Skip to content

Commit c8bb481

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into restorePortal
2 parents ebd4acc + 2df335d commit c8bb481

File tree

4 files changed

+33
-20
lines changed

4 files changed

+33
-20
lines changed

articles/cognitive-services/openai/overview.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -39,16 +39,14 @@ At Microsoft, we're committed to the advancement of AI driven by principles that
3939

4040
How do I get access to Azure OpenAI?
4141

42-
Access is currently limited as we navigate high demand, upcoming product improvements, and <a href="https://www.microsoft.com/ai/responsible-ai?activetab=pivot1:primaryr6" target="_blank">Microsoft’s commitment to responsible AI</a>. For now, we're working with customers with an existing partnership with Microsoft, lower risk use cases, and those committed to incorporating mitigations. In addition to applying for initial access, all solutions using Azure OpenAI are required to go through a use case review before they can be released for production use.
42+
Access is currently limited as we navigate high demand, upcoming product improvements, and <a href="https://www.microsoft.com/ai/responsible-ai?activetab=pivot1:primaryr6" target="_blank">Microsoft’s commitment to responsible AI</a>. For now, we're working with customers with an existing partnership with Microsoft, lower risk use cases, and those committed to incorporating mitigations.
4343

4444
More specific information is included in the application form. We appreciate your patience as we work to responsibly enable broader access to Azure OpenAI.
4545

46-
Apply here for initial access or for a production review:
46+
Apply here for access:
4747

4848
<a href="https://aka.ms/oaiapply" target="_blank">Apply now</a>
4949

50-
All solutions using Azure OpenAI are also required to go through a use case review before they can be released for production use, and are evaluated on a case-by-case basis. In general, the more sensitive the scenario the more important risk mitigation measures will be for approval.
51-
5250
## Comparing Azure OpenAI and OpenAI
5351

5452
Azure OpenAI Service gives customers advanced language AI with OpenAI GPT-4, GPT-3, Codex, and DALL-E models with the security and enterprise promise of Azure. Azure OpenAI co-develops the APIs with OpenAI, ensuring compatibility and a smooth transition from one to the other.

articles/iot-edge/support.md

Lines changed: 0 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -111,15 +111,6 @@ IoT Edge uses the Microsoft.Azure.Devices.Client SDK. For more information, see
111111
| IoT Edge version | Microsoft.Azure.Devices.Client SDK version |
112112
|------------------|--------------------------------------------|
113113
| 1.4 | 1.36.6 |
114-
| 1.3 | 1.36.6 |
115-
| 1.2.0 | 1.33.4-NestedEdge |
116-
| 1.1 (LTS) | 1.28.0 |
117-
| 1.0.10 | 1.28.0 |
118-
| 1.0.9 | 1.21.1 |
119-
| 1.0.8 | 1.20.3 |
120-
| 1.0.7 | 1.20.1 |
121-
| 1.0.6 | 1.17.1 |
122-
| 1.0.5 | 1.17.1 |
123114

124115
## Virtual Machines
125116

articles/spring-apps/how-to-cicd.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -250,6 +250,23 @@ To deploy directly from an existing container image, use the following pipeline
250250
ContainerImage: '<your image tag>'
251251
```
252252

253+
### Deploy and specify a builder (Enterprise tier only)
254+
255+
If you're using Azure Spring Apps Enterprise tier, you can also specify which builder to use for deploy actions using the `builder` option, as shown in the following example. For more information, see [Use Tanzu Build Service](how-to-enterprise-build-service.md).
256+
257+
```yaml
258+
- task: AzureSpringCloud@0
259+
inputs:
260+
azureSubscription: '<your-service-connection-name>'
261+
Action: 'Deploy'
262+
AzureSpringCloud: '<your-Azure-Spring-Apps-service-instance-name>'
263+
AppName: '<app-name>'
264+
UseStagingDeployment: false
265+
DeploymentName: 'default'
266+
Package: './target/your-result-jar.jar'
267+
Builder: '<your-Tanzu-Build-Service-Builder-resource>'
268+
```
269+
253270
::: zone-end
254271

255272
## Next steps

articles/virtual-network-manager/concept-security-admins.md

Lines changed: 14 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ author: mbender-ms
55
ms.author: mbender
66
ms.service: virtual-network-manager
77
ms.topic: conceptual
8-
ms.date: 03/15/2023
8+
ms.date: 03/22/2023
99
ms.custom: template-concept, ignite-fall-2021
1010
---
1111

1212
# Security admin rules in Azure Virtual Network Manager
1313

14-
Azure Virtual Network Manager provides two different types of configurations you can deploy across your virtual networks, one of them being a **security admin** configuration. A security admin configuration contains a set of rule collections. Each rule collection contains one or more security admin rules. You then associate the rule collection with the network groups that you want to apply the security admin rules to.
14+
Azure Virtual Network Manager provides two different types of configurations you can deploy across your virtual networks, one of them being a **security admin** configuration. A security admin configuration contains a set of rule collections. Each rule collection contains one or more security admin rules. Then you associate the rule collection with the network groups that you want to apply the security admin rules to. This article explains what security admin rules are and how they work.
1515

1616
> [!IMPORTANT]
1717
> Azure Virtual Network Manager is generally available for Virtual Network Manager and hub and spoke connectivity configurations.
@@ -22,21 +22,28 @@ Azure Virtual Network Manager provides two different types of configurations you
2222
2323
## Security admin rules
2424

25-
A security admin rule allows you to enforce security policy criteria that match the conditions set. You can only define security administrative rules for resources within the scope of the Azure Virtual Network Manager instance. These security rules have a higher priority than network security group rules and are evaluated before network security group rules. Also note that security admin rules don't change your network security group rules.
25+
A security admin rule allows you to enforce security policy on resources that match a rule's condition set. For example, you can define a security admin rule to block network traffic to virtual networks over a high-risk port such as Remote Desktop Protocol (RDP). These rules only apply to resources within the scope of the Azure Virtual Network Manager instance. For example, security admin rules don't apply to virtual networks not managed by a virtual manager instance.
2626

2727
### The order of evaluation
2828

2929
Security admin rules are evaluated before network security rules. Depending on the type of security admin rule you create, they can interact differently with network security group rules. When this happens, organizations can set enforced security policies alongside the teams' network security groups that address their own use cases. This diagram illustrates the order of evaluation of traffic.
3030

3131
:::image type="content" source="media/concept-security-admins/traffic-evaluation.png" alt-text="Diagram showing order of evaluation for network traffic with security admin rules and network security rules.":::
3232

33-
There are three kinds of actions – Allow, Always Allow, and Deny. If you create a security admin rule to *Allow* a certain type of traffic, this rule is evaluated first. When the traffic is allowed by a security admin rule, it's further evaluated by network security group rules. It leaves room for network security group rules down the line to handle this type of traffic differently as needed. If you create a security admin rule to *Always Allow* or *Deny* a certain type of traffic, the rule is evaluated first. Then it terminates the network security group evaluation of this traffic – meaning the evaluation is stopped. If the security admin rule is *Always Allow*, the traffic doesn't hit network security groups, and instead delivers directly to virtual machines or other resource. This action can be useful when administrators want to enforce some traffic to be not denied by network security group rules. For example, administrators may want to force the organization to consume software updates from certain ports. When *Deny* is used, evaluation and therefore traffic is stopped without being delivered to the destination. This means that you can use security admin rules to set definitive security rules that can't be overridden by others.
33+
There are three kinds of actions – Allow, Always Allow, and Deny. If you create a security admin rule to *Allow* a certain type of traffic, this rule is evaluated first. When a security admin rule allows traffic, it's then evaluated by network security group rules. It leaves room for network security group rules down the line to handle this type of traffic differently as needed. If you create a security admin rule to *Always Allow* or *Deny* a certain type of traffic, the rule is evaluated first. Then it terminates the network security group evaluation of this traffic – meaning the evaluation is stopped. If the security admin rule is *Always Allow*, the traffic doesn't hit network security groups, and instead delivers directly to virtual machines or other resource. This action can be useful when administrators want to enforce traffic and prevent denial by network security group rules. For example, administrators may want to force the organization to consume software updates from certain ports. When *Deny* is used, evaluation and therefore traffic is stopped without being delivered to the destination. This means that you can use security admin rules to set definitive security rules that can't be overridden with other rules.
3434
Security admin rules don't depend on network security groups in order to exist. This means that administrators can use security admin rules to create default security rules. Even if application owners misconfigured or forgot to establish network security groups, your organization is protected by default!
3535

36+
> [!IMPORTANT]
37+
> When security admin rules are deployed, the eventual consistency model is used. This means that security admin rules will be eventually applied to the resources contained in a virtual network after a short delay.  Resources that are added to a virtual network that already has security admin rules applied on it will eventually receive those same security admin rules with a delay as well.
38+
3639
### Management at scale
3740

38-
When you apply a security admin configuration to a [network group](concept-network-groups.md#network-group), all of the resources in the selected network groups’ virtual networks have those security admin rules applied to them. It doesn't matter how many or how few virtual networks are contained in the network group. This protection extends to new resources as they're added. If you add new VMs to a virtual network that has a security admin configuration applied on it, those VMs are secured as well. In effect, security admin rules protect your resources from day zero. As soon as your resources are provisioned, they fall under the protection of security admin rules.
39-
Then, if new security risks are identified, new security admin rules can still protect your resources at scale. You can create security admin rules to protect against the new risk, then apply them to network groups – essentially, hundreds of virtual networks at once.
41+
Azure Virtual Network Manager provides a way to manage your security policies at scale with security admin rules. When you apply a security admin configuration to a [network group](./concept-network-groups.md), a network group can contain dozens or hundreds of VNets, and all of the resources in the network groups’ scope have those security admin rules applied to them.
42+
43+
New resources are protected along with existing resources. For example, if you add new VMs to a virtual network in the scope of a security admin rule, the VMs are automatically secured as well. Shortly after you deploy these VMs, security admin rules will be applied and protect them.
44+
45+
When new security risks are identified, you can deploy them at scale by creating a security admin rule to protect against the new risk and applying it to your network groups. Once this new rule is deployed, all resources in the scope of the network groups will be protected now and in the future.
46+
4047

4148
### Protect high-risk ports
4249

@@ -81,7 +88,7 @@ When you define a security admin rule, there are required and optional fields.
8188

8289
#### Priority
8390

84-
Security rule priority is determined by an integer between 0 and 99. The lower the value the higher the priority of the rule. For example, a deny rule with a priority of 10 override an allow rule with a priority of 20.
91+
The priority of a security admin rule is an integer between 0 and 99. The lower the value the higher the priority of the rule. For example, a deny rule with a priority of 10 overrides an allow rule with a priority of 20.
8592

8693
#### <a name = "action"></a>Action
8794

0 commit comments

Comments
 (0)