Skip to content

Commit d58b726

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into WI198244-security-data
2 parents 0d1868d + f833ac6 commit d58b726

10 files changed

+47
-19
lines changed

articles/azure-functions/start-stop-vms/deploy.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,7 @@ For each scenario, you can target the action against one or more subscriptions,
208208
```json
209209
{
210210
"Action": "start",
211-
"EnableClassic": true,
211+
"EnableClassic": false,
212212
"RequestScopes": {
213213
"ExcludedVMLists": [],
214214
"VMLists": [
@@ -290,7 +290,7 @@ In an environment that includes two or more components on multiple Azure Resourc
290290
```json
291291
{
292292
"Action": "start",
293-
"EnableClassic": true,
293+
"EnableClassic": false,
294294
"RequestScopes": {
295295
"ExcludedVMLists": [],
296296
"VMLists": [
@@ -366,7 +366,7 @@ To learn more about how Azure Monitor metric alerts work and how to configure th
366366
"AutoStop_Threshold": "5",
367367
"AutoStop_TimeAggregationOperator": "Average",
368368
"AutoStop_TimeWindow": "06:00:00",
369-
"EnableClassic": true,
369+
"EnableClassic": false,
370370
"RequestScopes": {
371371
"ExcludedVMLists": [],
372372
"ResourceGroups": [
@@ -391,7 +391,7 @@ To learn more about how Azure Monitor metric alerts work and how to configure th
391391
"AutoStop_Threshold": "5",
392392
"AutoStop_TimeAggregationOperator": "Average",
393393
"AutoStop_TimeWindow": "06:00:00",
394-
"EnableClassic": true,
394+
"EnableClassic": false,
395395
"RequestScopes": {
396396
"ExcludedVMLists": [],
397397
"VMLists": [

articles/azure-monitor/app/javascript-sdk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ If you want to use the extra features provided by plugins for specific framework
142142

143143
- [React plugin](javascript-framework-extensions.md?tabs=react)
144144
- [React native plugin](javascript-framework-extensions.md?tabs=reactnative)
145-
- [Angular plugin](javascript-framework-extensions.md?tabs=reactnative)
145+
- [Angular plugin](javascript-framework-extensions.md?tabs=angular)
146146

147147
### Confirm data is flowing
148148

articles/azure-monitor/logs/basic-logs-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ All custom tables created with or migrated to the [data collection rule (DCR)-ba
186186
| Application Gateways | [AGWAccessLogs](/azure/azure-monitor/reference/tables/AGWAccessLogs)<br>[AGWPerformanceLogs](/azure/azure-monitor/reference/tables/AGWPerformanceLogs)<br>[AGWFirewallLogs](/azure/azure-monitor/reference/tables/AGWFirewallLogs) |
187187
| Application Gateway for Containers | [AGCAccessLogs](/azure/azure-monitor/reference/tables/AGCAccessLogs) |
188188
| Application Insights | [AppTraces](/azure/azure-monitor/reference/tables/apptraces) |
189-
| Bare Metal Machines | [NCBMSecurityDefenderLogs](/azure/azure-monitor/reference/tables/ncbmsecuritydefenderlogs)<br>[NCBMSystemLogs](/azure/azure-monitor/reference/tables/NCBMSystemLogs)<br>[NCBMSecurityLogs](/azure/azure-monitor/reference/tables/NCBMSecurityLogs) |
189+
| Bare Metal Machines | [NCBMSecurityDefenderLogs](/azure/azure-monitor/reference/tables/ncbmsecuritydefenderlogs)<br>[NCBMSystemLogs](/azure/azure-monitor/reference/tables/NCBMSystemLogs)<br>[NCBMSecurityLogs](/azure/azure-monitor/reference/tables/NCBMSecurityLogs) <br>[NCBMBreakGlassAuditLogs](/azure/azure-monitor/reference/tables/ncbmbreakglassauditlogs)|
190190
| Chaos Experiments | [ChaosStudioExperimentEventLogs](/azure/azure-monitor/reference/tables/ChaosStudioExperimentEventLogs) |
191191
| Cloud HSM | [CHSMManagementAuditLogs](/azure/azure-monitor/reference/tables/CHSMManagementAuditLogs) |
192192
| Container Apps | [ContainerAppConsoleLogs](/azure/azure-monitor/reference/tables/containerappconsoleLogs) |

articles/backup/backup-azure-database-postgresql-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: About Azure Database for PostgreSQL backup
33
description: An overview on Azure Database for PostgreSQL backup
44
ms.topic: conceptual
5-
ms.date: 01/24/2022
5+
ms.date: 02/09/2024
66
ms.service: backup
77
author: AbhishekMallick-MS
88
ms.author: v-abhmallick

articles/backup/backup-azure-database-postgresql-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Troubleshoot Azure Database for PostgreSQL backup
33
description: Troubleshooting information for backing up Azure Database for PostgreSQL.
44
ms.topic: troubleshooting
5-
ms.date: 06/07/2022
5+
ms.date: 02/09/2024
66
ms.service: backup
77
author: AbhishekMallick-MS
88
ms.author: v-abhmallick

articles/defender-for-cloud/concept-cloud-security-posture-management.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Cloud Security Posture Management (CSPM)
33
description: Learn more about CSPM in Microsoft Defender for Cloud.
44
ms.topic: conceptual
55
ms.custom: build-2023
6-
ms.date: 01/02/2024
6+
ms.date: 02/11/2024
77
---
88

99
# Cloud security posture management (CSPM)
@@ -64,8 +64,6 @@ You can choose which ticketing system to integrate. For preview, only ServiceNow
6464

6565
- Review the [Defender for Cloud pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/) to learn about Defender CSPM pricing.
6666

67-
- Defender CSPM for GCP is free until January 31, 2024.
68-
6967
- From March 7, 2024, advanced DevOps security posture capabilities will only be available through the paid Defender CSPM plan. Free foundational security posture management in Defender for Cloud will continue providing a number of Azure DevOps recommendations. Learn more about [DevOps security features](devops-support.md#azure-devops).
7068

7169
- For subscriptions that use both Defender CSPM and Defender for Containers plans, free vulnerability assessment is calculated based on free image scans provided via the Defender for Containers plan, as summarized [in the Microsoft Defender for Cloud pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/).

articles/defender-for-cloud/overview-page.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,6 @@ The **Insights** pane offers customized items for your environment including:
4444
## Next steps
4545

4646
- [Learn more](concept-cloud-security-posture-management.md) about cloud security posture management.
47-
- [Learn more](security-policy-concept.md) about security standards and
47+
- [Learn more](security-policy-concept.md) about security standards and recommendations
4848
- [Review your asset inventory](asset-inventory.md)
4949

articles/sentinel/connect-logstash-data-connection-rules.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -392,6 +392,7 @@ After you retrieve the required values:
392392

393393
|Field |Description |Default value |
394394
|---------|---------|---------|
395+
|`azure_cloud` |Used to specify the name of the Azure cloud that is being used, Available values are: `AzureCloud`, `AzureChinaCloud`, and `AzureUSGovernment`. | `AzureCloud` |
395396
|`key_names` |An array of strings. Provide this field if you want to send a subset of the columns to Log Analytics. |None (field is empty) |
396397
|`plugin_flush_interval` |Defines the maximal time difference (in seconds) between sending two messages to Log Analytics. |`5` |
397398
|`retransmission_time` |Sets the amount of time in seconds for retransmitting messages once sending failed. |`10` |
@@ -444,6 +445,29 @@ To monitor the connectivity and activity of the Microsoft Sentinel output plugin
444445

445446
If you are not seeing any data in this log file, generate and send some events locally (through the input and filter plugins) to make sure the output plugin is receiving data. Microsoft Sentinel will support only issues relating to the output plugin.
446447

448+
449+
### Network security
450+
Define network settings and enable network isolation for Microsoft Sentinel Logstash output plugin.
451+
452+
#### Virtual network service tags
453+
454+
Microsoft Sentinel output plugin supports [Azure virtual network service tags](/azure/virtual-network/service-tags-overview). Both *AzureMonitor* and *AzureActiveDirectory* tags are required.
455+
456+
Azure Virtual Network service tags can be used to define network access controls on [network security groups](/azure/virtual-network/network-security-groups-overview#security-rules), [Azure Firewall](/azure/firewall/service-tags), and user-defined routes. Use service tags in place of specific IP addresses when you create security rules and routes. For scenarios where Azure Virtual Network service tags cannot be used, the firewall requirements are given below.
457+
458+
#### Firewall requirements
459+
460+
The following table lists the firewall requirements for scenarios where Azure virtual network service tags can't be used.
461+
462+
| Cloud |Endpoint |Purpose |Port |Direction |Bypass HTTPS inspection|
463+
|------|------|------|---------|--------|--------|
464+
| Azure Commercial |https://login.microsoftonline.com |Authorization server (the Microsoft identity platform)|Port 443 |Outbound|Yes |
465+
| Azure Commercial |`https://<data collection endpoint name>.<Azure cloud region>.ingest.monitor.azure.com`| Data collection Endpoint|Port 443 |Outbound|Yes |
466+
| Azure Government |https://login.microsoftonline.us |Authorization server (the Microsoft identity platform)|Port 443 |Outbound|Yes |
467+
| Azure Government |Replace '.com' above with '.us' | Data collection Endpoint|Port 443 |Outbound|Yes |
468+
| Microsoft Azure operated by 21Vianet |https://login.chinacloudapi.cn |Authorization server (the Microsoft identity platform)|Port 443 |Outbound|Yes |
469+
| Microsoft Azure operated by 21Vianet |Replace '.com' above with '.cn' | Data collection Endpoint|Port 443 |Outbound|Yes |
470+
447471
## Limitations
448472

449473
- Ingestion into standard tables is limited only to [standard tables supported for custom logs ingestion](data-transformation.md#data-transformation-support-for-custom-data-connectors).

articles/sentinel/monitor-data-connector-health.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Monitor the health of your Microsoft Sentinel data connectors
33
description: Use the SentinelHealth data table and the Health Monitoring workbook to keep track of your data connectors' connectivity and performance.
4-
author: limwainstein
5-
ms.author: lwainstein
4+
author: yelevin
5+
ms.author: yelevin
66
ms.topic: how-to
7-
ms.date: 11/09/2022
7+
ms.date: 02/11/2024
88
ms.service: microsoft-sentinel
99
---
1010

@@ -14,7 +14,7 @@ To ensure complete and uninterrupted data ingestion in your Microsoft Sentinel s
1414

1515
The following features allow you to perform this monitoring from within Microsoft Sentinel:
1616

17-
- **Data connectors health monitoring workbook**: This workbook provides additional monitors, detects anomalies, and gives insight regarding the workspace’s data ingestion status. You can use the workbook’s logic to monitor the general health of the ingested data, and to build custom views and rule-based alerts.
17+
- **Data collection health monitoring workbook**: This workbook provides additional monitors, detects anomalies, and gives insight regarding the workspace’s data ingestion status. You can use the workbook’s logic to monitor the general health of the ingested data, and to build custom views and rule-based alerts.
1818

1919
- ***SentinelHealth* data table (Preview)**: Querying this table provides insights on health drifts, such as latest failure events per connector, or connectors with changes from success to failure states, which you can use to create alerts and other automated actions. The *SentinelHealth* data table is currently supported only for [selected data connectors](#supported-data-connectors).
2020

@@ -26,9 +26,15 @@ The following features allow you to perform this monitoring from within Microsof
2626

2727
## Use the health monitoring workbook
2828

29-
1. From the Microsoft Sentinel portal, select **Workbooks** from the **Threat management** menu.
29+
1. From the Microsoft Sentinel portal, select **Content hub** from the **Content management** section of the navigation menu.
3030

31-
1. In the **Workbooks** gallery, enter *health* in the search bar, and select **Data collection health monitoring** from among the results.
31+
1. In the **Content hub**, enter *health* in the search bar, and select **Data collection health monitoring** from among the results.
32+
33+
1. Select **Install** from the details pane. When you see a notification message that the workbook is installed, or if instead of *Install*, you see *Configuration*, proceed to the next step.
34+
35+
1. Select **Workbooks** from the **Threat management** section of the navigation menu.
36+
37+
1. In the **Workbooks** page, select the **Templates** tab, enter *health* in the search bar, and select **Data collection health monitoring** from among the results.
3238

3339
1. Select **View template** to use the workbook as is, or select **Save** to create an editable copy of the workbook. When the copy is created, select **View saved workbook**.
3440

articles/storage/blobs/versioning-enable.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ To enable blob versioning for a storage account in the Azure portal:
3333
:::image type="content" source="media/versioning-enable/portal-enable-versioning.png" alt-text="Screenshot showing how to enable blob versioning in Azure portal":::
3434

3535
> [!IMPORTANT]
36-
> If you set the **Delete versions after** option, a rule is automatically added to the lifecycle management policy of the storage account. Once that rule is added, the **Delete versions after** option no appears in the **Data protection** configuration page.
36+
> If you set the **Delete versions after** option, a rule is automatically added to the lifecycle management policy of the storage account. Once that rule is added, the **Delete versions after** option no longer appears in the **Data protection** configuration page.
3737
>
3838
> You can make that option reappear in the **Data protection** page by removing the rule. If your lifecycle management policy contains other rules that delete versions, then you'll have to remove those rules as well before the **Delete versions after** option can reappear.
3939

0 commit comments

Comments
 (0)