Skip to content

Commit d8231a7

Browse files
authored
Merge pull request #265995 from MicrosoftDocs/main
Publish to live, Monday 4 AM PST, 2/12
2 parents e7b4d58 + ea091cb commit d8231a7

File tree

51 files changed

+428
-297
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+428
-297
lines changed

articles/azure-functions/start-stop-vms/deploy.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,7 @@ For each scenario, you can target the action against one or more subscriptions,
208208
```json
209209
{
210210
"Action": "start",
211-
"EnableClassic": true,
211+
"EnableClassic": false,
212212
"RequestScopes": {
213213
"ExcludedVMLists": [],
214214
"VMLists": [
@@ -290,7 +290,7 @@ In an environment that includes two or more components on multiple Azure Resourc
290290
```json
291291
{
292292
"Action": "start",
293-
"EnableClassic": true,
293+
"EnableClassic": false,
294294
"RequestScopes": {
295295
"ExcludedVMLists": [],
296296
"VMLists": [
@@ -366,7 +366,7 @@ To learn more about how Azure Monitor metric alerts work and how to configure th
366366
"AutoStop_Threshold": "5",
367367
"AutoStop_TimeAggregationOperator": "Average",
368368
"AutoStop_TimeWindow": "06:00:00",
369-
"EnableClassic": true,
369+
"EnableClassic": false,
370370
"RequestScopes": {
371371
"ExcludedVMLists": [],
372372
"ResourceGroups": [
@@ -391,7 +391,7 @@ To learn more about how Azure Monitor metric alerts work and how to configure th
391391
"AutoStop_Threshold": "5",
392392
"AutoStop_TimeAggregationOperator": "Average",
393393
"AutoStop_TimeWindow": "06:00:00",
394-
"EnableClassic": true,
394+
"EnableClassic": false,
395395
"RequestScopes": {
396396
"ExcludedVMLists": [],
397397
"VMLists": [

articles/azure-monitor/app/javascript-sdk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ If you want to use the extra features provided by plugins for specific framework
142142

143143
- [React plugin](javascript-framework-extensions.md?tabs=react)
144144
- [React native plugin](javascript-framework-extensions.md?tabs=reactnative)
145-
- [Angular plugin](javascript-framework-extensions.md?tabs=reactnative)
145+
- [Angular plugin](javascript-framework-extensions.md?tabs=angular)
146146

147147
### Confirm data is flowing
148148

articles/backup/backup-azure-database-postgresql-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: About Azure Database for PostgreSQL backup
33
description: An overview on Azure Database for PostgreSQL backup
44
ms.topic: conceptual
5-
ms.date: 01/24/2022
5+
ms.date: 02/09/2024
66
ms.service: backup
77
author: AbhishekMallick-MS
88
ms.author: v-abhmallick

articles/backup/backup-azure-database-postgresql-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Troubleshoot Azure Database for PostgreSQL backup
33
description: Troubleshooting information for backing up Azure Database for PostgreSQL.
44
ms.topic: troubleshooting
5-
ms.date: 06/07/2022
5+
ms.date: 02/09/2024
66
ms.service: backup
77
author: AbhishekMallick-MS
88
ms.author: v-abhmallick

articles/defender-for-cloud/custom-security-policies.md

Lines changed: 49 additions & 55 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ zone_pivot_groups: manage-asc-initiatives
99

1010
# Create custom standards and recommendations (Azure)
1111

12-
Security recommendations in Microsoft Defender for Cloud help you to improve and harden your security posture. Recommendations are based on the security standards you define in subscriptions that have Defender for Cloud onboarded.
12+
Security recommendations in Microsoft Defender for Cloud help you to improve and harden your security posture. Recommendations are based on the security standards you define in subscriptions that have Defender for Cloud onboarded.
1313

1414
[Security standards](security-policy-concept.md) can be based on regulatory compliance standards, and on customized standards. This article describes how to create custom standards and recommendations.
1515

@@ -20,7 +20,6 @@ Security recommendations in Microsoft Defender for Cloud help you to improve and
2020

2121
::: zone pivot="azure-portal"
2222

23-
2423
## Create a custom standard in the portal
2524

2625
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -29,12 +28,11 @@ Security recommendations in Microsoft Defender for Cloud help you to improve and
2928

3029
1. Select the relevant subscription or management group.
3130

32-
3331
1. Select **Security policies** > **+ Create** > **Custom standard**.
3432

3533
:::image type="content" source="media/custom-security-policies/create-custom-standard.png" alt-text="Screenshot that shows how to create a custom security standard." lightbox="media/custom-security-policies/create-custom-standard.png":::
3634

37-
1. Enter a name and description.
35+
1. Enter a name and description.
3836

3937
> [!IMPORTANT]
4038
> Make sure the name is unique. If you create a custom standard with the same name as an existing standard, it causes a conflict in the information displayed in the dashboard.
@@ -67,7 +65,6 @@ If you want to create a custom recommendation for Azure resources, you currently
6765

6866
::: zone pivot="rest-api"
6967

70-
7168
## Create a custom recommendation/standard (legacy)
7269

7370
You can create custom recommendations and standards in Defender for cloud by creating policy definitions and initiatives in Azure Policy, and onboarding them in Defender for Cloud.
@@ -77,18 +74,17 @@ Here's how you do that:
7774
1. Create one or more policy definitions in the [Azure Policy portal](../governance/policy/tutorials/create-custom-policy-definition.md), or [programatically](../governance/policy/how-to/programmatically-create.md).
7875
1. [Create a policy initiative](../governance/policy/concepts/initiative-definition-structure.md) that contains the custom policy definitions.
7976

80-
8177
## Onboard the initiative as a custom standard (legacy)
8278

8379
[Policy assignments](../governance/policy/concepts/assignment-structure.md) are used by Azure Policy to assign Azure resources to a policy or initiative.
8480

8581
To onboard an initiative to a custom security standard in Defender for you, you need to include `"ASC":"true"` in the request body as shown here. The `ASC` field onboards the initiative to Microsoft Defender for Cloud.
8682

8783
Here's an example of how to do that.
88-
84+
8985
### Example to onboard a custom initiative
9086

91-
```
87+
```json
9288
PUT
9389
PUT https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/policySetDefinitions/{policySetDefinitionName}?api-version=2021-06-01
9490

@@ -145,17 +141,16 @@ Here's an example of how to do that.
145141

146142
This example shows you how to remove an assignment:
147143

148-
```
144+
```json
149145
DELETE
150146
https://management.azure.com/{scope}/providers/Microsoft.Authorization/policyAssignments/{policyAssignmentName}?api-version=2018-05-01
151147
```
152148

153149
::: zone-end
154150

155-
156151
## Enhance custom recommendations (legacy)
157152

158-
The built-in recommendations supplied with Microsoft Defender for Cloud include details such as severity levels and remediation instructions. If you want to add this type of information to custom recommendations for Azure, use the REST API.
153+
The built-in recommendations supplied with Microsoft Defender for Cloud include details such as severity levels and remediation instructions. If you want to add this type of information to custom recommendations for Azure, use the REST API.
159154

160155
The two types of information you can add are:
161156

@@ -166,9 +161,9 @@ The metadata should be added to the policy definition for a policy that is part
166161

167162
```json
168163
"metadata": {
169-
"securityCenter": {
170-
"RemediationDescription": "Custom description goes here",
171-
"Severity": "High"
164+
"securityCenter": {
165+
"RemediationDescription": "Custom description goes here",
166+
"Severity": "High"
172167
},
173168
```
174169

@@ -177,53 +172,52 @@ Here's another example of a custom policy including the metadata/securityCenter
177172
```json
178173
{
179174
"properties": {
180-
"displayName": "Security - ERvNet - AuditRGLock",
181-
"policyType": "Custom",
182-
"mode": "All",
183-
"description": "Audit required resource groups lock",
184-
"metadata": {
185-
"securityCenter": {
186-
"RemediationDescription": "Resource Group locks can be set via Azure Portal -> Resource Group -> Locks",
187-
"Severity": "High"
188-
}
189-
},
190-
"parameters": {
191-
"expressRouteLockLevel": {
192-
"type": "String",
193-
"metadata": {
194-
"displayName": "Lock level",
195-
"description": "Required lock level for ExpressRoute resource groups."
196-
},
197-
"allowedValues": [
198-
"CanNotDelete",
199-
"ReadOnly"
200-
]
201-
}
202-
},
203-
"policyRule": {
204-
"if": {
205-
"field": "type",
206-
"equals": "Microsoft.Resources/subscriptions/resourceGroups"
207-
},
208-
"then": {
209-
"effect": "auditIfNotExists",
210-
"details": {
211-
"type": "Microsoft.Authorization/locks",
212-
"existenceCondition": {
213-
"field": "Microsoft.Authorization/locks/level",
214-
"equals": "[parameters('expressRouteLockLevel')]"
215-
}
216-
}
217-
}
218-
}
175+
"displayName": "Security - ERvNet - AuditRGLock",
176+
"policyType": "Custom",
177+
"mode": "All",
178+
"description": "Audit required resource groups lock",
179+
"metadata": {
180+
"securityCenter": {
181+
"RemediationDescription": "Resource Group locks can be set via Azure Portal -> Resource Group -> Locks",
182+
"Severity": "High"
183+
}
184+
},
185+
"parameters": {
186+
"expressRouteLockLevel": {
187+
"type": "String",
188+
"metadata": {
189+
"displayName": "Lock level",
190+
"description": "Required lock level for ExpressRoute resource groups."
191+
},
192+
"allowedValues": [
193+
"CanNotDelete",
194+
"ReadOnly"
195+
]
196+
}
197+
},
198+
"policyRule": {
199+
"if": {
200+
"field": "type",
201+
"equals": "Microsoft.Resources/subscriptions/resourceGroups"
202+
},
203+
"then": {
204+
"effect": "auditIfNotExists",
205+
"details": {
206+
"type": "Microsoft.Authorization/locks",
207+
"existenceCondition": {
208+
"field": "Microsoft.Authorization/locks/level",
209+
"equals": "[parameters('expressRouteLockLevel')]"
210+
}
211+
}
212+
}
213+
}
219214
}
220215
}
221216
```
222217

223218
For another example for using the securityCenter property, see [this section of the REST API documentation](/rest/api/defenderforcloud/assessments-metadata/create-in-subscription#examples).
224219

225-
226220
## Next steps
227221

228222
- [Learn about](create-custom-recommendations.md) Defender for Cloud security standards and recommendations.
229-
- [Learn about](create-custom-recommendations.md) creating custom standards for AWS accounts and GCP projects.
223+
- [Learn about](create-custom-recommendations.md) creating custom standards for AWS accounts and GCP projects.

0 commit comments

Comments
 (0)