Skip to content

Commit cd004f3

Browse files
authored
Merge branch 'MicrosoftDocs:main' into yelevin-patch-2
2 parents 419ea5a + cc84e27 commit cd004f3

13 files changed

+102
-54
lines changed

articles/azure-maps/web-sdk-migration-guide.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ If you're using CDN ([content delivery network]), update the references to the s
3939

4040
### npm
4141

42-
Install the latest [npm] package using the following command:
42+
If you're using [npm], update the to the latest Azure Maps control by running the following command:
4343

4444
```shell
4545
npm install azure-maps-control@latest
@@ -59,10 +59,18 @@ Consider a gradual rollout strategy for the updated version. Release the migrate
5959

6060
By following these steps and considering best practices, you can successfully migrate your application from Azure Maps WebSDK v1 to v3. Embrace the new capabilities and improvements offered by the latest version while ensuring a smooth and seamless transition for your users. For more information, see [Azure Maps Web SDK best practices].
6161

62+
## Next steps
63+
64+
Learn more about the Azure Maps Power BI visual:
65+
66+
> [!div class="nextstepaction"]
67+
> [Use the Azure Maps map control]
68+
6269
[Azure Active Directory Authentication]: how-to-secure-spa-users.md
6370
[Azure Maps Web SDK best practices]: web-sdk-best-practices.md
6471
[content delivery network]: /azure/cdn/cdn-overview
6572
[Manage Authentication in Azure Maps]: how-to-manage-authentication.md
6673
[npm]: https://www.npmjs.com/package/azure-maps-control
6774
[release notes]: release-notes-map-control.md
6875
[Shared Key Authentication]: how-to-secure-sas-app.md
76+
[Use the Azure Maps map control]: how-to-use-map-control.md

articles/azure-monitor/logs/cost-logs.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,9 +159,12 @@ Subscriptions that contained a Log Analytics workspace or Application Insights r
159159

160160
Access to the legacy Free Trial pricing tier was limited on July 1, 2022. Pricing information for the Standalone and Per Node pricing tiers is available [here](https://aka.ms/OMSpricing).
161161

162+
> [!IMPORTANT]
163+
> The legacy pricing tiers do not support access to some of the newest features in Log Analytics such as ingesting data as cost-effective Basic Logs.
164+
162165
### Free Trial pricing tier
163166

164-
Workspaces in the Free Trial pricing tier will have daily data ingestion limited to 500 MB (except for security data types collected by [Microsoft Defender for Cloud](../../security-center/index.yml)). The data retention is limited to seven days. The Free Trial pricing tier is intended only for evaluation purposes. No SLA is provided for the Free Trial tier.
167+
Workspaces in the Free Trial pricing tier have daily data ingestion limited to 500 MB (except for security data types collected by [Microsoft Defender for Cloud](../../security-center/index.yml)). Data retention is limited to seven days. The Free Trial pricing tier is intended only for evaluation purposes, not production workloads. No SLA is provided for the Free Trial tier.
165168

166169
> [!NOTE]
167170
> Creating new workspaces in, or moving existing workspaces into, the legacy Free Trial pricing tier was possible only until July 1, 2022.

articles/azure-signalr/signalr-howto-diagnostic-logs.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,9 @@ Platform metrics and the Activity log are collected and stored automatically, bu
4242

4343
Resource Logs aren't collected and stored until you create a diagnostic setting and route them to one or more locations.
4444

45-
See [Create diagnostic setting to collect platform logs and metrics in Azure](../azure-monitor/essentials/diagnostic-settings.md) for the detailed process for creating a diagnostic setting using the Azure portal, CLI, or PowerShell. When you create a diagnostic setting, you specify which categories of logs to collect.
45+
Resource Logs are grouped into Category groups. Category groups are a collection of different logs to help you achieve different monitoring goals. These groups are defined dynamically and may change over time as new resource logs become available and are added to the category group. Note that this may incur additionally charges. The audit resource log category group allows you to select the resource logs that are necessary for auditing your resource. For more information, see [Diagnostic settings in Azure Monitor: Resource logs](../azure-monitor/essentials/diagnostic-settings.md?tabs=portal#resource-logs).
46+
47+
For the detailed process for creating a diagnostic setting using the Azure portal, CLI, or PowerShell. When you create a diagnostic setting, you specify which categories of logs to collect, see [Create diagnostic setting to collect platform logs and metrics in Azure](../azure-monitor/essentials/diagnostic-settings.md).
4648

4749
The metrics and logs you can collect are discussed in the following sections.
4850

articles/data-factory/concepts-change-data-capture-resource.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: data-factory
99
ms.subservice: data-movement
1010
ms.custom:
1111
ms.topic: conceptual
12-
ms.date: 08/08/2023
12+
ms.date: 08/18/2023
1313
---
1414

1515
# Change data capture resource overview
@@ -51,6 +51,7 @@ The new Change Data Capture resource in ADF allows for full fidelity change data
5151
* JSON
5252
* ORC
5353
* Parquet
54+
* Azure Synapse Analytics
5455

5556
## Known limitations
5657
* Currently, when creating source/target mappings, each source and target is only allowed to be used once.
@@ -59,8 +60,16 @@ The new Change Data Capture resource in ADF allows for full fidelity change data
5960

6061
For more information on known limitations and troubleshooting assistance, please reference [this troubleshooting guide](change-data-capture-troubleshoot.md).
6162

63+
## Azure Synapse Analytics as Target
64+
When using Azure Synapse Analytics as target, the **Staging Settings** is available on the main table canvas. Enabling staging is mandatory when selecting Azure Synapse Analytics as the target. This significantly enhances write performance by utilizing performant bulk loading capability such as COPY INTO command. **Staging Settings** can be configured in two ways: utilizing **Factory settings** or opting for a **Custom settings**. **Factory settings** apply at the factory level. For the first time, if these settings aren't configured, you'll be directed to the global staging setting section for configuration. Once set, all CDC top-level resources will adopt this configuration. **Custom settings** is scoped only for the CDC resource for which it is configured and overrides the **Factory settings**.
65+
66+
> [!NOTE]
67+
> As we utilize the COPY INTO command to transfer data from the staging location to Azure Synapse Analytics, it is advisable to ensure that all required permissions are pre-configured within Azure Synapse Analytics.
68+
69+
6270
> [!NOTE]
6371
> We always use the last published configuration when starting a CDC. For running CDCs, while your data is being processed, you will be billed 4 v-cores of General Purpose Data Flows.
6472
6573
## Next steps
6674
- [Learn how to set up a change data capture resource](how-to-change-data-capture-resource.md).
75+
- [Learn how to set up a change data capture resource with schema evolution](how-to-change-data-capture-resource-with-schema-evolution.md).

articles/defender-for-cloud/multi-factor-authentication-enforcement.md

Lines changed: 17 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Security recommendations for multi-factor authentication
33
description: Learn how to enforce multi-factor authentication for your Azure subscriptions using Microsoft Defender for Cloud
44
ms.topic: conceptual
5-
ms.date: 06/28/2023
5+
ms.date: 08/14/2023
66
---
77

8-
# Manage multi-factor authentication (MFA) enforcement on your subscriptions
8+
# Manage multi-factor authentication (MFA) on your subscriptions
99

10-
If you're using passwords, only to authenticate your users, you're leaving an attack vector open. Users often use weak passwords or reuse them for multiple services. With [MFA](https://www.microsoft.com/security/business/identity/mfa) enabled, your accounts are more secure, and users can still authenticate to almost any application with single sign-on (SSO).
10+
If you're using passwords only to authenticate your users, you're leaving an attack vector open. Users often use weak passwords or reuse them for multiple services. With [MFA](https://www.microsoft.com/security/business/identity/mfa) enabled, your accounts are more secure, and users can still authenticate to almost any application with single sign-on (SSO).
1111

12-
There are multiple ways to enable MFA for your Azure Active Directory (AD) users based on the licenses that your organization owns. This page provides the details for each in the context of Microsoft Defender for Cloud.
12+
There are multiple ways to enable MFA for your Azure Active Directory (Azure AD) users based on the licenses that your organization owns. This page provides the details for each in the context of Microsoft Defender for Cloud.
1313

1414
## MFA and Microsoft Defender for Cloud
1515

@@ -21,7 +21,7 @@ The recommendations in the Enable MFA control ensure you're meeting the recommen
2121
- Accounts with write permissions on Azure resources should be MFA enabled
2222
- Accounts with read permissions on Azure resources should be MFA enabled
2323

24-
There are three ways to enable MFA and be compliant with the two recommendations in Defender for Cloud: security defaults, per-user assignment, conditional access (CA) policy.
24+
There are three ways to enable MFA and be compliant with the two recommendations in Defender for Cloud: security defaults, per-user assignment, and conditional access (CA) policy.
2525

2626
### Free option - security defaults
2727

@@ -33,7 +33,7 @@ Customers with Microsoft 365 can use **Per-user assignment**. In this scenario,
3333

3434
### MFA for Azure AD Premium customers
3535

36-
For an improved user experience, upgrade to Azure AD Premium P1 or P2 for **conditional access (CA) policy** options. To configure a CA policy, you'll need [Azure Active Directory (AD) tenant permissions](../active-directory/roles/permissions-reference.md).
36+
For an improved user experience, upgrade to Azure AD Premium P1 or P2 for **conditional access (CA) policy** options. To configure a CA policy, you need [Azure Active Directory (Azure AD) tenant permissions](../active-directory/roles/permissions-reference.md).
3737

3838
Your CA policy must:
3939

@@ -51,7 +51,7 @@ Learn more in the [Azure Conditional Access documentation](../active-directory/c
5151

5252
## Identify accounts without multi-factor authentication (MFA) enabled
5353

54-
You can view the list of user accounts without MFA enabled from either the Defender for Cloud recommendations details page, or using Azure Resource Graph.
54+
You can view the list of user accounts without MFA enabled from either the Defender for Cloud recommendations details page, or by using the Azure Resource Graph.
5555

5656
### View the accounts without MFA enabled in the Azure portal
5757

@@ -63,24 +63,26 @@ To see which accounts don't have MFA enabled, use the following Azure Resource G
6363

6464
1. Open **Azure Resource Graph Explorer**.
6565

66-
:::image type="content" source="./media/multi-factor-authentication-enforcement/opening-resource-graph-explorer.png" alt-text="Launching Azure Resource Graph Explorer** recommendation page" :::
66+
:::image type="content" source="./media/multi-factor-authentication-enforcement/opening-resource-graph-explorer.png" alt-text="Screenshot showing launching the Azure Resource Graph Explorer** recommendation page" lightbox="media/multi-factor-authentication-enforcement/opening-resource-graph-explorer.png":::
6767

6868
1. Enter the following query and select **Run query**.
6969

70-
```kusto
70+
```
7171
securityresources
72-
| where type == "microsoft.security/assessments"
73-
| where properties.displayName contains "Accounts with owner permissions on Azure resources should be MFA enabled"
74-
| where properties.status.code == "Unhealthy"
72+
| where type =~ "microsoft.security/assessments/subassessments"
73+
| where id has "assessments/dabc9bc4-b8a8-45bd-9a5a-43000df8aa1c" or id has "assessments/c0cb17b2-0607-48a7-b0e0-903ed22de39b" or id has "assessments/6240402e-f77c-46fa-9060-a7ce53997754"
74+
| parse id with start "/assessments/" assessmentId "/subassessments/" userObjectId
75+
| summarize make_list(userObjectId) by strcat(tostring(properties.displayName), " (", assessmentId, ")")
76+
| project ["Recommendation Name"] = Column1 , ["Account ObjectIDs"] = list_userObjectId
7577
```
7678
7779
1. The `additionalData` property reveals the list of account object IDs for accounts that don't have MFA enforced.
7880
7981
> [!NOTE]
80-
> The accounts are shown as object IDs rather than account names to protect the privacy of the account holders.
82+
> The 'Account ObjectIDs' column contains the list of account object IDs for accounts that don't have MFA enforced per recommendation.
8183
82-
> [!TIP]
83-
> Alternatively, you can use the Defender for Cloud REST API method [Assessments - Get](/rest/api/defenderforcloud/assessments/get).
84+
> [!TIP]
85+
> Alternatively, you can use the Defender for Cloud REST API method [Assessments - Get](/rest/api/defenderforcloud/assessments/get).
8486
8587
## Next steps
8688

articles/defender-for-cloud/plan-multicloud-security-determine-multicloud-dependencies.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -37,15 +37,16 @@ In Defender for Cloud, you enable specific plans to get Cloud Workload Platform
3737
- [Defender for Containers](./defender-for-containers-introduction.md): Help secure your Kubernetes clusters with security recommendations and hardening, vulnerability assessments, and runtime protection.
3838
- [Defender for SQL](./defender-for-sql-usage.md): Protect SQL databases running in AWS and GCP.
3939

40-
### What agent do I need?
40+
### What extension do I need?
4141

42-
The following table summarizes agent requirements for CWPP.
42+
The following table summarizes extension requirements for CWPP.
4343

44-
| Agent |Defender for Servers|Defender for Containers|Defender fo SQL on Machines|
44+
| Extension |Defender for Servers|Defender for Containers|Defender for SQL on Machines|
4545
|:---:|:---:|:---:|:---:|
4646
|Azure Arc Agent ||||
47-
|Microsoft Defender for Endpoint extension ||
48-
|Vulnerability assessment|| |
47+
|Microsoft Defender for Endpoint extension ||||
48+
|Vulnerability assessment|| ||
49+
|Agentless Disk Scanning||||
4950
|Log Analytics or Azure Monitor Agent (preview) extension|| ||
5051
|Defender agent| || |
5152
|Azure Policy for Kubernetes | || |
@@ -78,14 +79,14 @@ The following components and requirements are needed to receive full protection
7879

7980
- **Azure Arc agent**: AWS and GCP machines connect to Azure using Azure Arc. The Azure Arc agent connects them.
8081
- The Azure Arc agent is needed to read security information on the host level and allow Defender for Cloud to deploy the agents/extensions required for complete protection.
81-
To auto-provision the Azure Arc agent, the OS configuration agent on [GCP VM instances](./quickstart-onboard-gcp.md?pivots=env-settings) and the AWS Systems Manager (SSM) agent for [AWS EC2 instances](./quickstart-onboard-aws.md?pivots=env-settings) must be configured. [Learn more](../azure-arc/servers/agent-overview.md) about the agent.
82+
To autoprovision the Azure Arc agent, the OS configuration agent on [GCP VM instances](./quickstart-onboard-gcp.md?pivots=env-settings) and the AWS Systems Manager (SSM) agent for [AWS EC2 instances](./quickstart-onboard-aws.md?pivots=env-settings) must be configured. [Learn more](../azure-arc/servers/agent-overview.md) about the agent.
8283
- **Defender for Endpoint capabilities**: The [Microsoft Defender for Endpoint](./integration-defender-for-endpoint.md?tabs=linux) agent provides comprehensive endpoint detection and response (EDR) capabilities.
8384
- **Vulnerability assessment**: Using either the integrated [Qualys vulnerability scanner](./deploy-vulnerability-assessment-vm.md), or the [Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management) solution.
8485
- **Log Analytics agent/[Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) (AMA) (in preview)**: Collects security-related configuration information and event logs from machines.
8586

8687
#### Check networking requirements
8788

88-
Machines must meet [network requirements](../azure-arc/servers/network-requirements.md?tabs=azure-cloud) before onboarding the agents. Auto-provisioning is enabled by default.
89+
Machines must meet [network requirements](../azure-arc/servers/network-requirements.md?tabs=azure-cloud) before onboarding the agents. Autoprovisioning is enabled by default.
8990

9091
### Defender for Containers
9192

@@ -119,7 +120,7 @@ To receive the full benefits of Defender for SQL on your multicloud workload, yo
119120

120121
- **Azure Arc agent**: AWS and GCP machines connect to Azure using Azure Arc. The Azure Arc agent connects them.
121122
- The Azure Arc agent is needed to read security information on the host level and allow Defender for Cloud to deploy the agents/extensions required for complete protection.
122-
- To auto-provision the Azure Arc agent, the OS configuration agent on [GCP VM instances](./quickstart-onboard-gcp.md?pivots=env-settings) and the AWS Systems Manager (SSM) agent for [AWS EC2 instances](./quickstart-onboard-aws.md?pivots=env-settings) must be configured. [Learn more](../azure-arc/servers/agent-overview.md) about the agent.
123+
- To autoprovision the Azure Arc agent, the OS configuration agent on [GCP VM instances](./quickstart-onboard-gcp.md?pivots=env-settings) and the AWS Systems Manager (SSM) agent for [AWS EC2 instances](./quickstart-onboard-aws.md?pivots=env-settings) must be configured. [Learn more](../azure-arc/servers/agent-overview.md) about the agent.
123124
- **Log Analytics agent/[Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) (AMA) (in preview)**: Collects security-related configuration information and event logs from machines
124125
- **Automatic SQL server discovery and registration**: Supports automatic discovery and registration of SQL servers
125126

0 commit comments

Comments
 (0)