Skip to content

Commit d83e53c

Browse files
authored
Merge pull request #225104 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents aee8c4b + c2957cb commit d83e53c

File tree

5 files changed

+111
-16
lines changed

5 files changed

+111
-16
lines changed

articles/active-directory/conditional-access/location-condition.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ Most of the IPv6 traffic that gets proxied to Azure AD comes from Microsoft Exch
162162
If you're using Azure VNets, you'll have traffic coming from an IPv6 address. If you have VNet traffic blocked by a Conditional Access policy, check your Azure AD sign-in log. Once you’ve identified the traffic, you can get the IPv6 address being used and exclude it from your policy.
163163

164164
> [!NOTE]
165-
> If you want to specify an IP CIDR range for a single address, apply the /128 bit mask. If you see the IPv6 address 2607:fb90:b27a:6f69:f8d5:dea0:fb39:74a and wanted to exclude that single address as a range, you would use 2607:fb90:b27a:6f69:f8d5:dea0:fb39:74a/128.
165+
> If you want to specify an IP CIDR range for a single address, apply the /128 bit mask. If you see the IPv6 address 2001:db8:4a7d:3f57:a1e2:6b4a:8f3e:d17b and wanted to exclude that single address as a range, you would use 2001:db8:4a7d:3f57:a1e2:6b4a:8f3e:d17b/128.
166166
167167
## What you should know
168168

articles/active-directory/develop/developer-support-help-options.md

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -41,14 +41,17 @@ Get answers to your identity app development questions directly from Microsoft e
4141

4242
If you can't find an answer to your problem by searching Microsoft Q&A, submit a new question. Use one of following tags when you ask your [high-quality question](/answers/articles/24951/how-to-write-a-quality-question.html):
4343

44-
| Component/area | Tags |
45-
| --------------------------------------------------------------------------- | ----------------------------------------------------------------------- |
46-
| Microsoft Authentication Library (MSAL) | [[msal]](/answers/topics/azure-ad-msal.html) |
47-
| Open Web Interface for .NET (OWIN) middleware | [[azure-active-directory]](/answers/topics/azure-active-directory.html) |
48-
| [Azure AD B2B / External Identities](../external-identities/what-is-b2b.md) | [[azure-ad-b2b]](/answers/topics/azure-ad-b2b.html) |
49-
| [Azure AD B2C](https://azure.microsoft.com/services/active-directory-b2c/) | [[azure-ad-b2c]](/answers/topics/azure-ad-b2c.html) |
50-
| [Microsoft Graph API](https://developer.microsoft.com/graph/) | [[azure-ad-graph]](/answers/topics/azure-ad-graph.html) |
51-
| All other authentication and authorization areas | [[azure-active-directory]](/answers/topics/azure-active-directory.html) |
44+
| Component/area | Tags |
45+
| ----------------------------------------------------------| ---------------------------------------------------------------------------------------------|
46+
| Azure AD B2B / External Identities | [Azure Active Directory External Identities](/answers/tags/231/azure-active-directory-b2c) |
47+
| Azure AD B2C | [Azure Active Directory External Identities](/answers/tags/231/azure-active-directory-b2c) |
48+
| All other Azure Active Directory areas | [Azure Active Diretory](/answers/tags/49/azure-active-directory) |
49+
| Azure RBAC | [Azure Role-Based access control](/answers/tags/189/azure-rbac) |
50+
| Azure Key Vault | [Azure Key Vault](/answers/tags/5/azure-key-vault) |
51+
| Microsoft Security | [Microsoft Defender for Cloud](/answers/tags/392/defender-for-cloud) |
52+
| Microsoft Sentinel | [Microsoft Sentinel](/answers/tags/423/microsoft-sentinel) |
53+
| Azure AD Domain Services | [Azure Active Directory Domain Services](/answers/tags/222/azure-active-directory-domain) |
54+
| Azure Windows and Linux Virtual Machines | [Azure Virtual Machines](/answers/tags/94/azure-virtual-machines) |
5255

5356
## Create a GitHub issue
5457

articles/active-directory/external-identities/troubleshoot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ This happens when another object in the directory has the same invited email add
110110

111111
## The guest user object doesn't have a proxyAddress
112112

113-
Sometimes, the external guest user you're inviting conflicts with an existing [Contact object](/graph/api/resources/contact). When this occurs, the guest user is created without a proxyAddress. This means that the user won't be able to redeem this account using [just-in-time redemption](redemption-experience.md#redemption-through-a-direct-link) or [email one-time passcode authentication](one-time-passcode.md#user-experience-for-one-time-passcode-guest-users).
113+
Sometimes, the external guest user you're inviting conflicts with an existing [Contact object](/graph/api/resources/contact). When this occurs, the guest user is created without a proxyAddress. This means that the user won't be able to redeem this account using [just-in-time redemption](redemption-experience.md#redemption-through-a-direct-link) or [email one-time passcode authentication](one-time-passcode.md#user-experience-for-one-time-passcode-guest-users). Also, if the contact object you're synchronizing from on-premises AD conflicts with an existing guest user, the conflicting proxyAddress is removed from the existing guest user.
114114

115115
## How does ‘\#’, which isn't normally a valid character, sync with Azure AD?
116116

@@ -202,4 +202,4 @@ Let's say you inadvertently invite a guest user with an email address that match
202202
## Next steps
203203

204204
- [Get support for B2B collaboration](../fundamentals/active-directory-troubleshooting-support-howto.md)
205-
- [Use audit logs and access reviews](auditing-and-reporting.md)
205+
- [Use audit logs and access reviews](auditing-and-reporting.md)

articles/openshift/howto-use-key-vault-secrets.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Use Azure Key Vault Provider for Secrets Store CSI Driver on Azure Red Hat OpenShift
2+
title: Use Azure Key Vault Provider for Secrets Store CSI Driver on Azure Red Hat OpenShift
33
description: This article explains how to use Azure Key Vault Provider for Secrets Store CSI Driver on Azure Red Hat OpenShift.
44
author: johnmarco
55
ms.author: johnmarc
@@ -68,7 +68,7 @@ export AZ_TENANT_ID=$(az account show -o tsv --query tenantId)
6868
```
6969
helm install -n k8s-secrets-store-csi csi-secrets-store \
7070
secrets-store-csi-driver/secrets-store-csi-driver \
71-
--version v1.0.1 \
71+
--version v1.3.1 \
7272
--set "linux.providersDir=/var/run/secrets-store-csi-providers"
7373
```
7474
Optionally, you can enable autorotation of secrets by adding the following parameters to the command above:
@@ -111,7 +111,7 @@ export AZ_TENANT_ID=$(az account show -o tsv --query tenantId)
111111
csi-secrets-store-provider-azure/csi-secrets-store-provider-azure \
112112
--set linux.privileged=true --set secrets-store-csi-driver.install=false \
113113
--set "linux.providersDir=/var/run/secrets-store-csi-providers" \
114-
--version=v1.0.1
114+
--version=v1.4.1
115115
```
116116
117117
1. Set SecurityContextConstraints to allow the CSI driver to run:
@@ -295,11 +295,12 @@ Uninstall the Key Vault Provider and the CSI Driver.
295295
296296
```
297297
helm uninstall -n k8s-secrets-store-csi csi-secrets-store
298+
oc delete project k8s-secrets-store-csi
298299
```
299300
300301
1. Delete the SecurityContextConstraints:
301302
302303
```
303304
oc adm policy remove-scc-from-user privileged \
304305
system:serviceaccount:k8s-secrets-store-csi:secrets-store-csi-driver
305-
```
306+
```

articles/sentinel/sentinel-soar-content.md

Lines changed: 92 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,13 +36,34 @@ You can find SOAR integrations and their components in the following places:
3636
> - Logic Apps HTTP calls
3737
3838

39+
## AbuseIPDB
40+
41+
| Product | Integration components | Supported by | Scenarios |
42+
| --- | --- | --- | --- |
43+
| **AbuseIPDB**<br>(Available as solution) | Custom Logic Apps connector<br><br>Playbooks | Microsoft | Enrich incident by IP info, <br>Report IP to Abuse IP DB, <br>Deny list to Threat intelligence |
44+
|
45+
3946
## Atlassian
4047

4148
| Product | Integration components | Supported by | Scenarios |
4249
| --- | --- | --- | --- |
4350
| **Jira** | [Managed Logic Apps connector](/connectors/jira/)<br><br>Playbooks | Microsoft<br><br>Community | Sync incidents |
4451
|
52+
53+
## AWS IAM
54+
55+
| Product | Integration components | Supported by | Scenarios |
56+
| --- | --- | --- | --- |
57+
| **AWS IAM**<br>(Available as solution) | Custom Logic Apps connector<br><br>Playbooks | Microsoft | Add User Tags, <br>Delete Access Keys, <br>Enrich incidents |
58+
|
59+
60+
## Checkphish by Bolster
4561

62+
| Product | Integration components | Supported by | Scenarios |
63+
| --- | --- | --- | --- |
64+
| **Checkphish by Bolster**<br>(Available as solution) | Custom Logic Apps connector<br><br>Playbooks | Microsoft | Get URL scan results |
65+
|
66+
4667
## Check Point
4768

4869
| Product | Integration components | Supported by | Scenarios |
@@ -66,6 +87,13 @@ You can find SOAR integrations and their components in the following places:
6687
| --- | --- | --- | --- |
6788
| **Falcon endpoint protection**<br>(Available as solution) | Playbooks | Microsoft | Endpoints enrichment,<br>isolate endpoints |
6889
|
90+
91+
## Elastic Search
92+
93+
| Product | Integration components | Supported by | Scenarios |
94+
| --- | --- | --- | --- |
95+
| **Elastic search**<br>(Available as solution) | Playbooks | Microsoft | Enrich incident |
96+
|
6997

7098
## F5
7199

@@ -86,7 +114,8 @@ You can find SOAR integrations and their components in the following places:
86114
| Product | Integration components | Supported by | Scenarios |
87115
| --- | --- | --- | --- |
88116
| **FortiGate**<br>(Available as solution) | Custom Logic Apps connector<br><br>Azure Function<br><br>Playbooks | Microsoft | Block IPs and URLs |
89-
|
117+
| **Fortiweb Cloud**<br>(Available as solution) | Custom Logic Apps connector<br><br>Azure Function<br><br>Playbooks | Microsoft | Block IPs and URLs , <br>Incident enrichment |
118+
|
90119

91120
## Freshdesk
92121

@@ -95,6 +124,12 @@ You can find SOAR integrations and their components in the following places:
95124
| **Freshdesk** | [Managed Logic Apps connector](/connectors/freshdesk/) | | Sync incidents |
96125
|
97126

127+
## GCP IAM
128+
129+
| Product | Integration components | Supported by | Scenarios |
130+
| --- | --- | --- | --- |
131+
| **GCP IAM**<br>(Available as solution) | Custom Logic Apps connector<br><br>Playbooks | Microsoft | Disable service account, <br>Disable service account key, <br>Enrich Service account info |
132+
|
98133

99134
## Have I Been Pwned
100135

@@ -117,6 +152,13 @@ You can find SOAR integrations and their components in the following places:
117152
| **Resilient** | Custom Logic Apps connector<br><br>Playbooks | Community | Sync incidents |
118153
|
119154

155+
## InsightVM Cloud API
156+
157+
| Product | Integration components | Supported by | Scenarios |
158+
| --- | --- | --- | --- |
159+
| **InsightVM Cloud API** | Custom Logic Apps connector<br><br>Playbooks | Microsoft | Enrich incident with asset info, <br>Enrich vulnerability info, <br>Run VM scan |
160+
|
161+
120162
## Microsoft
121163

122164
| Product | Integration components | Supported by | Scenarios |
@@ -131,13 +173,34 @@ You can find SOAR integrations and their components in the following places:
131173
| **Microsoft Defender for IoT** | Playbooks | Microsoft | Orchestration and notification |
132174
| **Microsoft Teams** | [Managed Logic Apps connector](/connectors/teams/)<br><br>Playbooks | Microsoft<br><br>Community | Notifications, <br>Collaboration, <br>create human-involved responses |
133175
|
176+
177+
## Minemeld
178+
179+
| Product | Integration components | Supported by | Scenarios |
180+
| --- | --- | --- | --- |
181+
| **Minemeld**<br>(Available as solution) | Custom Logic Apps connector<br><br>Playbooks | Microsoft | Create indicator, <br>Enrich incident |
182+
|
183+
184+
## Neustar IP GEO Point
185+
186+
| Product | Integration components | Supported by | Scenarios |
187+
| --- | --- | --- | --- |
188+
| **Neustar IP GEO Point**<br>(Available as solution) | Playbooks | Microsoft | Get IP Geo Info |
189+
|
134190

135191
## Okta
136192

137193
| Product | Integration components | Supported by | Scenarios |
138194
| --- | --- | --- | --- |
139195
| **Okta** | Managed Logic Apps connector<br><br>Playbooks | Community | Users enrichment, <br>Users remediation |
140196
|
197+
198+
## OpenCTI
199+
200+
| Product | Integration components | Supported by | Scenarios |
201+
| --- | --- | --- | --- |
202+
| **OpenCTI**<br>(Available as solution) | Custom Logic Apps connector<br><br>Playbooks | Microsoft | Create Indicator, <br>Enrich incident, <br>Get Indicator stream, <br>Import to Sentinel |
203+
|
141204

142205
## Palo Alto
143206

@@ -154,6 +217,13 @@ You can find SOAR integrations and their components in the following places:
154217
| **Proofpoint TAP**<br>(Available as solution) | Custom Logic Apps connector<br><br>Playbooks | Microsoft | Accounts enrichment |
155218
|
156219

220+
## Qualys VM
221+
222+
| Product | Integration components | Supported by | Scenarios |
223+
| --- | --- | --- | --- |
224+
| **Qualys VM**<br>(Available as solution) | Custom Logic Apps connector<br><br>Playbooks | Microsoft | Get asset details, <br>Get asset by CVEID, <br>Get asset by Open port, <br>Launch VM scan |
225+
|
226+
157227
## Recorded Future
158228

159229
| Product | Integration components | Supported by | Scenarios |
@@ -190,6 +260,27 @@ You can find SOAR integrations and their components in the following places:
190260
| --- | --- | --- | --- |
191261
| **Slack** | [Managed Logic Apps connector](/connectors/slack/)<br><br>Playbooks | Microsoft<br><br>Community | Notification, <br>Collaboration |
192262
|
263+
264+
## TheHive
265+
266+
| Product | Integration components | Supported by | Scenarios |
267+
| --- | --- | --- | --- |
268+
| **TheHive**<br>(Available as solution) | Custom Logic Apps connector<br><br>Playbooks | Microsoft | Create alert, <br>Create Case, <br>Lock User |
269+
|
270+
271+
## ThreatX WAF
272+
273+
| Product | Integration components | Supported by | Scenarios |
274+
| --- | --- | --- | --- |
275+
| **ThreatX WAF**<br>(Available as solution) | Custom Logic Apps connector<br><br>Playbooks | Microsoft | Block IP / URL, <br>Incident enrichment |
276+
|
277+
278+
## URLhaus
279+
280+
| Product | Integration components | Supported by | Scenarios |
281+
| --- | --- | --- | --- |
282+
| **URLhaus**<br>(Available as solution) | Custom Logic Apps connector<br><br>Playbooks | Microsoft | Check host and enrich incident, <br>Check hash and enrich incident, <br>Check URL and enrich incident |
283+
|
193284

194285
## Virus Total
195286

0 commit comments

Comments
 (0)