You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ai-services/speech-service/how-to-custom-speech-test-and-train.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,6 +35,7 @@ The following table lists accepted data types, when each data type should be use
35
35
|[Plain text](#plain-text-data-for-training)| No | Not applicable | Yes | 1-200 MB of related text |
36
36
|[Structured text](#structured-text-data-for-training)| No | Not applicable | Yes | Up to 10 classes with up to 4,000 items and up to 50,000 training sentences |
37
37
|[Pronunciation](#pronunciation-data-for-training)| No | Not applicable | Yes | 1 KB to 1 MB of pronunciation text |
38
+
|[Display format](#custom-display-text-formatting-data-for-training)| No | Not applicable | Yes | Up to 200 lines for ITN, 1,000 lines for rewrite, 1,000 lines for profanity filter |
38
39
39
40
Training with plain text or structured text usually finishes within a few minutes.
Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/azure-monitor-data-explorer-proxy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -165,6 +165,7 @@ To create a new alert rule based on a cross-service query, follow the steps in [
165
165
* Cross-service queries support data retrieval only.
166
166
*[Private Link](../logs/private-link-security.md) (private endpoints) and [IP restrictions](/azure/data-explorer/security-network-restrict-public-access) do not support cross-service queries.
167
167
*`mv-expand` is limited to 2000 records.
168
+
* Queries of [external tables in Azure Data Explorer](/azure/data-explorer/external-table.md) are only supported if wrapped in a parameter-less function.
| Required / preferred environmental requirements | Defender CSPM <br> These capabilities are included in the Defender CSPM plan and don't require an additional license. |
| Clouds | :::image type="icon" source="./media/icons/yes-icon.png"::: Azure, AWS and GCP commercial clouds <br> :::image type="icon" source="./media/icons/no-icon.png"::: Nation/Sovereign (US Gov, China Gov, Other Gov) |
31
31
32
32
## Enable Permissions Management for Azure
@@ -71,9 +71,9 @@ Follow these steps to [connect your AWS account to Defender for Cloud](quickstar
71
71
72
72
:::image type="content" source="media/enable-permissions-management/enable-permissions-management-aws.png" alt-text="Screenshot of how to enable permissions management plan for AWS." lightbox="media/enable-permissions-management/enable-permissions-management-aws.png":::
73
73
74
-
1. Select **Configure access**, and then choose the appropriate **Permissions** type. Choose the deployment method: **'AWS CloudFormation' \ 'Terraform' script**.
74
+
1. Select **Configure access**, and then choose the appropriate **Permissions** type. Choose the deployment method: **'AWS CloudFormation' / 'Terraform' script**.
75
75
1. The deployment template is autofilled with default role ARN names. You can customize the role names by selecting the hyperlink.
76
-
1. Run the updated CFT \ terraform script on your AWS environment.
76
+
1. Run the updated CFT / terraform script on your AWS environment.
77
77
1. Select **Save**.
78
78
1. After a few seconds, you'll notice that the new **AWS CSPM (Preview)** standard is assigned on your security connector.
79
79
@@ -104,7 +104,7 @@ Follow these steps to [connect your GCP account](quickstart-onboard-gcp.md) to M
104
104
1. Enable the Defender CSPM plan. If the plan is already enabled, select **Settings** and turn on the Permissions Management feature.
105
105
106
106
1. Follow the wizard instructions to enable the plan with the new Permissions Management capabilities.
107
-
1. Run the updated CFT \ terraform script on your GCP environment.
107
+
1. Run the updated CFT / terraform script on your GCP environment.
108
108
1. Select **Save**.
109
109
1. After a few seconds, you'll notice that the new **GCP CSPM (Preview)** standard is assigned on your security connector.
0 commit comments