Skip to content

Commit ac0069c

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into nw-alert
2 parents a630af9 + f7794d0 commit ac0069c

27 files changed

+3725
-2706
lines changed

articles/backup/backup-azure-exchange-mabs.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Back up Exchange server with Azure Backup Server
33
description: Learn how to back up an Exchange server to Azure Backup using Azure Backup Server
44
ms.topic: how-to
5-
ms.date: 03/28/2024
5+
ms.date: 03/25/2025
66
author: jyothisuri
77
ms.author: jsuri
88
ms.custom: engagement-fy24
@@ -11,7 +11,7 @@ ms.custom: engagement-fy24
1111

1212
This article describes how to configure Microsoft Azure Backup Server (MABS) to back up a Microsoft Exchange server to Azure.
1313

14-
## Prerequisites for backup of an Exchange server
14+
## Prerequisites
1515

1616
Before you continue, ensure that Azure Backup Server is [installed and prepared](backup-azure-microsoft-azure-backup.md).
1717

@@ -108,3 +108,4 @@ For online recovery points, there are five recovery types:
108108
## Next steps
109109

110110
* [Azure Backup FAQ](backup-azure-backup-faq.yml)
111+
* [Recover data from Azure Backup Server](backup-azure-alternate-dpm-server.md)

articles/backup/backup-azure-integrate-microsoft-defender-using-logic-apps.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,28 @@
11
---
2-
title: Integrate Microsoft Defender's ransomware alerts to preserve Azure Backup recovery points
2+
title: Integrate Microsoft Defender's ransomware alerts to protect Azure Backup recovery points
33
description: Learn how to integrate Microsoft Defender for Cloud and Azure Backup using logic app.
44
ms.topic: how-to
55
ms.custom: references_regions
6-
ms.date: 03/13/2024
6+
ms.date: 03/25/2025
77
ms.service: azure-backup
88
author: jyothisuri
99
ms.author: jsuri
1010
---
1111

12-
# Solution sample to integrate Microsoft Defender's ransomware alerts to preserve Azure Backup recovery points
12+
# Integrate Microsoft Defender's ransomware alerts to protect Azure Backup recovery points
1313

14-
This article describes the sample solution that demonstrates how to integrate Microsoft Defender's ransomware alerts to preserve Azure Backup recovery points. Assume there has been a breach on the Virtual Machine that is protected by both Defender and Azure Backup. Defender detects the ransomware, raises an alert which includes details of the activity and suggested recommendations to remediate. As soon as a ransomware signal is detected from Defender, ensuring backups are preserved (i.e., paused from expiring) to minimize the data loss is top of our customers’ mind.
14+
This article describes how to integrate Microsoft Defender's ransomware alerts to preserve Azure Backup recovery points. Assume there has been a breach on the Virtual Machine that is protected by both Defender and Azure Backup. Defender detects the ransomware, raises an alert which includes details of the activity and suggested recommendations to remediate. As soon as a ransomware signal is detected from Defender, ensuring backups are preserved (i.e., paused from expiring) to minimize the data loss is top of our customers’ mind.
1515

1616
Azure Backup provides several security capabilities to help you protect your backup data. [Soft delete](backup-azure-security-feature-cloud.md), [Immutable vaults](backup-azure-immutable-vault-concept.md), [Multi-User Authorization (MUA)](multi-user-authorization-concept.md) are part of a comprehensive data protection strategy for backup data. Soft delete is enabled by default, with option to make it always-on (irreversible). Soft deleted backup data is retained at no additional cost for *14* days, with option to [extend the duration](backup-azure-enhanced-soft-delete-about.md). Enabling immutability on vaults can protect backup data by blocking any operations that could lead to loss of recovery points. You can configure Multi-user authorization (MUA) for Azure Backup as an additional layer of protection to critical operations on your Recovery Services vaults. By default, critical alert for destructive operation (such as stop protection with delete backup data) is raised and an email is sent to subscription owners, admins, and co-admins.
1717

1818
Microsoft Defender for Cloud (MDC) is a Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP) for all of your Azure, on-premises, and multicloud (Amazon AWS and Google GCP) resources. Defender for Cloud generates security alerts when threats are identified in your cloud, hybrid, or on-premises environment. It's available when you enable enhanced security features. Each alert provides details of affected resources along with the information you need to quickly investigate the issue and steps to take to remediate an attack. If a malware or a ransomware attacks on an Azure Virtual Machine, Microsoft Defender for Cloud detects suspicious activity and indicators associated with ransomware on an Azure VM and generates a Security Alert. Examples of the Defender for Cloud Alerts that trigger on a Ransomware detection: *Ransomware indicators detected*, *Behavior similar to ransomware detected*, and so on.
1919

2020
>[!Note]
21-
> This sample solution is scoped to Azure Virtual Machines. You can deployed the logic app only at a subscription level, which means all Azure VMs under the subscription can use the logic app to pause expiry of recovery points in the event of a security alert.
21+
> This solution is scoped to Azure Virtual Machines. You can deployed the logic app only at a subscription level, which means all Azure VMs under the subscription can use the logic app to pause expiry of recovery points in the event of a security alert.
2222
23-
## Solution details
23+
## Solution workflow
2424

25-
This sample solution demonstrates integration of Azure Backup with Microsoft Defender for Cloud (MDC) for detection and response to alerts to accelerate response. Sample illustrates the following three use cases:
25+
This solution demonstrates integration of Azure Backup with Microsoft Defender for Cloud (MDC) for detection and response to alerts to accelerate response. The disgram illustrates the following three use cases:
2626

2727
- Ability to send email alerts to the Backup Admin.
2828
- Security Admin to triage and manually trigger logic app to secure backups.

articles/backup/backup-azure-sql-mabs.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Back up SQL Server by using Azure Backup Server
33
description: In this article, learn the configuration to back up SQL Server databases by using Microsoft Azure Backup Server (MABS).
44
ms.topic: how-to
5-
ms.date: 03/17/2024
5+
ms.date: 03/25/2025
66
author: jyothisuri
77
ms.author: jsuri
88
ms.service: azure-backup
@@ -38,7 +38,10 @@ To back up a SQL Server database and recover it from Azure:
3838

3939
## Prerequisites and limitations
4040

41+
Before you begin, review the following prerequisites and limitations:
42+
4143
* If you have a database with files on a remote file share, protection will fail with Error ID 104. MABS doesn't support protection for SQL Server data on a remote file share.
44+
* Ensure that you've [installed and prepared Azure Backup Server](backup-azure-microsoft-azure-backup.md).
4245
* MABS can't protect databases that are stored on remote SMB shares.
4346
* Ensure that the [availability group replicas are configured as read-only](/sql/database-engine/availability-groups/windows/configure-read-only-access-on-an-availability-replica-sql-server).
4447
* You must explicitly add the system account **NTAuthority\System** to the Sysadmin group on SQL Server.
@@ -64,10 +67,6 @@ To back up a SQL Server database and recover it from Azure:
6467
* SQL server 2014 added a new feature to create a [database for on-premises SQL Server in Windows Azure Blob storage](/sql/relational-databases/databases/sql-server-data-files-in-microsoft-azure). MABS can't be used to protect this configuration.
6568
* There are some known issues with "Prefer secondary" backup preference for the SQL Always On option. MABS always takes a backup from secondary. If no secondary can be found, then the backup fails.
6669

67-
## Before you start
68-
69-
Before you begin, ensure that you've [installed and prepared Azure Backup Server](backup-azure-microsoft-azure-backup.md).
70-
7170
## Create a backup policy
7271

7372
To protect SQL Server databases in Azure, first create a backup policy:

articles/backup/manage-azure-managed-disks.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Manage Azure Managed Disks
33
description: Learn about managing Azure Managed Disk from the Azure portal.
44
ms.topic: how-to
5-
ms.date: 03/21/2024
5+
ms.date: 01/16/2025
66
author: jyothisuri
77
ms.author: jsuri
88
ms.service: azure-backup
@@ -168,4 +168,4 @@ To delete a disk backup instance, follow these steps:
168168

169169
## Next steps
170170

171-
[Backup vaults overview](backup-vault-overview.md)
171+
[Backup vaults overview](backup-vault-overview.md)

articles/internet-peering/howto-direct-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ As an Internet Service Provider or Internet Exchange Provider, you can create a
126126

127127
## Deprovision a Direct peering
128128

129-
[!INCLUDE [peering-direct-delete-portal](./includes/delete.md)]
129+
Currently, deprovisioning isn't supported using the Azure portal or PowerShell. To deprovision, contact [Microsoft peering](mailto:[email protected]).
130130

131131
## Related content
132132

articles/internet-peering/howto-exchange-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ As an Internet Exchange Provider, you can create an exchange peering request usi
124124

125125
## Deprovision an Exchange peering
126126

127-
[!INCLUDE [peering-exchange-delete-portal](./includes/delete.md)]
127+
Currently, deprovisioning isn't supported using the Azure portal or PowerShell. To deprovision, contact [Microsoft peering](mailto:[email protected]).
128128

129129
## Related content
130130

articles/internet-peering/includes/account-powershell.md

Lines changed: 0 additions & 48 deletions
This file was deleted.

articles/internet-peering/includes/cloudshell-powershell-about.md

Lines changed: 0 additions & 28 deletions
This file was deleted.

articles/internet-peering/includes/delete.md

Lines changed: 0 additions & 9 deletions
This file was deleted.

articles/internet-peering/includes/direct-powershell-create-connection.md

Lines changed: 0 additions & 77 deletions
This file was deleted.

0 commit comments

Comments
 (0)