You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When you create the first user subscription mode Batch account in an Azure subscription, you must register your subscription with Batch. You need to do this registration only once per subscription.
101
+
When you create the first user subscription mode Batch account in an Azure subscription, you must register your subscription with Batch resource provider, and assign **Azure Batch Service Orchestration Role** to Microsoft Azure Batch service principal. You need to do this configuration only once per subscription.
102
102
103
103
> [!IMPORTANT]
104
104
> You need **Owner** permissions in the subscription to take this action.
@@ -112,9 +112,9 @@ When you create the first user subscription mode Batch account in an Azure subsc
112
112
113
113
1. Return to the **Subscription** page and select **Access control (IAM)** from the left navigation.
114
114
1. At the top of the **Access control (IAM)** page, select **Add** > **Add role assignment**.
115
-
1. On the **Add role assignment** screen, under **Assignment type**, select **Privileged administrator role**, and then select **Next**.
116
-
1. On the **Role** tab, select either the **Contributor** or **Owner** role for the Batch account, and then select **Next**.
115
+
1. On the **Role** tab, search for and select **Azure Batch Service Orchestration Role**, and then select **Next**.
117
116
1. On the **Members** tab, select **Select members**. On the **Select members** screen, search for and select **Microsoft Azure Batch**, and then select **Select**.
117
+
1. Select **Review + assign** to go to **Review + assign** tab, and select **Review + create** again to apply role assignment changes.
118
118
119
119
For detailed steps, see [Assign Azure roles by using the Azure portal](../role-based-access-control/role-assignments-portal.yml).
120
120
@@ -147,6 +147,7 @@ To create a Batch account with authentication mode settings:
147
147
1. You can select either of the 3 **"Microsoft Entra ID**, **Shared Key**, **Task Authentication Token** authentication mode for the Batch account to support or leave the settings at default values.
148
148
149
149
:::image type="content" source="media/batch-account-create-portal/authentication-mode-property.png" alt-text="Screenshot of the Authentication Mode options when creating a Batch account.":::
150
+
150
151
1. Leave the remaining settings at default values, select **Review + create**, and then select **Create**.
151
152
152
153
> [!TIP]
@@ -157,38 +158,31 @@ To create a Batch account with authentication mode settings:
157
158
158
159
### Grant access to the key vault manually
159
160
160
-
You can also grant access to the key vault manually in [Azure portal](https://portal.azure.com).
161
+
To grant access to the key vault manually in [Azure portal](https://portal.azure.com), you need to assign **Key Vault Secrets Officer** role for Batch:
161
162
162
-
#### If the Key Vault permission model is **Azure role-based access control**:
163
163
1. Select **Access control (IAM)** from the left navigation of the key vault page.
164
164
1. At the top of the **Access control (IAM)** page, select **Add** > **Add role assignment**.
165
-
1. On the **Add role assignment** screen, under **Role** tab, under **Job function roles** sub tab, select either **Key Vault Secrets Officer** or **Key Vault Administrator** role for the Batch account, and then select **Next**.
165
+
1. On the **Add role assignment** screen, under **Role** tab, under **Job function roles** sub tab, search and select **Key Vault Secrets Officer** role for the Batch account, and then select **Next**.
166
166
1. On the **Members** tab, select **Select members**. On the **Select members** screen, search for and select **Microsoft Azure Batch**, and then select **Select**.
167
-
1.Click the **Review + create** button on the bottom to go to **Review + assign** tab, and click the **Review + create** button on the bottom again.
167
+
1.Select the **Review + create** button on the bottom to go to **Review + assign** tab, and select the **Review + create** button on the bottom again.
168
168
169
169
For detailed steps, see [Assign Azure roles by using the Azure portal](../role-based-access-control/role-assignments-portal.yml).
170
170
171
-
#### If the Key Vault permission model is **Vault access policy**:
171
+
> [!NOTE]
172
+
> **KeyVaultNotFound** error returns for Batch account creation if the RBAC role isn't assigned for Batch in the referenced key vault.
173
+
174
+
If the Key Vault permission model is **Vault access policy**, you also need to configure the **Access policies**:
175
+
172
176
1. Select **Access policies** from the left navigation of the key vault page.
173
177
1. On the **Access policies** page, select **Create**.
174
-
1. On the **Create an access policy** screen, select a minimum of **Get**, **List**, **Set**, and **Delete** permissions under **Secret permissions**. For [key vaults with soft-delete enabled](/azure/key-vault/general/soft-delete-overview), also select **Recover**.
178
+
1. On the **Create an access policy** screen, select a minimum of **Get**, **List**, **Set**, **Delete**, and **Recover** permissions under **Secret permissions**.
175
179
176
180
:::image type="content" source="media/batch-account-create-portal/secret-permissions.png" alt-text="Screenshot of the Secret permissions selections for Azure Batch":::
177
181
178
182
1. Select **Next**.
179
183
1. On the **Principal** tab, search for and select **Microsoft Azure Batch**.
180
184
1. Select the **Review + create** tab, and then select **Create**.
181
185
182
-
<!--can't find this link or screen
183
-
184
-
Select **Add**, then ensure that the **Azure Virtual Machines for deployment** and **Azure Resource Manager for template deployment** check boxes are selected for the linked **Key Vault** resource. Select **Save** to commit your changes.
185
-
186
-
:::image type="content" source="media/batch-account-create-portal/key-vault-access-policy.png" alt-text="Screenshot of the Access policy screen.":::
187
-
188
-
-->
189
-
> [!NOTE]
190
-
> Currently, the Batch account name supports only access policies. When creating a Batch account, ensure that the key vault uses the associated access policy instead of the EntraID RBAC permissions. For more information on how to add an access policy to your Azure key vault instance, see [Configure your Azure Key Vault instance](batch-customer-managed-key.md).
191
-
192
186
### Configure subscription quotas
193
187
194
188
For user subscription Batch accounts, [core quotas](batch-quota-limit.md) must be set manually. Standard Batch core quotas don't apply to accounts in user subscription mode. The [quotas in your subscription](/azure/azure-resource-manager/management/azure-subscription-service-limits) for regional compute cores, per-series compute cores, and other resources are used and enforced.
Copy file name to clipboardExpand all lines: articles/cost-management-billing/understand/mca-understand-your-usage.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,15 +6,15 @@ ms.reviewer: amberb
6
6
ms.service: cost-management-billing
7
7
ms.subservice: billing
8
8
ms.topic: conceptual
9
-
ms.date: 03/21/2024
9
+
ms.date: 01/21/2025
10
10
ms.author: banders
11
11
---
12
12
13
13
# Terms in the Azure usage and charges file for a Microsoft Customer Agreement
14
14
15
15
This article applies to a billing account for a Microsoft Customer Agreement. [Check if you have access to a Microsoft Customer Agreement](#check-access-to-a-microsoft-customer-agreement).
16
16
17
-
The Azure usage and charges CSV file contains daily and meter-level usage charges for the current billing period.
17
+
The Azure usage and charges CSV file contain daily and meter-level usage charges for the current billing period.
18
18
19
19
To get your Azure usage and charges file, see [View and download Azure usage and charges for your Microsoft Customer Agreement](download-azure-daily-usage.md). It's available in a comma-separated values (.csv) file format that you can open in a spreadsheet application.
20
20
@@ -45,7 +45,7 @@ If you're an EA customer, notice that the terms in the Azure billing profile usa
45
45
| MeterRegion | meterRegion | Detail required for a service. Useful to find the region context of the resource. |
46
46
| MeterName | meterName | Name of the meter. Represents the Azure service deployable resource. |
47
47
| ConsumedQuantity | quantity | Measured quantity purchased or consumed. The amount of the meter used during the billing period. |
48
-
| ResourceRate | effectivePrice | The price represents the actual rate that you end up paying per unit, after discounts are taken into account. It's the price that should be used with the `Quantity` to do `Price`\*`Quantity` calculations to reconcile charges. The price takes into account the following scenarios and the scaled unit price that's also present in the files. As a result, it might differ from the scaled unit price. |
48
+
| ResourceRate | effectivePrice | The price represents the actual rate that you end up paying per unit, after discounts are taken into account. It's the price that should be used with the `Quantity` to do `Price`\*`Quantity` calculations to reconcile charges. The price takes into account the following scenarios and the scaled unit price that's also present in the files. As a result, it might differ from the scaled unit price. <br> [Reservation](../reservations/understand-reserved-instance-usage-ea.md) and [savings plan](../savings-plan/utilization-cost-reports.md) charges might be zero in actual cost reports but are shown in amortized cost reports. |
49
49
| ExtendedCost | cost | Cost of the charge in the billing currency before credits or taxes. |
50
50
| ResourceLocation | resourceLocation | Location of the used resource's data center. |
51
51
| ConsumedService | consumedService | Name of the service. |
Copy file name to clipboardExpand all lines: articles/ddos-protection/types-of-attacks.md
+32-7Lines changed: 32 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,20 +5,45 @@ services: ddos-protection
5
5
author: AbdullahBell
6
6
ms.service: azure-ddos-protection
7
7
ms.topic: concept-article
8
-
ms.date: 07/17/2024
8
+
ms.date: 01/21/2025
9
9
ms.author: abell
10
10
---
11
-
# Types of attacks Azure DDoS Protection mitigates
11
+
# Types of attacks Azure DDoS Protection mitigate
12
12
13
13
Azure DDoS Protection can mitigate the following types of attacks:
14
14
15
-
-**Volumetric attacks**: These attacks flood the network layer with a substantial amount of seemingly legitimate traffic. They include UDP floods, amplification floods, and other spoofed-packet floods. DDoS Protection mitigates these potential multi-gigabyte attacks by absorbing and scrubbing them, with Azure's global network scale, automatically.
16
-
-**Protocol attacks**: These attacks render a target inaccessible, by exploiting a weakness in the layer 3 and layer 4 protocol stack. They include SYN flood attacks, reflection attacks, and other protocol attacks. DDoS Protection mitigates these attacks, differentiating between malicious and legitimate traffic, by interacting with the client, and blocking malicious traffic.
17
-
-**Resource (application) layer attacks**: These attacks target web application packets, to disrupt the transmission of data between hosts. They include HTTP protocol violations, SQL injection, cross-site scripting, and other layer 7 attacks. Use a Web Application Firewall, such as the Azure [Application Gateway web application firewall](../web-application-firewall/ag/ag-overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json), as well as DDoS Protection to provide defense against these attacks. There are also third-party web application firewall offerings available in the [Azure Marketplace](https://azuremarketplace.microsoft.com/marketplace/apps?page=1&search=web%20application%20firewall).
15
+
-**Volumetric attacks**: These attacks flood the network layer with a substantial amount of seemingly legitimate traffic. They include UDP floods, amplification floods, and other spoofed-packet floods. DDoS Protection mitigates these potential multi-gigabyte attacks by absorbing and scrubbing them, with Azure's global network scale, automatically. Common attack types are listed in the following table.
|**ICMP Flood**| Overwhelms the target with ICMP Echo Request (ping) packets, causing disruption. |
20
+
|**IP/ICMP Fragmentation**| Exploits IP packet fragmentation to overwhelm the target with fragmented packets.|
21
+
|**IPsec Flood**| Floods the target with IPsec packets, overwhelming the processing capability. |
22
+
|**UDP Flood**| Sends a large number of UDP packets to random ports, causing resource exhaustion.|
23
+
|**Reflection Amplification Attack**| Uses a third-party server to amplify the attack traffic towards the target. |
24
+
25
+
-**Protocol attacks**: These attacks render a target inaccessible, by exploiting a weakness in the layer 3 and layer 4 protocol stack. They include SYN flood attacks, reflection attacks, and other protocol attacks. DDoS Protection mitigates these attacks, differentiating between malicious and legitimate traffic, by interacting with the client, and blocking malicious traffic. Common attack types are listed in the following table.
|**SYN Flood**| Exploits the TCP handshake process to overwhelm the target with connection requests. |
30
+
|**Fragmented Packet Attack**| Sends fragmented packets to the target, causing resource exhaustion during reassembly. |
31
+
|**Ping of Death**| Sends malformed or oversized packets to crash or destabilize the target system. |
32
+
|**Smurf Attack**| Uses ICMP echo requests to flood the target with traffic by exploiting network devices. |
33
+
34
+
-**Resource (application) layer attacks**: These attacks target web application packets, to disrupt the transmission of data between hosts. They include HTTP protocol violations, SQL injection, cross-site scripting, and other layer 7 attacks. Use a Web Application Firewall, such as the Azure [Application Gateway web application firewall](../web-application-firewall/ag/ag-overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json), and DDoS Protection to provide defense against these attacks. There are also third-party web application firewall offerings available in the [Azure Marketplace](https://azuremarketplace.microsoft.com/marketplace/apps?page=1&search=web%20application%20firewall). Common attacks types are listed in the following table.
|**BGP Hijacking**| Involves taking control of a group of IP addresses by corrupting Internet routing tables. |
40
+
|**Slowloris**| Keeps many connections to the target web server open and holds them open as long as possible. |
41
+
|**Slow Post**| Sends HTTP POST headers that are incomplete, causing the server to wait for the rest of the data. |
42
+
|**Slow Read**| Reads responses from the server slowly, causing the server to keep the connection open. |
43
+
|**HTTP(/s) Flooding**| Floods the target with HTTP requests, overwhelming the server's ability to respond. |
44
+
|**Low and Slow attack**| Uses a few connections to slowly send or request data, evading detection. |
45
+
|**Large Payload POST**| Sends large payloads in HTTP POST requests to exhaust server resources. |
20
46
21
-
Azure DDoS Protection protects resources in a virtual network including public IP addresses associated with virtual machines, load balancers, and application gateways. When coupled with the Application Gateway web application firewall, or a third-party web application firewall deployed in a virtual network with a public IP, Azure DDoS Protection can provide full layer 3 to layer 7 mitigation capability.
@@ -54,7 +55,7 @@ This section contains an example of what that data would look like for each even
54
55
> Possible values for `Status` are:
55
56
> -`Delivered`: The message was successfully handed over to the intended destination (recipient Mail Transfer Agent).
56
57
> -`Suppressed`: The recipient email had hard bounced previously, and all subsequent emails to this recipient are being temporarily suppressed as a result.
57
-
> -`Bounced`: The email hard bounced, which may have happened because the email address does not exist or the domain is invalid.
58
+
> -`Bounced`: The email hard bounced, which might happen because the email address doesn't exist or the domain is invalid.
58
59
> -`Quarantined`: The message was quarantined (as spam, bulk mail, or phishing).
59
60
> -`FilteredSpam`: The message was identified as spam, and was rejected or blocked (not quarantined).
60
61
> -`Expanded`: A distribution group recipient was expanded before delivery to the individual members of the group.
0 commit comments