information between two or more networks. BGP enables the VPN gateways and your on-premises VPN devices, called BGP peers or neighbors, to exchange "routes" that will inform both gateways on the availability and reachability for those prefixes to go through the gateways or routers involved. BGP can also enable transit routing among multiple networks by propagating routes a BGP gateway learns from one BGP peer to all other BGP peers.
1717

@@ -155,15 +155,15 @@ In this step, you create a new connection that has BGP enabled. If you already h
155155
#### To create a connection
156156

157157
1. To create a new connection, go to your virtual network gateway **Connections** page.
158-
1. Click **+Add** to open the **Add a connection page**.
158+
1. Select **+Add** to open the **Add a connection page**.
159159
1. Fill in the necessary values.
160160
1. Select **Enable BGP** to enable BGP on this connection.
161-
1. Click **OK** to save changes.
161+
1. Select **OK** to save changes.
162162

163163
#### To update an existing connection
164164

165165
1. Go to your virtual network gateway **Connections** page.
166-
1. Click the connection you want to modify.
166+
1. Select the connection you want to modify.
167167
1. Go to the **Configuration** page for the connection.
168168
1. Change the **BGP** setting to **Enabled**.
169169
1. **Save** your changes.

0 commit comments

Comments
 (0)