Skip to content

Commit cefdb2e

Browse files
authored
Merge pull request #250899 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents d6c1b01 + 15c658d commit cefdb2e

File tree

6 files changed

+302
-203
lines changed

6 files changed

+302
-203
lines changed

articles/active-directory-b2c/add-ropc-policy.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,9 @@ zone_pivot_groups: b2c-policy-type
2222

2323
In Azure Active Directory B2C (Azure AD B2C), the resource owner password credentials (ROPC) flow is an OAuth standard authentication flow. In this flow, an application, also known as the relying party, exchanges valid credentials for tokens. The credentials include a user ID and password. The tokens returned are an ID token, access token, and a refresh token.
2424

25+
> [!WARNING]
26+
> We recommend that you _don't_ use the ROPC flow. In most scenarios, more secure alternatives are available and recommended. This flow requires a very high degree of trust in the application and carries risks that aren't present in other flows. You should only use this flow when other more secure flows aren't viable.
27+
2528
## ROPC flow notes
2629

2730
In Azure Active Directory B2C (Azure AD B2C), the following options are supported:

articles/active-directory/cloud-infrastructure-entitlement-management/product-rule-based-anomalies.md

Lines changed: 20 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Create and view rule-based anomalies and anomaly triggers in Permissions Management
3-
description: How to create and view rule-based anomalies and anomaly triggers in Permissions Management.
2+
title: Create and view rule-based anomaly alerts and alert triggers in Permissions Management
3+
description: How to create and view rule-based anomaly alerts and alert triggers in Permissions Management.
44
services: active-directory
55
author: jenniferf-skc
66
manager: amycolannino
@@ -12,13 +12,20 @@ ms.date: 02/23/2022
1212
ms.author: jfields
1313
---
1414

15-
# Create and view rule-based anomaly alerts and anomaly triggers
15+
# Create and view rule-based anomaly alerts and alert triggers
1616

17-
Rule-based anomalies identify recent activity in Permissions Management that is determined to be unusual based on explicit rules defined in the activity trigger. The goal of rule-based anomaly is high precision detection.
17+
Rule-based anomalies identify recent activity in Permissions Management that is determined to be unusual based on explicit rules defined in the alert trigger. The goal of rule-based anomaly alerts is high-precision detection.
18+
19+
You can configure rule-based anomaly alert triggers for the following conditions:
20+
- **Any Resource Accessed for the First Time**: The identity accesses a resource for the first time during the specified time interval.
21+
- **Identity Performs a Particular Task for the First Time**: The identity does a specific task for the first time during the specified time interval.
22+
- **Identity Performs a Task for the First Time**: The identity performs any task for the first time during the specified time interval.
23+
24+
Alert triggers are based on data collected. All alerts, if triggered, are shown every hour under the Alerts subtab.
1825

1926
## View rule-based anomaly alerts
2027

21-
1. In the Permissions Management home page, select **Activity triggers** (the bell icon).
28+
1. In the Permissions Management home page, select **Alerts** (the bell icon).
2229
1. Select **Rule-Based Anomaly**, and then select the **Alerts** subtab.
2330

2431
The **Alerts** subtab displays the following information:
@@ -49,11 +56,11 @@ Rule-based anomalies identify recent activity in Permissions Management that is
4956
- **Details**: Displays details about **Authorization System Type**, **Authorization Systems**, **Resources**, **Tasks**, **Identities**, and **Activity**
5057
- **Activity**: Displays details about the **Identity Name**, **Resource Name**, **Task Name**, **Date/Time**, **Inactive For**, and **IP Address**. Selecting the "eye" icon displays the **Raw Events Summary**
5158

52-
## Create a rule-based anomaly trigger
59+
## Create a rule-based anomaly alert trigger
5360

54-
1. In the Permissions Management home page, select **Activity triggers** (the bell icon).
61+
1. In the Permissions Management home page, select **Alerts** (the bell icon).
5562
1. Select **Rule-Based Anomaly**, and then select the **Alerts** subtab.
56-
1. Select **Create Anomaly Trigger**.
63+
1. Select **Create Alert Trigger**.
5764

5865
1. In the **Alert Name** box, enter a name for the alert.
5966
1. Select the **Authorization System**, **AWS**, **Azure**, or **GCP**.
@@ -72,9 +79,9 @@ Rule-based anomalies identify recent activity in Permissions Management that is
7279
1. On the **Configuration** tab, to update the **Time Interval**, select **90 Days**, **60 Days**, or **30 Days** from the **Time range** dropdown.
7380
1. Select **Save**.
7481

75-
## View a rule-based anomaly trigger
82+
## View a rule-based anomaly alert trigger
7683

77-
1. In the Permissions Management home page, select **Activity triggers** (the bell icon).
84+
1. In the Permissions Management home page, select **Alerts** (the bell icon).
7885
1. Select **Rule-Based Anomaly**, and then select the **Alert Triggers** subtab.
7986

8087
The **Alert Triggers** subtab displays the following information:
@@ -113,7 +120,7 @@ Rule-based anomalies identify recent activity in Permissions Management that is
113120

114121
## Next steps
115122

116-
- For an overview on activity triggers, see [View information about activity triggers](ui-triggers.md).
123+
- For an overview on alerts and alert triggers, see [View information about alerts and alert triggers](ui-triggers.md).
117124
- For information on activity alerts and alert triggers, see [Create and view activity alerts and alert triggers](how-to-create-alert-trigger.md).
118-
- For information on finding outliers in identity's behavior, see [Create and view statistical anomalies and anomaly triggers](product-statistical-anomalies.md).
119-
- For information on permission analytics triggers, see [Create and view permission analytics triggers](product-permission-analytics.md).
125+
- For information on finding outliers in identity's behavior, see [Create and view statistical anomaly alerts and alert triggers](product-statistical-anomalies.md).
126+
- For information on permission analytics alerts and alert triggers, see [Create and view permission analytics alerts and alert triggers](product-permission-analytics.md).

articles/azure-monitor/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ For detailed information about data collection, see [data collection](./best-pra
118118

119119
## Data platform
120120

121-
Azure Monitor stores data in data stores for each of the three pillars of observability, plus an addition one:
121+
Azure Monitor stores data in data stores for each of the three pillars of observability, plus an additional one:
122122
- metrics
123123
- logs
124124
- distributed traces

articles/defender-for-cloud/agentless-container-registry-vulnerability-assessment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ A detailed description of the scan process is described as follows:
6969
- For customers using either [agentless discovery and visibility within Kubernetes components](concept-agentless-containers.md) or [inventory collected via the Defender agent running on AKS nodes](defender-for-containers-enable.md#deploy-the-defender-agent), Defender for Cloud also creates a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/ContainersRuntimeRecommendationDetailsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5) for remediating vulnerabilities for vulnerable images running on an AKS cluster.
7070

7171
> [!NOTE]
72-
> For Defender for Container Registries (deprecated), images are scanned once on push, on pull, and rescanned only once a week.
72+
> For [Defender for Container Registries (deprecated)](defender-for-container-registries-introduction.md), images are scanned once on push, on pull, and rescanned only once a week.
7373
7474
## If I remove an image from my registry, how long before vulnerabilities reports on that image would be removed?
7575

articles/postgresql/flexible-server/concepts-backup-restore.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -110,9 +110,7 @@ For latest and custom restore point options, the estimated time to recover depen
110110
If you've configured your server within a virtual network, you can restore to the same virtual network or to a different virtual network. However, you can't restore to public access. Similarly, if you configured your server with public access, you can't restore to private virtual network access.
111111

112112
> [!IMPORTANT]
113-
> A user can't restore deleted servers. If you delete a server, all databases that belong to the server are also deleted and can't be recovered. To help protect server resources from accidental deletion or unexpected changes after deployment, administrators can use [management locks](../../azure-resource-manager/management/lock-resources.md).
114-
>
115-
>If you accidentally deleted your server, please reach out to support. In some cases, your server might be restored with or without data loss.
113+
> Deleted servers can be restored. If you delete the server, you can follow our guidance [Restore a dropped Azure Database for PostgreSQL Flexible server](how-to-restore-dropped-server.md) to recover. Use Azure resource lock to help prevent accidental deletion of your server.
116114
117115

118116
## Geo-redundant backup and restore

0 commit comments

Comments
 (0)