You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-maps/web-sdk-migration-guide.md
+9-1Lines changed: 9 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ If you're using CDN ([content delivery network]), update the references to the s
39
39
40
40
### npm
41
41
42
-
Install the latest[npm] package using the following command:
42
+
If you're using[npm], update the to the latest Azure Maps control by running the following command:
43
43
44
44
```shell
45
45
npm install azure-maps-control@latest
@@ -59,10 +59,18 @@ Consider a gradual rollout strategy for the updated version. Release the migrate
59
59
60
60
By following these steps and considering best practices, you can successfully migrate your application from Azure Maps WebSDK v1 to v3. Embrace the new capabilities and improvements offered by the latest version while ensuring a smooth and seamless transition for your users. For more information, see [Azure Maps Web SDK best practices].
61
61
62
+
## Next steps
63
+
64
+
Learn more about the Azure Maps Power BI visual:
65
+
66
+
> [!div class="nextstepaction"]
67
+
> [Use the Azure Maps map control]
68
+
62
69
[Azure Active Directory Authentication]: how-to-secure-spa-users.md
63
70
[Azure Maps Web SDK best practices]: web-sdk-best-practices.md
Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/cost-logs.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -159,9 +159,12 @@ Subscriptions that contained a Log Analytics workspace or Application Insights r
159
159
160
160
Access to the legacy Free Trial pricing tier was limited on July 1, 2022. Pricing information for the Standalone and Per Node pricing tiers is available [here](https://aka.ms/OMSpricing).
161
161
162
+
> [!IMPORTANT]
163
+
> The legacy pricing tiers do not support access to some of the newest features in Log Analytics such as ingesting data as cost-effective Basic Logs.
164
+
162
165
### Free Trial pricing tier
163
166
164
-
Workspaces in the Free Trial pricing tier will have daily data ingestion limited to 500 MB (except for security data types collected by [Microsoft Defender for Cloud](../../security-center/index.yml)). The data retention is limited to seven days. The Free Trial pricing tier is intended only for evaluation purposes. No SLA is provided for the Free Trial tier.
167
+
Workspaces in the Free Trial pricing tier have daily data ingestion limited to 500 MB (except for security data types collected by [Microsoft Defender for Cloud](../../security-center/index.yml)). Data retention is limited to seven days. The Free Trial pricing tier is intended only for evaluation purposes, not production workloads. No SLA is provided for the Free Trial tier.
165
168
166
169
> [!NOTE]
167
170
> Creating new workspaces in, or moving existing workspaces into, the legacy Free Trial pricing tier was possible only until July 1, 2022.
Copy file name to clipboardExpand all lines: articles/azure-signalr/signalr-howto-diagnostic-logs.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,9 @@ Platform metrics and the Activity log are collected and stored automatically, bu
42
42
43
43
Resource Logs aren't collected and stored until you create a diagnostic setting and route them to one or more locations.
44
44
45
-
See [Create diagnostic setting to collect platform logs and metrics in Azure](../azure-monitor/essentials/diagnostic-settings.md) for the detailed process for creating a diagnostic setting using the Azure portal, CLI, or PowerShell. When you create a diagnostic setting, you specify which categories of logs to collect.
45
+
Resource Logs are grouped into Category groups. Category groups are a collection of different logs to help you achieve different monitoring goals. These groups are defined dynamically and may change over time as new resource logs become available and are added to the category group. Note that this may incur additionally charges. The audit resource log category group allows you to select the resource logs that are necessary for auditing your resource. For more information, see [Diagnostic settings in Azure Monitor: Resource logs](../azure-monitor/essentials/diagnostic-settings.md?tabs=portal#resource-logs).
46
+
47
+
For the detailed process for creating a diagnostic setting using the Azure portal, CLI, or PowerShell. When you create a diagnostic setting, you specify which categories of logs to collect, see [Create diagnostic setting to collect platform logs and metrics in Azure](../azure-monitor/essentials/diagnostic-settings.md).
46
48
47
49
The metrics and logs you can collect are discussed in the following sections.
Copy file name to clipboardExpand all lines: articles/data-factory/concepts-change-data-capture-resource.md
+10-1Lines changed: 10 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: data-factory
9
9
ms.subservice: data-movement
10
10
ms.custom:
11
11
ms.topic: conceptual
12
-
ms.date: 08/08/2023
12
+
ms.date: 08/18/2023
13
13
---
14
14
15
15
# Change data capture resource overview
@@ -51,6 +51,7 @@ The new Change Data Capture resource in ADF allows for full fidelity change data
51
51
* JSON
52
52
* ORC
53
53
* Parquet
54
+
* Azure Synapse Analytics
54
55
55
56
## Known limitations
56
57
* Currently, when creating source/target mappings, each source and target is only allowed to be used once.
@@ -59,8 +60,16 @@ The new Change Data Capture resource in ADF allows for full fidelity change data
59
60
60
61
For more information on known limitations and troubleshooting assistance, please reference [this troubleshooting guide](change-data-capture-troubleshoot.md).
61
62
63
+
## Azure Synapse Analytics as Target
64
+
When using Azure Synapse Analytics as target, the **Staging Settings** is available on the main table canvas. Enabling staging is mandatory when selecting Azure Synapse Analytics as the target. This significantly enhances write performance by utilizing performant bulk loading capability such as COPY INTO command. **Staging Settings** can be configured in two ways: utilizing **Factory settings** or opting for a **Custom settings**. **Factory settings** apply at the factory level. For the first time, if these settings aren't configured, you'll be directed to the global staging setting section for configuration. Once set, all CDC top-level resources will adopt this configuration. **Custom settings** is scoped only for the CDC resource for which it is configured and overrides the **Factory settings**.
65
+
66
+
> [!NOTE]
67
+
> As we utilize the COPY INTO command to transfer data from the staging location to Azure Synapse Analytics, it is advisable to ensure that all required permissions are pre-configured within Azure Synapse Analytics.
68
+
69
+
62
70
> [!NOTE]
63
71
> We always use the last published configuration when starting a CDC. For running CDCs, while your data is being processed, you will be billed 4 v-cores of General Purpose Data Flows.
64
72
65
73
## Next steps
66
74
-[Learn how to set up a change data capture resource](how-to-change-data-capture-resource.md).
75
+
-[Learn how to set up a change data capture resource with schema evolution](how-to-change-data-capture-resource-with-schema-evolution.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/multi-factor-authentication-enforcement.md
+17-15Lines changed: 17 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,14 +2,14 @@
2
2
title: Security recommendations for multi-factor authentication
3
3
description: Learn how to enforce multi-factor authentication for your Azure subscriptions using Microsoft Defender for Cloud
4
4
ms.topic: conceptual
5
-
ms.date: 06/28/2023
5
+
ms.date: 08/14/2023
6
6
---
7
7
8
-
# Manage multi-factor authentication (MFA) enforcement on your subscriptions
8
+
# Manage multi-factor authentication (MFA) on your subscriptions
9
9
10
-
If you're using passwords, only to authenticate your users, you're leaving an attack vector open. Users often use weak passwords or reuse them for multiple services. With [MFA](https://www.microsoft.com/security/business/identity/mfa) enabled, your accounts are more secure, and users can still authenticate to almost any application with single sign-on (SSO).
10
+
If you're using passwords only to authenticate your users, you're leaving an attack vector open. Users often use weak passwords or reuse them for multiple services. With [MFA](https://www.microsoft.com/security/business/identity/mfa) enabled, your accounts are more secure, and users can still authenticate to almost any application with single sign-on (SSO).
11
11
12
-
There are multiple ways to enable MFA for your Azure Active Directory (AD) users based on the licenses that your organization owns. This page provides the details for each in the context of Microsoft Defender for Cloud.
12
+
There are multiple ways to enable MFA for your Azure Active Directory (Azure AD) users based on the licenses that your organization owns. This page provides the details for each in the context of Microsoft Defender for Cloud.
13
13
14
14
## MFA and Microsoft Defender for Cloud
15
15
@@ -21,7 +21,7 @@ The recommendations in the Enable MFA control ensure you're meeting the recommen
21
21
- Accounts with write permissions on Azure resources should be MFA enabled
22
22
- Accounts with read permissions on Azure resources should be MFA enabled
23
23
24
-
There are three ways to enable MFA and be compliant with the two recommendations in Defender for Cloud: security defaults, per-user assignment, conditional access (CA) policy.
24
+
There are three ways to enable MFA and be compliant with the two recommendations in Defender for Cloud: security defaults, per-user assignment, and conditional access (CA) policy.
25
25
26
26
### Free option - security defaults
27
27
@@ -33,7 +33,7 @@ Customers with Microsoft 365 can use **Per-user assignment**. In this scenario,
33
33
34
34
### MFA for Azure AD Premium customers
35
35
36
-
For an improved user experience, upgrade to Azure AD Premium P1 or P2 for **conditional access (CA) policy** options. To configure a CA policy, you'll need [Azure Active Directory (AD) tenant permissions](../active-directory/roles/permissions-reference.md).
36
+
For an improved user experience, upgrade to Azure AD Premium P1 or P2 for **conditional access (CA) policy** options. To configure a CA policy, you need [Azure Active Directory (Azure AD) tenant permissions](../active-directory/roles/permissions-reference.md).
37
37
38
38
Your CA policy must:
39
39
@@ -51,7 +51,7 @@ Learn more in the [Azure Conditional Access documentation](../active-directory/c
51
51
52
52
## Identify accounts without multi-factor authentication (MFA) enabled
53
53
54
-
You can view the list of user accounts without MFA enabled from either the Defender for Cloud recommendations details page, or using Azure Resource Graph.
54
+
You can view the list of user accounts without MFA enabled from either the Defender for Cloud recommendations details page, or by using the Azure Resource Graph.
55
55
56
56
### View the accounts without MFA enabled in the Azure portal
57
57
@@ -63,24 +63,26 @@ To see which accounts don't have MFA enabled, use the following Azure Resource G
1. Enter the following query and select **Run query**.
69
69
70
-
```kusto
70
+
```
71
71
securityresources
72
-
| where type == "microsoft.security/assessments"
73
-
| where properties.displayName contains "Accounts with owner permissions on Azure resources should be MFA enabled"
74
-
| where properties.status.code == "Unhealthy"
72
+
| where type =~ "microsoft.security/assessments/subassessments"
73
+
| where id has "assessments/dabc9bc4-b8a8-45bd-9a5a-43000df8aa1c" or id has "assessments/c0cb17b2-0607-48a7-b0e0-903ed22de39b" or id has "assessments/6240402e-f77c-46fa-9060-a7ce53997754"
74
+
| parse id with start "/assessments/" assessmentId "/subassessments/" userObjectId
75
+
| summarize make_list(userObjectId) by strcat(tostring(properties.displayName), " (", assessmentId, ")")
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/plan-multicloud-security-determine-multicloud-dependencies.md
+9-8Lines changed: 9 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,15 +37,16 @@ In Defender for Cloud, you enable specific plans to get Cloud Workload Platform
37
37
-[Defender for Containers](./defender-for-containers-introduction.md): Help secure your Kubernetes clusters with security recommendations and hardening, vulnerability assessments, and runtime protection.
38
38
-[Defender for SQL](./defender-for-sql-usage.md): Protect SQL databases running in AWS and GCP.
39
39
40
-
### What agent do I need?
40
+
### What extension do I need?
41
41
42
-
The following table summarizes agent requirements for CWPP.
42
+
The following table summarizes extension requirements for CWPP.
43
43
44
-
|Agent|Defender for Servers|Defender for Containers|Defender fo SQL on Machines|
44
+
|Extension|Defender for Servers|Defender for Containers|Defender for SQL on Machines|
45
45
|:---:|:---:|:---:|:---:|
46
46
|Azure Arc Agent | ✔ | ✔ | ✔ |
47
-
|Microsoft Defender for Endpoint extension |✔|
48
-
|Vulnerability assessment| ✔||
47
+
|Microsoft Defender for Endpoint extension |✔|||
48
+
|Vulnerability assessment| ✔|||
49
+
|Agentless Disk Scanning| ✔ | ✔ ||
49
50
|Log Analytics or Azure Monitor Agent (preview) extension|✔||✔|
50
51
|Defender agent|| ✔||
51
52
|Azure Policy for Kubernetes || ✔||
@@ -78,14 +79,14 @@ The following components and requirements are needed to receive full protection
78
79
79
80
-**Azure Arc agent**: AWS and GCP machines connect to Azure using Azure Arc. The Azure Arc agent connects them.
80
81
- The Azure Arc agent is needed to read security information on the host level and allow Defender for Cloud to deploy the agents/extensions required for complete protection.
81
-
To auto-provision the Azure Arc agent, the OS configuration agent on [GCP VM instances](./quickstart-onboard-gcp.md?pivots=env-settings) and the AWS Systems Manager (SSM) agent for [AWS EC2 instances](./quickstart-onboard-aws.md?pivots=env-settings) must be configured. [Learn more](../azure-arc/servers/agent-overview.md) about the agent.
82
+
To autoprovision the Azure Arc agent, the OS configuration agent on [GCP VM instances](./quickstart-onboard-gcp.md?pivots=env-settings) and the AWS Systems Manager (SSM) agent for [AWS EC2 instances](./quickstart-onboard-aws.md?pivots=env-settings) must be configured. [Learn more](../azure-arc/servers/agent-overview.md) about the agent.
82
83
-**Defender for Endpoint capabilities**: The [Microsoft Defender for Endpoint](./integration-defender-for-endpoint.md?tabs=linux) agent provides comprehensive endpoint detection and response (EDR) capabilities.
83
84
-**Vulnerability assessment**: Using either the integrated [Qualys vulnerability scanner](./deploy-vulnerability-assessment-vm.md), or the [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management) solution.
84
85
-**Log Analytics agent/[Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) (AMA) (in preview)**: Collects security-related configuration information and event logs from machines.
85
86
86
87
#### Check networking requirements
87
88
88
-
Machines must meet [network requirements](../azure-arc/servers/network-requirements.md?tabs=azure-cloud) before onboarding the agents. Auto-provisioning is enabled by default.
89
+
Machines must meet [network requirements](../azure-arc/servers/network-requirements.md?tabs=azure-cloud) before onboarding the agents. Autoprovisioning is enabled by default.
89
90
90
91
### Defender for Containers
91
92
@@ -119,7 +120,7 @@ To receive the full benefits of Defender for SQL on your multicloud workload, yo
119
120
120
121
-**Azure Arc agent**: AWS and GCP machines connect to Azure using Azure Arc. The Azure Arc agent connects them.
121
122
- The Azure Arc agent is needed to read security information on the host level and allow Defender for Cloud to deploy the agents/extensions required for complete protection.
122
-
- To auto-provision the Azure Arc agent, the OS configuration agent on [GCP VM instances](./quickstart-onboard-gcp.md?pivots=env-settings) and the AWS Systems Manager (SSM) agent for [AWS EC2 instances](./quickstart-onboard-aws.md?pivots=env-settings) must be configured. [Learn more](../azure-arc/servers/agent-overview.md) about the agent.
123
+
- To autoprovision the Azure Arc agent, the OS configuration agent on [GCP VM instances](./quickstart-onboard-gcp.md?pivots=env-settings) and the AWS Systems Manager (SSM) agent for [AWS EC2 instances](./quickstart-onboard-aws.md?pivots=env-settings) must be configured. [Learn more](../azure-arc/servers/agent-overview.md) about the agent.
123
124
-**Log Analytics agent/[Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) (AMA) (in preview)**: Collects security-related configuration information and event logs from machines
124
125
-**Automatic SQL server discovery and registration**: Supports automatic discovery and registration of SQL servers
0 commit comments