Skip to content

Commit beff58c

Browse files
authored
Merge pull request #267007 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 02e64a3 + 6958156 commit beff58c

File tree

4 files changed

+28
-4
lines changed

4 files changed

+28
-4
lines changed

articles/azure-cache-for-redis/cache-tls-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.author: franlanglois
1616
Transport Layer Security (TLS) is a cryptographic protocol that provides secure communication over a network. Azure Cache for Redis supports TLS on all tiers. When create a service that uses an Azure Cache for Redis instance, we strongly encourage you to connect using TLS.
1717

1818
> [!IMPORTANT]
19-
> Starting October 1, 2024, TLS 1.0 and 1.1 will no longer be supported. You should use TLS 1.2 or 1.3 instead.
19+
> Starting November 01, 2024, TLS 1.0 and 1.1 will no longer be supported. You should use TLS 1.2 or 1.3 instead.
2020
>
2121
2222
## Scope of availability

articles/azure-monitor/logs/resource-manager-cluster.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,10 @@ param location string = resourceGroup().location
3434
3535
@description('Specify the capacity reservation value.')
3636
@allowed([
37+
100
38+
200
39+
300
40+
400
3741
500
3842
1000
3943
2000
@@ -87,6 +91,10 @@ resource cluster 'Microsoft.OperationalInsights/clusters@2021-06-01' = {
8791
"CommitmentTier": {
8892
"type": "int",
8993
"allowedValues": [
94+
100,
95+
200,
96+
300,
97+
400,
9098
500,
9199
1000,
92100
2000,

articles/sentinel/entities-reference.md

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Learn more about [strong and weak identifiers](entities.md#strong-and-weak-ident
2727
| [**Host**](#host) | DnsDomain<br>NTDomain<br>HostName<br>*FullName \**<br>NetBiosName<br>AzureID<br>OMSAgentID<br>OSFamily<br>OSVersion<br>IsDomainJoined | HostName+NTDomain<br>HostName+DnsDomain<br>NetBiosName+NTDomain<br>NetBiosName+DnsDomain<br>AzureID<br>OMSAgentID | HostName<br>NetBiosName |
2828
| [**IP**](#ip) | Address<br>AddressScope | Address [\*\*](#strong-identifiers-of-an-ip-entity)<br>Address+AddressScope [\*\*](#strong-identifiers-of-an-ip-entity) | |
2929
| [**URL**](#url) | Url | Url *(if absolute URL)* [\*\*](#strong-identifiers-of-a-url-entity) | Url *(if relative URL)* [\*\*](#strong-identifiers-of-a-url-entity) |
30-
| [**Azure resource**](#azure-resource) | ResourceId | ResourceId | |
30+
| [**AzureResource**](#azure-resource) | ResourceId | ResourceId | |
3131
| [**Cloud application**](#cloud-application)<br>*(CloudApplication)* | AppId<br>Name<br>InstanceName | AppId<br>Name<br>AppId+InstanceName<br>Name+InstanceName | |
3232
| [**DNS Resolution**](#dns-resolution) | DomainName | DomainName+*DnsServerIp*+*HostIpAddress* | DomainName+*HostIpAddress* |
3333
| [**File**](#file) | Directory<br>Name | Directory+Name | |
@@ -65,7 +65,7 @@ The following section contains a more in-depth look at the full schemas of each
6565
- [Process](#process)
6666
- [Cloud application](#cloud-application)
6767
- [DNS resolution](#dns-resolution)
68-
- [Azure resource](#azure-resource)
68+
- [AzureResource](#azure-resource)
6969
- [File hash](#file-hash)
7070
- [Registry key](#registry-key)
7171
- [Registry value](#registry-value)
@@ -80,6 +80,8 @@ The following section contains a more in-depth look at the full schemas of each
8080

8181
### Account
8282

83+
*Entity name: Account*
84+
8385
| Field | Type | Description |
8486
| ----- | ---- | ----------- |
8587
| **Type** | String | 'account' |
@@ -137,6 +139,8 @@ The following section contains a more in-depth look at the full schemas of each
137139

138140
### Host
139141

142+
*Entity name: Host*
143+
140144
| Field | Type | Description |
141145
| ----- | ---- | ----------- |
142146
| **Type** | String | 'host' |
@@ -190,6 +194,8 @@ The following section contains a more in-depth look at the full schemas of each
190194

191195
### Malware
192196

197+
*Entity name: Malware*
198+
193199
| Field | Type | Description |
194200
| ----- | ---- | ----------- |
195201
| **Type** | String | 'malware' |
@@ -206,6 +212,8 @@ The following section contains a more in-depth look at the full schemas of each
206212

207213
### File
208214

215+
*Entity name: File*
216+
209217
| Field | Type | Description |
210218
| ----- | ---- | ----------- |
211219
| **Type** | String | 'file' |
@@ -229,6 +237,8 @@ The following section contains a more in-depth look at the full schemas of each
229237

230238
### Process
231239

240+
*Entity name: Process*
241+
232242
| Field | Type | Description |
233243
| ----- | ---- | ----------- |
234244
| **Type** | String | 'process' |
@@ -306,6 +316,8 @@ The following section contains a more in-depth look at the full schemas of each
306316

307317
### Azure resource
308318

319+
*Entity name: AzureResource*
320+
309321
| Field | Type | Description |
310322
| ----- | ---- | ----------- |
311323
| **Type** | String | 'azure-resource' |
@@ -397,6 +409,8 @@ The following section contains a more in-depth look at the full schemas of each
397409

398410
### URL
399411

412+
*Entity name: Url*
413+
400414
| Field | Type | Description |
401415
| ----- | ---- | ----------- |
402416
| Type | String | 'url' |
@@ -459,6 +473,8 @@ The following section contains a more in-depth look at the full schemas of each
459473

460474
### Mailbox
461475

476+
*Entity name: Mailbox*
477+
462478
| Field | Type | Description |
463479
| ----- | ---- | ----------- |
464480
| **Type** | String | 'mailbox' |

articles/storage/common/storage-network-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Storage accounts have a public endpoint that's accessible through the internet.
2222

2323
The Azure Storage firewall provides access control for the public endpoint of your storage account. You can also use the firewall to block all access through the public endpoint when you're using private endpoints. Your firewall configuration also enables trusted Azure platform services to access the storage account.
2424

25-
An application that accesses a storage account when network rules are in effect still requires proper authorization for the request. Authorization is supported with Microsoft Entra credentials for blobs and queues, with a valid account access key, or with a shared access signature (SAS) token. When you configure a blob container for anonymous access, requests to read data in that container don't need to be authorized. The firewall rules remain in effect and will block anonymous traffic.
25+
An application that accesses a storage account when network rules are in effect still requires proper authorization for the request. Authorization is supported with Microsoft Entra credentials for blobs, tables, file shares and queues, with a valid account access key, or with a shared access signature (SAS) token. When you configure a blob container for anonymous access, requests to read data in that container don't need to be authorized. The firewall rules remain in effect and will block anonymous traffic.
2626

2727
Turning on firewall rules for your storage account blocks incoming requests for data by default, unless the requests originate from a service that operates within an Azure virtual network or from allowed public IP addresses. Requests that are blocked include those from other Azure services, from the Azure portal, and from logging and metrics services.
2828

0 commit comments

Comments
 (0)