You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In Azure Active Directory B2C (Azure AD B2C), the resource owner password credentials (ROPC) flow is an OAuth standard authentication flow. In this flow, an application, also known as the relying party, exchanges valid credentials for tokens. The credentials include a user ID and password. The tokens returned are an ID token, access token, and a refresh token.
24
24
25
+
> [!WARNING]
26
+
> We recommend that you _don't_ use the ROPC flow. In most scenarios, more secure alternatives are available and recommended. This flow requires a very high degree of trust in the application and carries risks that aren't present in other flows. You should only use this flow when other more secure flows aren't viable.
27
+
25
28
## ROPC flow notes
26
29
27
30
In Azure Active Directory B2C (Azure AD B2C), the following options are supported:
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/product-rule-based-anomalies.md
+20-13Lines changed: 20 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Create and view rule-based anomalies and anomaly triggers in Permissions Management
3
-
description: How to create and view rule-based anomalies and anomaly triggers in Permissions Management.
2
+
title: Create and view rule-based anomaly alerts and alert triggers in Permissions Management
3
+
description: How to create and view rule-based anomaly alerts and alert triggers in Permissions Management.
4
4
services: active-directory
5
5
author: jenniferf-skc
6
6
manager: amycolannino
@@ -12,13 +12,20 @@ ms.date: 02/23/2022
12
12
ms.author: jfields
13
13
---
14
14
15
-
# Create and view rule-based anomaly alerts and anomaly triggers
15
+
# Create and view rule-based anomaly alerts and alert triggers
16
16
17
-
Rule-based anomalies identify recent activity in Permissions Management that is determined to be unusual based on explicit rules defined in the activity trigger. The goal of rule-based anomaly is high precision detection.
17
+
Rule-based anomalies identify recent activity in Permissions Management that is determined to be unusual based on explicit rules defined in the alert trigger. The goal of rule-based anomaly alerts is high-precision detection.
18
+
19
+
You can configure rule-based anomaly alert triggers for the following conditions:
20
+
-**Any Resource Accessed for the First Time**: The identity accesses a resource for the first time during the specified time interval.
21
+
-**Identity Performs a Particular Task for the First Time**: The identity does a specific task for the first time during the specified time interval.
22
+
-**Identity Performs a Task for the First Time**: The identity performs any task for the first time during the specified time interval.
23
+
24
+
Alert triggers are based on data collected. All alerts, if triggered, are shown every hour under the Alerts subtab.
18
25
19
26
## View rule-based anomaly alerts
20
27
21
-
1. In the Permissions Management home page, select **Activity triggers** (the bell icon).
28
+
1. In the Permissions Management home page, select **Alerts** (the bell icon).
22
29
1. Select **Rule-Based Anomaly**, and then select the **Alerts** subtab.
23
30
24
31
The **Alerts** subtab displays the following information:
@@ -49,11 +56,11 @@ Rule-based anomalies identify recent activity in Permissions Management that is
49
56
-**Details**: Displays details about **Authorization System Type**, **Authorization Systems**, **Resources**, **Tasks**, **Identities**, and **Activity**
50
57
-**Activity**: Displays details about the **Identity Name**, **Resource Name**, **Task Name**, **Date/Time**, **Inactive For**, and **IP Address**. Selecting the "eye" icon displays the **Raw Events Summary**
51
58
52
-
## Create a rule-based anomaly trigger
59
+
## Create a rule-based anomaly alert trigger
53
60
54
-
1. In the Permissions Management home page, select **Activity triggers** (the bell icon).
61
+
1. In the Permissions Management home page, select **Alerts** (the bell icon).
55
62
1. Select **Rule-Based Anomaly**, and then select the **Alerts** subtab.
56
-
1. Select **Create Anomaly Trigger**.
63
+
1. Select **Create Alert Trigger**.
57
64
58
65
1. In the **Alert Name** box, enter a name for the alert.
59
66
1. Select the **Authorization System**, **AWS**, **Azure**, or **GCP**.
@@ -72,9 +79,9 @@ Rule-based anomalies identify recent activity in Permissions Management that is
72
79
1. On the **Configuration** tab, to update the **Time Interval**, select **90 Days**, **60 Days**, or **30 Days** from the **Time range** dropdown.
73
80
1. Select **Save**.
74
81
75
-
## View a rule-based anomaly trigger
82
+
## View a rule-based anomaly alert trigger
76
83
77
-
1. In the Permissions Management home page, select **Activity triggers** (the bell icon).
84
+
1. In the Permissions Management home page, select **Alerts** (the bell icon).
78
85
1. Select **Rule-Based Anomaly**, and then select the **Alert Triggers** subtab.
79
86
80
87
The **Alert Triggers** subtab displays the following information:
@@ -113,7 +120,7 @@ Rule-based anomalies identify recent activity in Permissions Management that is
113
120
114
121
## Next steps
115
122
116
-
- For an overview on activity triggers, see [View information about activity triggers](ui-triggers.md).
123
+
- For an overview on alerts and alert triggers, see [View information about alerts and alert triggers](ui-triggers.md).
117
124
- For information on activity alerts and alert triggers, see [Create and view activity alerts and alert triggers](how-to-create-alert-trigger.md).
118
-
- For information on finding outliers in identity's behavior, see [Create and view statistical anomalies and anomaly triggers](product-statistical-anomalies.md).
119
-
- For information on permission analytics triggers, see [Create and view permission analytics triggers](product-permission-analytics.md).
125
+
- For information on finding outliers in identity's behavior, see [Create and view statistical anomaly alerts and alert triggers](product-statistical-anomalies.md).
126
+
- For information on permission analytics alerts and alert triggers, see [Create and view permission analytics alerts and alert triggers](product-permission-analytics.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/agentless-container-registry-vulnerability-assessment.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,7 +69,7 @@ A detailed description of the scan process is described as follows:
69
69
- For customers using either [agentless discovery and visibility within Kubernetes components](concept-agentless-containers.md) or [inventory collected via the Defender agent running on AKS nodes](defender-for-containers-enable.md#deploy-the-defender-agent), Defender for Cloud also creates a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/ContainersRuntimeRecommendationDetailsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5) for remediating vulnerabilities for vulnerable images running on an AKS cluster.
70
70
71
71
> [!NOTE]
72
-
> For Defender for Container Registries (deprecated), images are scanned once on push, on pull, and rescanned only once a week.
72
+
> For [Defender for Container Registries (deprecated)](defender-for-container-registries-introduction.md), images are scanned once on push, on pull, and rescanned only once a week.
73
73
74
74
## If I remove an image from my registry, how long before vulnerabilities reports on that image would be removed?
Copy file name to clipboardExpand all lines: articles/postgresql/flexible-server/concepts-backup-restore.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -110,9 +110,7 @@ For latest and custom restore point options, the estimated time to recover depen
110
110
If you've configured your server within a virtual network, you can restore to the same virtual network or to a different virtual network. However, you can't restore to public access. Similarly, if you configured your server with public access, you can't restore to private virtual network access.
111
111
112
112
> [!IMPORTANT]
113
-
> A user can't restore deleted servers. If you delete a server, all databases that belong to the server are also deleted and can't be recovered. To help protect server resources from accidental deletion or unexpected changes after deployment, administrators can use [management locks](../../azure-resource-manager/management/lock-resources.md).
114
-
>
115
-
>If you accidentally deleted your server, please reach out to support. In some cases, your server might be restored with or without data loss.
113
+
> Deleted servers can be restored. If you delete the server, you can follow our guidance [Restore a dropped Azure Database for PostgreSQL Flexible server](how-to-restore-dropped-server.md) to recover. Use Azure resource lock to help prevent accidental deletion of your server.
0 commit comments