Skip to content

Commit c7a3605

Browse files
authored
Merge pull request #271879 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents cf584b0 + 7d2116b commit c7a3605

17 files changed

+327
-52
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1232,6 +1232,7 @@
12321232
".openpublishing.redirection.government.json",
12331233
".openpublishing.redirection.guidance.json",
12341234
".openpublishing.redirection.industry.json",
1235+
".openpublishing.redirection.iot-accelerators.json",
12351236
".openpublishing.redirection.iot-develop.json",
12361237
".openpublishing.redirection.iot-hub-device-update.json",
12371238
".openpublishing.redirection.json",
@@ -1297,7 +1298,6 @@
12971298
"articles/hdinsight/.openpublishing.redirection.hdinsight.json",
12981299
"articles/healthcare-apis/.openpublishing.redirection.healthcare-apis.json",
12991300
"articles/internet-peering/.openpublishing.redirection.internet-peering.json",
1300-
"articles/iot-accelerators/.openpublishing.redirection.iot-accelerators.json",
13011301
"articles/iot-central/.openpublishing.redirection.iot-central.json",
13021302
"articles/iot-dps/.openpublishing.redirection.iot-dps.json",
13031303
"articles/iot-edge/.openpublishing.redirection.iot-edge.json",
Lines changed: 192 additions & 32 deletions
Large diffs are not rendered by default.

articles/azure-web-pubsub/tutorial-serverless-notification.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ In this tutorial, you learn how to:
105105

106106
# [Python](#tab/python)
107107
```bash
108-
func init --worker-runtime python
108+
func init --worker-runtime python --model V1
109109
```
110110

111111
2. Follow the steps to install `Microsoft.Azure.WebJobs.Extensions.WebPubSub`.

articles/defender-for-cloud/TOC.yml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1004,7 +1004,13 @@
10041004
- name: Unified insights from Microsoft Entra permissions management
10051005
href: episode-forty-three.md
10061006
- name: Agentless malware detection
1007-
href: episode-forty-four.md
1007+
href: episode-forty-four.md
1008+
- name: Risk prioritization
1009+
href: episode-forty-five.md
1010+
- name: DevOps Security Capabilities in Defender CSPM
1011+
href: episode-forty-six.md
1012+
- name: Vulnerability management in Defender CSPM
1013+
href: episode-forty-seven.md
10081014
- name: Manage user data
10091015
href: privacy.md
10101016
- name: Microsoft Defender for IoT documentation
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
title: Risk prioritization | Defender for Cloud in the field
3+
description: Learn about risk prioritization in Defender for Cloud.
4+
ms.topic: reference
5+
ms.date: 04/11/2024
6+
---
7+
8+
# Risk prioritization in Defender for Cloud
9+
10+
**Episode description**: In this episode of Defender for Cloud in the Field, Aviram Yitzhak joins Yuri Diogenes to talk about recommendation prioritization in Microsoft Defender for Cloud. Aviram explains the correlation between recommendation prioritization and attack path, and when to use each dashboard. Aviram also demonstrates the user experience when using recommendation prioritization dashboard to triage recommendations based on risk factors.
11+
12+
> [!VIDEO https://aka.ms/docs/player?id=a6d91bc3-2b57-4365-8fc9-35214d6ffb15]
13+
14+
- [01:54](/shows/mdc-in-the-field/risk-prioritization#time=01m54s) - What is recommendation prioritization
15+
- [03:51](/shows/mdc-in-the-field/risk-prioritization#time=04m25s) - How recommendations are listed in this new format
16+
- [04:38](/shows/mdc-in-the-field/risk-prioritization#time=06m25s) - When to use recommendation prioritization
17+
- [07:58](/shows/mdc-in-the-field/risk-prioritization#time=09m45s) - Correlation with secure score
18+
- [08:17](/shows/mdc-in-the-field/risk-prioritization#time=11m15s) - Demonstration
19+
20+
## Recommended resources
21+
22+
- Learn more about [Risk prioritization](risk-prioritization.md).
23+
- Learn more about [Microsoft Security](https://msft.it/6002T9HQY).
24+
- Subscribe to [Microsoft Security on YouTube](https://www.youtube.com/playlist?list=PL3ZTgFEc7LysiX4PfHhdJPR7S8mGO14YS).
25+
26+
- Follow us on social media:
27+
28+
- [LinkedIn](https://www.linkedin.com/showcase/microsoft-security/)
29+
- [Twitter](https://twitter.com/msftsecurity)
30+
31+
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity).
32+
33+
## Next steps
34+
35+
> [!div class="nextstepaction"]
36+
> [DevOps security capabilities in Defender CSPM](episode-forty-six.md)

articles/defender-for-cloud/episode-forty-four.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,4 +33,4 @@ ms.date: 01/28/2024
3333
## Next steps
3434

3535
> [!div class="nextstepaction"]
36-
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)
36+
> [Risk prioritization](episode-forty-five.md)
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
---
2+
title: Vulnerability management in Defender CSPM | Defender for Cloud in the field
3+
description: Learn about vulnerability management in Defender CSPM in Defender for Cloud.
4+
ms.topic: reference
5+
ms.date: 04/11/2024
6+
---
7+
8+
# Vulnerability management in Defender CSPM
9+
10+
**Episode description**: In this episode of Defender for Cloud in the Field, Shahar Bahat joins Yuri Diogenes to talk about some updates in vulnerability management in Defender for Cloud. Shahar talks about the different aspects of vulnerability management in Defender for Cloud, how to use attack path to identify the effect of a vulnerability and how to use Cloud Security Explorer to gain visualization of CVEs at scale across all your subscriptions. Shahar also demonstrates how to utilize these capabilities in Defender for Cloud.
11+
12+
13+
> [!VIDEO https://aka.ms/docs/player?id=1827b0e1-dd27-4e83-a2b5-6adfea3f8ed5]
14+
15+
- [01:15](/shows/mdc-in-the-field/vulnerability-management#time=01m15s) - Overview of Vulnerability Management solution in Defender for Cloud
16+
- [02:31](/shows/mdc-in-the-field/vulnerability-management#time=02m31s) - Insights available as a result of the vulnerability scanning
17+
- [03:41](/shows/mdc-in-the-field/vulnerability-management#time=03m41s) - Integration with Microsoft Threat Vulnerability Management
18+
- [04:52](/shows/mdc-in-the-field/vulnerability-management#time=04m52s) - Querying vulnerability scan results at scale
19+
- [06:53](/shows/mdc-in-the-field/vulnerability-management#time=06m53s) - Demonstration
20+
21+
## Recommended resources
22+
23+
- Learn more about [vulnerability management](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-cloud-unified-vulnerability-assessment-powered-by/ba-p/3990112).
24+
- Learn more about [Microsoft Security](https://msft.it/6002T9HQY).
25+
- Subscribe to [Microsoft Security on YouTube](https://www.youtube.com/playlist?list=PL3ZTgFEc7LysiX4PfHhdJPR7S8mGO14YS).
26+
27+
- Follow us on social media:
28+
29+
- [LinkedIn](https://www.linkedin.com/showcase/microsoft-security/)
30+
- [Twitter](https://twitter.com/msftsecurity)
31+
32+
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity).
33+
34+
## Next steps
35+
36+
> [!div class="nextstepaction"]
37+
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
title: DevOps Security Capabilities in Defender CSPM | Defender for Cloud in the field
3+
description: Learn about DevOps security capabilities in Defender for Cloud.
4+
ms.topic: reference
5+
ms.date: 04/11/2024
6+
---
7+
8+
# DevOps security capabilities in Defender CSPM
9+
10+
**Episode description**: In this episode of Defender for Cloud in the Field, Charles Oxyer joins Yuri Diogenes to talk about DevOps security capabilities in Defender CSPM. Charles explains the importance of DevOps security in Microsoft CNAPP solution, what are the free capabilities available as part of Foundational CSPM, and what are the advanced DevOps security features included in Defender CSPM. Charles demonstrates how to improve the DevOps security posture by remediating recommendations, and how to use code to cloud contextualization with Cloud Security Explorer.
11+
12+
> [!VIDEO https://aka.ms/docs/player?id=386a8435-8154-4c1d-90cc-324e8d41b95f]
13+
14+
- [01:47](/shows/mdc-in-the-field/devops-security#time=01m54s) - What role does DevOps Security plays in a CNAPP solution?
15+
- [04:40](/shows/mdc-in-the-field/devops-security#time=04m40s) - What's new in Defender for Cloud DevOps Security GA?
16+
- [07:08](/shows/mdc-in-the-field/devops-security#time=07m08s) - How Defenders for Cloud DevOps Security capabilities help customers to identify risk across devops state?
17+
- [09:38](/shows/mdc-in-the-field/devops-security#time=09m38s) - Code to cloud contextualization
18+
- [13:44](/shows/mdc-in-the-field/devops-security#time=13m44s) - Demonstration
19+
20+
## Recommended resources
21+
22+
- Learn more about [Overview of Microsoft Defender for Cloud DevOps security](defender-for-devops-introduction.md).
23+
- Learn more about [Microsoft Security](https://msft.it/6002T9HQY).
24+
- Subscribe to [Microsoft Security on YouTube](https://www.youtube.com/playlist?list=PL3ZTgFEc7LysiX4PfHhdJPR7S8mGO14YS).
25+
26+
- Follow us on social media:
27+
28+
- [LinkedIn](https://www.linkedin.com/showcase/microsoft-security/)
29+
- [Twitter](https://twitter.com/msftsecurity)
30+
31+
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity).
32+
33+
## Next steps
34+
35+
> [!div class="nextstepaction"]
36+
> [Vulnerability anagement in Defender CSPM](episode-forty-seven.md)

articles/hdinsight/hdinsight-40-component-versioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Open-source components and versions - Azure HDInsight 4.0
33
description: Learn about the open-source components and versions in Azure HDInsight 4.0.
44
ms.service: hdinsight
55
ms.topic: conceptual
6-
ms.date: 03/08/2023
6+
ms.date: 04/11/2024
77
---
88

99
# HDInsight 4.0 component versions

articles/hdinsight/hdinsight-hadoop-provision-linux-clusters.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Set up Hadoop, Kafka, Spark, or HBase clusters for HDInsight from a
44
ms.service: hdinsight
55
ms.topic: conceptual
66
ms.custom: hdinsightactive, devx-track-azurepowershell, linux-related-content
7-
ms.date: 03/16/2023
7+
ms.date: 04/11/2024
88
---
99

1010
# Set up clusters in HDInsight with Apache Hadoop, Apache Spark, Apache Kafka, and more
@@ -37,7 +37,7 @@ This article walks you through setup in the [Azure portal](https://portal.azure.
3737

3838
## Basics
3939

40-
:::image type="content" source="./media/hdinsight-hadoop-provision-linux-clusters/azure-portal-cluster-basics-blank-fs.png" alt-text="hdinsight create options custom quick.":::
40+
:::image type="content" source="./media/hdinsight-hadoop-provision-linux-clusters/azure-portal-cluster-basics-blank-fs.png" alt-text="HDInsight create options custom quick.":::
4141

4242
### Project details
4343

@@ -88,15 +88,15 @@ With HDInsight clusters, you can configure two user accounts during cluster crea
8888
The HTTP username has the following restrictions:
8989

9090
* Allowed special characters: `_` and `@`
91-
* Characters not allowed: #;."',/:`!*?$(){}[]<>|&--=+%~^space
91+
* Characters not allowed: `#;."',/:`!*?$(){}[]<>|&--=+%~^space`
9292
* Max length: 20
9393

9494
The SSH username has the following restrictions:
9595

9696
* Allowed special characters:`_` and `@`
97-
* Characters not allowed: #;."',/:`!*?$(){}[]<>|&--=+%~^space
97+
* Characters not allowed: `#;."',/:`!*?$(){}[]<>|&--=+%~^space`
9898
* Max length: 64
99-
* Reserved names: hadoop, users, oozie, hive, mapred, ambari-qa, zookeeper, tez, hdfs, sqoop, yarn, hcat, ams, hbase, administrator, admin, user, user1, test, user2, test1, user3, admin1, 1, 123, a, actuser, adm, admin2, aspnet, backup, console, david, guest, john, owner, root, server, sql, support, support_388945a0, sys, test2, test3, user4, user5, spark
99+
* Reserved names: hadoop, users, oozie, hive, mapred, ambari-qa, zookeeper, tez, hdfs, sqoop, yarn, hcat, ams, hbase, administrator, admin, user, user1, test, user2, test1, user3, admin1, 1, 123, a, `actuser`, adm, admin2, aspnet, backup, console, David, guest, John, owner, root, server, sql, support, support_388945a0, sys, test2, test3, user4, user5, spark
100100

101101
## Storage
102102

@@ -158,7 +158,7 @@ Ambari is used to monitor HDInsight clusters, make configuration changes, and st
158158
159159
## Security + networking
160160

161-
:::image type="content" source="./media/hdinsight-hadoop-provision-linux-clusters/azure-portal-cluster-security-networking.png" alt-text="hdinsight create options choose enterprise security package.":::
161+
:::image type="content" source="./media/hdinsight-hadoop-provision-linux-clusters/azure-portal-cluster-security-networking.png" alt-text="HDInsight create options choose enterprise security package.":::
162162

163163
### Enterprise security package
164164

@@ -247,7 +247,7 @@ For more information, see [Sizes for virtual machines](../virtual-machines/sizes
247247
> The added disks are only configured for node manager local directories and **not for datanode directories**
248248
249249

250-
HDInsight cluster comes with pre-defined disk space based on SKU. Running some large applications, can lead to insufficient disk space, (with disk full error - ```LinkId=221672#ERROR_NOT_ENOUGH_DISK_SPACE```) and job failures.
250+
HDInsight cluster comes with pre-defined disk space based on SKU. If you run some large applications, can lead to insufficient disk space, with disk full error - `LinkId=221672#ERROR_NOT_ENOUGH_DISK_SPACE` and job failures.
251251

252252
More discs can be added to the cluster using the new feature **NodeManager**’s local directory. At the time of Hive and Spark cluster creation, the number of discs can be selected and added to the worker nodes. The selected disk, which will be of size 1TB each, would be part of **NodeManager**'s local directories.
253253

0 commit comments

Comments
 (0)