Skip to content

Commit b1a5e86

Browse files
authored
Merge pull request #274359 from MicrosoftDocs/main
Publish to live, Monday 4 AM PST, 5/6
2 parents 9a291bc + 7108033 commit b1a5e86

File tree

60 files changed

+1047
-365
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

60 files changed

+1047
-365
lines changed

articles/active-directory-b2c/add-captcha.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: kengaderdus
55
manager: mwongerapk
66
ms.service: active-directory
77
ms.topic: how-to
8-
ms.date: 03/01/2024
8+
ms.date: 05/03/2024
99
ms.custom: project-no-code
1010
ms.author: kengaderdus
1111
ms.subservice: B2C
@@ -234,9 +234,9 @@ For the various page layouts, use the following page layout versions:
234234

235235
|Page layout |Page layout version range |
236236
|---------|---------|
237-
| Selfasserted | >=2.1.29 |
238-
| Unifiedssp | >=2.1.17 |
239-
| Multifactor | >=1.2.15 |
237+
| Selfasserted | >=2.1.30 |
238+
| Unifiedssp | >=2.1.18 |
239+
| Multifactor | >=1.2.16 |
240240

241241
**Example:**
242242

@@ -331,4 +331,4 @@ Use the steps in [Test the custom policy](tutorial-create-user-flows.md?pivots=b
331331
## Next steps
332332

333333
- Learn how to [Define a CAPTCHA technical profile](captcha-technical-profile.md).
334-
- Learn how to [Configure CAPTCHA display control](display-control-captcha.md).
334+
- Learn how to [Configure CAPTCHA display control](display-control-captcha.md).

articles/app-service/overview-authentication-authorization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ For client browsers, App Service can automatically direct all unauthenticated us
114114
115115
In the [Azure portal](https://portal.azure.com), you can configure App Service with a number of behaviors when incoming request is not authenticated. The following headings describe the options.
116116

117-
**Restric access**
117+
**Restrict access**
118118

119119
- **Allow unauthenticated requests** This option defers authorization of unauthenticated traffic to your application code. For authenticated requests, App Service also passes along authentication information in the HTTP headers.
120120

articles/defender-for-cloud/TOC.yml

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -211,6 +211,9 @@
211211
href: concept-easm.md
212212
- name: Critical assets protection
213213
href: critical-assets-protection.md
214+
- name: Permissions management
215+
displayName: permissions, management, role-based access control, RBAC, azure, azure ad, active directory
216+
href: permissions-management.md
214217
- name: Agentless machine scanning
215218
href: concept-agentless-data-collection.md
216219
- name: Secrets protection
@@ -319,6 +322,9 @@
319322
- name: Integrate security solutions
320323
displayName: security, solutions, integrate, integrated, data sources
321324
href: partner-integration.md
325+
- name: Enable permissions management
326+
displayName: permissions, management, role-based access control, RBAC, azure, azure ad, active directory
327+
href: enable-permissions-management.md
322328
- name: AI security posture
323329
items:
324330
- name: Discover generative AI workloads
@@ -525,6 +531,10 @@
525531
href: defender-partner-applications.md
526532
- name: Onboard 42Crunch (preview)
527533
href: onboarding-guide-42crunch.md
534+
- name: Onboard StackHawk (preview)
535+
href: onboarding-guide-stackhawk.md
536+
- name: Onboard Bright Security (preview)
537+
href: onboarding-guide-bright.md
528538
- name: Defender for Servers
529539
displayName: hybrid, arc, Defender for Servers
530540
items:
@@ -704,6 +714,9 @@
704714
- name: Kubernetes data plane hardening
705715
displayName: k8s, containers, aks
706716
href: kubernetes-workload-protections.md
717+
- name: Vulnerability assessment for Azure powered by Qualys (Deprecated)
718+
displayName: ACR, registry, images, qualys
719+
href: defender-for-containers-vulnerability-assessment-azure.md
707720
- name: Defender for Kubernetes (deprecated)
708721
displayName: clusters, k8s, aks
709722
href: defender-for-kubernetes-introduction.md

articles/defender-for-cloud/defender-for-storage-malware-scan.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,8 +64,10 @@ You can [enable and configure Malware Scanning at scale](tutorial-enable-storage
6464

6565
#### On-upload triggers
6666

67-
When a blob is uploaded to a protected storage account - a malware scan is triggered. All upload methods trigger the scan. Modifying a blob is an upload operation and therefore the modified content is scanned after the update.
67+
Malware scans are triggered in a protected storage account by any operation that results in a `BlobCreated` event, as specified in the [Azure Blob Storage as an Event Grid source](/azure/event-grid/event-schema-blob-storage?toc=%2Fazure%2Fstorage%2Fblobs%2Ftoc.json&tabs=cloud-event-schema) page. These operations include the initial uploading of new blobs, overwriting existing blobs, and finalizing changes to blobs through specific operations. Finalizing operations might involve `PutBlockList`, which assembles block blobs from multiple blocks, or `FlushWithClose`, which commits data appended to a blob in Azure Data Lake Storage Gen2.
6868

69+
> [!NOTE]
70+
> Incremental operations such as `AppendFile` in Azure Data Lake Storage Gen2 and `PutBlock` in Azure BlockBlob, which allow data to be added without immediate finalization, do not trigger a malware scan on their own. A malware scan is initiated only when these additions are officially committed: `FlushWithClose` commits and finalizes `AppendFile` operations, triggering a scan, and `PutBlockList` commits blocks in BlockBlob, initiating a scan. Understanding this distinction is critical for managing scanning costs effectively, as each commit can lead to a new scan and potentially increase expenses due to multiple scans of incrementally updated data.
6971
#### Scan regions and data retention
7072

7173
The malware scanning service that uses Microsoft Defender Antivirus technologies reads the blob. Malware Scanning scans the content "in-memory" and deletes scanned files immediately after scanning. The content isn't retained. The scanning occurs within the same region of the storage account. In some cases, when a file is suspicious, and more data is required, Malware Scanning might share file metadata outside the scanning region, including metadata classified as customer data (for example, SHA-256 hash), with Microsoft Defender for Endpoint.

articles/defender-for-cloud/defender-partner-applications.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,11 @@ ms.date: 11/15/2023
1010

1111
# Partner applications in Microsoft Defender for Cloud for API security testing (preview)
1212

13-
Microsoft Defender for Cloud supports third-party tools to help enhance the existing runtime security capabilities that are provided by Defender for APIs. Defender for Cloud supports proactive API security testing capabilities in early stages of the development lifecycle (including DevOps pipelines).
13+
Microsoft Defender for Cloud supports third-party tools to help enhance the existing runtime security capabilities that are provided by Defender for APIs. Defender for Cloud supports proactive API security testing capabilities in early stages of the development lifecycle (including source code repositories & CI/CD pipelines).
1414

1515
## Overview
1616

17-
The support for third-party solutions helps to further streamline, integrate, and orchestrate security findings from other vendors with Microsoft Defender for Cloud. This support enables full lifecycle API security, and the ability for security teams to effectively discover and remediate API security vulnerabilities before they are deployed in production.
17+
The support for third-party solutions helps to further streamline, integrate, and orchestrate security findings from partner solutions with Microsoft Defender for Cloud. This support enables full lifecycle API security, and the ability for security teams to effectively discover and remediate API security vulnerabilities before they are deployed in production.
1818

1919
The security scan results from partner applications are now available within Defender for Cloud, ensuring that central security teams have visibility into the health of APIs within the Defender for Cloud recommendation experience. These security teams can now take governance steps that are natively available through Defender for Cloud recommendations, and extensibility to export scan results from the Azure Resource Graph into management tools of their choice.
2020

@@ -29,13 +29,15 @@ This feature requires a GitHub connector in Defender for Cloud. See [how to onbo
2929
| Release state | Preview <br> The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.|
3030
| Required/preferred environmental requirements | APIs within source code repository, including API specification files such as OpenAPI, Swagger. |
3131
| Clouds | Available in commercial clouds. Not available in national/sovereign clouds (Azure Government, Microsoft Azure operated by 21Vianet). |
32-
| Source code management systems | GitHub-supported versions: GitHub Free, Pro, Team, and GitHub Enterprise Cloud. This also requires a license for GitHub Advanced Security (GHAS). |
32+
| Source code management systems | [GitHub Enterprise Cloud](https://docs.github.com/enterprise-cloud@latest/admin/overview/about-github-enterprise-cloud). This also requires a license for GitHub Advanced Security (GHAS). <br> <br > [Azure DevOps Services](https://azure.microsoft.com/products/devops/) |
3333

3434
## Supported applications
3535

36-
| Logo | Partner name | Description | Enablement Guide |
37-
|----------|------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------|
38-
| :::image type="content" source="media/defender-partner-applications/42crunch-logo.png" alt-text="42Crunch logo."::: | [42Crunch](https://aka.ms/APISecurityTestingPartnershipIgnite2023) | Developers can proactively test and harden APIs within their CI/CD pipelines through static and dynamic testing of APIs against the top OWASP API risks and OpenAPI specification best practices. | [42Crunch onboarding guide](onboarding-guide-42crunch.md) |
36+
| Partner name | Description | Enablement Guide |
37+
|------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------|
38+
| [42Crunch](https://aka.ms/APISecurityTestingPartnershipIgnite2023) | Developers can proactively test and harden APIs within their CI/CD pipelines through static and dynamic testing of APIs against the top OWASP API risks and OpenAPI specification best practices. | [42Crunch onboarding guide](onboarding-guide-42crunch.md) |
39+
| [StackHawk](https://aka.ms/APISecurityTestingPRStackHawk) | StackHawk is the only modern DAST and API security testing tool that runs in CI/CD, enabling developers to quickly find and fix security issues before they hit production. | [StackHawk onboarding guide](https://aka.ms/APISecurityTestingOnboardingGuideStackHawk) |
40+
| [Bright Security](https://aka.ms/APISecurityTestingPRBrightSecurity) | Bright Security’s dev-centric DAST platform empowers both developers and AppSec professionals with enterprise grade security testing capabilities for web applications, APIs, and GenAI and LLM applications. Bright knows how to deliver the right tests, at the right time in the SDLC, in developers and AppSec tools and stacks of choice with minimal false positives and alert fatigue. | [Bright Security onboarding guide](https://aka.ms/APISecurityTestingOnboardingGuideBrightSecurity) |
3941

4042
## Next steps
4143

0 commit comments

Comments
 (0)