Skip to content

Commit d9f0f3a

Browse files
authored
Merge pull request #301041 from MicrosoftDocs/main
Publish to live, Monday 4 AM PST, 6/9
2 parents d4a7962 + 940cdbf commit d9f0f3a

30 files changed

+949
-232
lines changed

articles/backup/backup-azure-vms-automation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Back up and recover Azure VMs with PowerShell
33
description: Describes how to back up and recover Azure VMs using Azure Backup with PowerShell
44
ms.topic: how-to
5-
ms.date: 06/04/2024
5+
ms.date: 12/03/2024
66
ms.custom: devx-track-azurepowershell, engagement-fy24
77
ms.service: azure-backup
88
author: jyothisuri

articles/backup/enable-multi-user-authorization-quickstart.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Quickstart - Multi-user authorization using Resource Guard
33
description: In this quickstart, learn how to use Multi-user authorization to protect against unauthorized operation.
44
ms.topic: quickstart
5-
ms.date: 06/11/2024
5+
ms.date: 06/09/2025
66
ms.service: azure-backup
77
author: jyothisuri
88
ms.author: jsuri
@@ -93,5 +93,5 @@ Once the Backup admin has the Reader role on the Resource Guard, they can enable
9393

9494
- [Protected operations using MUA](multi-user-authorization.md?pivots=vaults-recovery-services-vault#protected-operations-using-mua)
9595
- [Authorize critical (protected) operations using Microsoft Entra Privileged Identity Management](multi-user-authorization.md#authorize-critical-protected-operations-using-azure-active-directory-privileged-identity-management)
96-
- [Performing a protected operation after approval](multi-user-authorization.md#performing-a-protected-operation-after-approval)
96+
- [Perform a protected operation after approval](multi-user-authorization.md#perform-a-protected-operation-after-approval)
9797
- Disable MUA on a [Recovery Services vault](multi-user-authorization.md?tabs=azure-portal&pivots=vaults-recovery-services-vault#disable-mua-on-a-recovery-services-vault) or a [Backup vault](multi-user-authorization.md?tabs=azure-portal&pivots=vaults-backup-vault#disable-mua-on-a-backup-vault).

articles/backup/multi-user-authorization-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Tutorial - Enable Multi-user authorization using Resource Guard
33
description: In this tutorial, you'll learn about how create a resource guard and enable Multi-user authorization on Recovery Services vault and Backup vault for Azure Backup.
44
ms.topic: tutorial
5-
ms.date: 09/25/2023
5+
ms.date: 06/09/2025
66
ms.service: azure-backup
77
author: jyothisuri
88
ms.author: jsuri
@@ -206,5 +206,5 @@ Once the Backup admin has the Reader role on the Resource Guard, they can enable
206206

207207
- [Protected operations using MUA](multi-user-authorization.md?pivots=vaults-recovery-services-vault#protected-operations-using-mua)
208208
- [Authorize critical (protected) operations using Microsoft Entra Privileged Identity Management](multi-user-authorization.md#authorize-critical-protected-operations-using-azure-active-directory-privileged-identity-management)
209-
- [Performing a protected operation after approval](multi-user-authorization.md#performing-a-protected-operation-after-approval)
209+
- [Perform a protected operation after approval](multi-user-authorization.md#perform-a-protected-operation-after-approval)
210210
- Disable MUA on a [Recovery Services vault](multi-user-authorization.md?tabs=azure-portal&pivots=vaults-recovery-services-vault#disable-mua-on-a-recovery-services-vault) or a [Backup vault](multi-user-authorization.md?tabs=azure-portal&pivots=vaults-backup-vault#disable-mua-on-a-backup-vault).

articles/backup/multi-user-authorization.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Configure Multi-user authorization using Resource Guard
33
description: This article explains how to configure Multi-user authorization using Resource Guard.
44
ms.topic: how-to
55
zone_pivot_groups: backup-vaults-recovery-services-vault-backup-vault
6-
ms.date: 06/11/2024
6+
ms.date: 06/09/2025
77
ms.service: azure-backup
88
ms.custom: devx-track-azurepowershell, devx-track-azurecli
99
author: jyothisuri
@@ -16,19 +16,19 @@ ms.author: jsuri
1616

1717
::: zone pivot="vaults-recovery-services-vault"
1818

19-
This article describes how to configure Multi-user authorization (MUA) for Azure Backup to add an additional layer of protection to critical operations on your Recovery Services vaults.
20-
21-
This article demonstrates Resource Guard creation in a different tenant that offers maximum protection. It also demonstrates how to request and approve requests for performing critical operations using [Microsoft Entra Privileged Identity Management](../active-directory/privileged-identity-management/pim-configure.md) in the tenant housing the Resource Guard. You can optionally use other mechanisms to manage JIT permissions on the Resource Guard as per your setup.
19+
This article describes how to configure Multi-User Authorization (MUA) for Azure Backup to enhance the security of critical operations on Recovery Services vaults. It covers the creation of a Resource Guard in a separate tenant for maximum protection and demonstrates how to request and approve critical operation access using [Microsoft Entra Privileged Identity Management](../active-directory/privileged-identity-management/pim-configure.md) within the tenant hosting the Resource Guard. Alternatively, you can use other methods to manage just-in-time (JIT) permissions based on your organizational setup.
2220

2321
>[!NOTE]
2422
>- Multi-user authorization for Azure Backup is available in all public Azure regions.
2523
>- Multi-user authorization using Resource Guard for Backup vault is now generally available. [Learn more](multi-user-authorization.md?pivots=vaults-backup-vault).
2624
27-
## Before you start
25+
## Prerequisites
26+
27+
Before you configure Multi-user authorization for a Recovery Services vault, ensure that the following prerequisites are met:
2828

29-
- Ensure the Resource Guard and the Recovery Services vault are in the same Azure region.
30-
- Ensure the Backup admin does **not** have **Contributor**, **Backup MUA Admin**, or **Backup MUA Operator** permissions on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
31-
- Ensure that your subscriptions containing the Recovery Services vault as well as the Resource Guard (in different subscriptions or tenants) are registered to use the providers - **Microsoft.RecoveryServices** and **Microsoft.DataProtection** . For more information, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider-1).
29+
- The Resource Guard and the Recovery Services vault must be in the same Azure region.
30+
- The Backup admin must **not** have **Contributor**, **Backup MUA Admin**, or **Backup MUA Operator** permissions on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
31+
- The subscriptions containing the Recovery Services vault as well as the Resource Guard (in different subscriptions or tenants) must be registered to use the providers - **Microsoft.RecoveryServices** and **Microsoft.DataProtection** . For more information, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider-1).
3232

3333
Learn about various [MUA usage scenarios](./multi-user-authorization-concept.md?tabs=recovery-services-vault#usage-scenarios).
3434

@@ -51,7 +51,7 @@ To create the Resource Guard in a tenant different from the vault tenant, follow
5151
:::image type="content" source="./media/multi-user-authorization/resource-guards.png" alt-text="Screenshot shows how to search resource guards." lightbox="./media/multi-user-authorization/resource-guards.png":::
5252

5353
- Select **Create** to start creating a Resource Guard.
54-
- In the create blade, fill in the required details for this Resource Guard.
54+
- In the create pane, fill in the required details for this Resource Guard.
5555
- Make sure the Resource Guard is in the same Azure regions as the Recovery Services vault.
5656
- Also, it's helpful to add a description of how to get or request access to perform actions on associated vaults when needed. This description would also appear in the associated vaults to guide the backup admin on getting the required permissions. You can edit the description later if needed, but having a well-defined description at all times is encouraged.
5757

@@ -95,7 +95,7 @@ To exempt operations, follow these steps:
9595

9696
>[!Note]
9797
> You can't disable the protected operations - **Disable soft delete** and **Remove MUA protection**.
98-
1. Optionally, you can also update the description for the Resource Guard using this blade.
98+
1. Optionally, you can also update the description for the Resource Guard using this pane.
9999
1. Select **Save**.
100100

101101
:::image type="content" source="./media/multi-user-authorization/demo-resource-guard-properties.png" alt-text="Screenshot showing demo resource guard properties.":::
@@ -146,7 +146,7 @@ To update the operations that are to be excluded from being protected by the res
146146

147147
To enable MUA on a vault, the admin of the vault must have **Reader** role on the Resource Guard or subscription containing the Resource Guard. To assign the **Reader** role on the Resource Guard:
148148

149-
1. In the Resource Guard created above, go to the **Access Control (IAM)** blade, and then go to **Add role assignment**.
149+
1. In the Resource Guard created above, go to the **Access Control (IAM)** pane, and then go to **Add role assignment**.
150150

151151
:::image type="content" source="./media/multi-user-authorization/demo-resource-guard-access-control.png" alt-text="Screenshot showing demo resource guard-access control.":::
152152

@@ -335,9 +335,9 @@ Once the Backup admin raises a request for activating the **Backup MUA Operator*
335335
1. The Backup admin is informed by email (or other organizational alerting mechanisms) that their request is now approved.
336336
1. Once approved, the Backup admin can perform protected operations for the requested period.
337337

338-
## Performing a protected operation after approval
338+
## Perform a protected operation after approval
339339

340-
Once the Backup admin’s request for the **Backup MUA Operator** role on the Resource Guard is approved, they can perform protected operations on the associated vault. If the Resource Guard is in another directory, the Backup admin would need to authenticate themselves.
340+
After the Backup admin’s request for the **Backup MUA Operator** role on the Resource Guard is approved, they can perform protected operations on the associated vault. If the Resource Guard is in another directory, the Backup admin would need to authenticate themselves.
341341

342342
>[!NOTE]
343343
> If the access was assigned using a JIT mechanism, the **Backup MUA Operator** role is retracted at the end of the approved period. Else, the Security admin manually removes the **Backup MUA Operator** role assigned to the Backup admin to perform the critical operation.
@@ -412,19 +412,19 @@ The tenant ID is required if the resource guard exists in a different tenant.
412412

413413
::: zone pivot="vaults-backup-vault"
414414

415-
This article describes how to configure Multi-user authorization (MUA) for Azure Backup to add an additional layer of protection to critical operations on your Backup vault.
416-
417-
This article demonstrates Resource Guard creation in a different tenant that offers maximum protection. It also demonstrates how to request and approve requests for performing critical operations using [Microsoft Entra Privileged Identity Management](../active-directory/privileged-identity-management/pim-configure.md) in the tenant housing the Resource Guard. You can optionally use other mechanisms to manage JIT permissions on the Resource Guard as per your setup.
415+
This article describes how to configure Multi-User Authorization (MUA) for Azure Backup to enhance the security of critical operations on Backup vaults. It covers the creation of a Resource Guard in a separate tenant for maximum protection and demonstrates how to request and approve critical operation access using [Microsoft Entra Privileged Identity Management](../active-directory/privileged-identity-management/pim-configure.md) within the tenant hosting the Resource Guard. Alternatively, you can use other methods to manage just-in-time (JIT) permissions based on your organizational setup.
418416

419417
>[!NOTE]
420418
>- Multi-user authorization using Resource Guard for Backup vault is now generally available.
421419
>- Multi-user authorization for Azure Backup is available in all public Azure regions.
422420
423-
## Before you start
421+
## Prerequisites
422+
423+
Before you configure Multi-user authorization for a Backup vault, ensure that the following prerequisites are met:
424424

425-
- Ensure the Resource Guard and the Backup vault are in the same Azure region.
426-
- Ensure the Backup admin does **not** have **Contributor**, **Backup MUA Admin**, or **Backup MUA Operator** permissions on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
427-
- Ensure that your subscriptions contain the Backup vault as well as the Resource Guard (in different subscriptions or tenants) are registered to use the provider - **Microsoft.DataProtection**4. For more information, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider-1).
425+
- The Resource Guard and the Backup vault must be in the same Azure region.
426+
- The Backup admin must **not** have **Contributor**, **Backup MUA Admin**, or **Backup MUA Operator** permissions on the Resource Guard. You can choose to have the Resource Guard in another subscription of the same directory or in another directory to ensure maximum isolation.
427+
- The subscriptions contain the Backup vault as well as the Resource Guard (in different subscriptions or tenants) must be registered to use the provider - **Microsoft.DataProtection**4. For more information, see [Azure resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider-1).
428428

429429
Learn about various [MUA usage scenarios](./multi-user-authorization-concept.md?tabs=backup-vault#usage-scenarios).
430430

@@ -445,7 +445,7 @@ To create the Resource Guard in a tenant different from the vault tenant as a Se
445445
:::image type="content" source="./media/multi-user-authorization/resource-guards.png" alt-text="Screenshot showing resource guards for Backup vault." lightbox="./media/multi-user-authorization/resource-guards.png":::
446446

447447
1. Select **Create** to create a Resource Guard.
448-
1. In the Create blade, fill in the required details for this Resource Guard.
448+
1. In the Create pane, fill in the required details for this Resource Guard.
449449
- Ensure that the Resource Guard is in the same Azure region as the Backup vault.
450450
- Add a description on how to request access to perform actions on associated vaults when needed. This description appears in the associated vaults to guide the Backup admin on how to get the required permissions.
451451

@@ -482,7 +482,7 @@ The Backup admin must have **Reader** role on the Resource Guard or subscription
482482

483483
To assign the **Reader** role on the Resource Guard, follow these steps:
484484

485-
1. In the Resource Guard created above, go to the **Access Control (IAM)** blade, and then go to **Add role assignment**.
485+
1. In the Resource Guard created above, go to the **Access Control (IAM)** pane, and then go to **Add role assignment**.
486486

487487
:::image type="content" source="./media/multi-user-authorization/demo-resource-guard-access-control.png" alt-text="Screenshot showing demo resource guard-access control for Backup vault.":::
488488

articles/backup/quick-backup-hana-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Quickstart - Back up an SAP HANA database with Azure CLI
33
description: In this quickstart, learn how to create a Recovery Services vault, enable protection on an SAP HANA System Replication database, and create the initial recovery point with Azure CLI.
44
ms.devlang: azurecli
55
ms.topic: quickstart
6-
ms.date: 06/17/2024
6+
ms.date: 12/10/2024
77
ms.custom: mvc, devx-track-azurecli, mode-api, engagement-fy24
88
ms.service: azure-backup
99
author: jyothisuri

articles/business-process-tracking/create-business-process.md

Lines changed: 4 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,15 @@
11
---
2-
title: Create business processes
2+
title: Create Business Processes
33
description: Model a business process to visualize and map transactions to Azure resources, such as Standard workflows in Azure Logic Apps.
44
ms.service: azure-business-process-tracking
55
ms.topic: how-to
66
ms.reviewer: estfan, azla
7-
ms.date: 06/07/2024
7+
ms.date: 06/09/2025
88

99
# CustomerIntent: As a business analyst or business SME, I want a way to visualize my organization's business processes so I can map them to the actual resources that implement these business use cases and scenarios.
1010
---
1111

12-
# Create a business process to add business context about Azure resources using Azure Business Process Tracking (Preview)
13-
14-
> [!NOTE]
15-
>
16-
> This capability is in preview and is subject to the
17-
> [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
12+
# Create a business process to add business context about Azure resources using Azure Business Process Tracking
1813

1914
To add business context around the Azure resources in an integration solution, you can visualize business processes flows for the tasks implemented by these resources. In Azure Business Process Tracking, a business process is a series of stages that represent the tasks that flow through a real-world business scenario. This business process also specifies a single business identifier or *transaction ID*, such as a ticket number, order number, case number, and so on, to identify a transaction that exists across all the stages in the business process and to correlate those stages together.
2015

@@ -56,7 +51,7 @@ After you define a business process, you can then map each stage to actual Azure
5651

5752
> [!NOTE]
5853
>
59-
> Although Azure Business Process Tracking doesn't incur charges during preview, Azure Data
54+
> Although Azure Business Process Tracking doesn't incur charges at this time, Azure Data
6055
> Explorer incurs charges, based on the selected pricing option. For more information, see
6156
> [Azure Data Explorer pricing](https://azure.microsoft.com/pricing/details/data-explorer/#pricing).
6257

articles/business-process-tracking/deploy-business-process.md

Lines changed: 6 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,14 @@
11
---
2-
title: Deploy business process and tracking profile to Azure
2+
title: Deploy Business Process and Tracking Profile to Azure
33
description: Deploy your business process and tracking profile to Standard logic app resources in Azure Logic Apps.
44
ms.service: azure-business-process-tracking
55
ms.topic: how-to
66
ms.reviewer: estfan, azla
7-
ms.date: 06/07/2024
7+
ms.date: 06/09/2025
88
# CustomerIntent: As an integration developer, I want to deploy previously created business processes and tracking profiles to deployed Standard logic app resources so I can capture and track key business data moving through my deployed resources.
99
---
1010

11-
# Deploy a business process and tracking profile to Azure (Preview)
12-
13-
> [!NOTE]
14-
>
15-
> This capability is in preview and is subject to the
16-
> [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
11+
# Deploy a business process and tracking profile to Azure
1712

1813
After you map your business process stages to the operations and outputs in Standard logic app workflows, you're ready to deploy your business process and tracking profile to Azure.
1914

@@ -81,7 +76,7 @@ After the mapped Standard logic app workflows run and emit the data that you spe
8176

8277
1. To create custom experiences for the data provided here, check out [Azure Workbooks](/azure/azure-monitor/visualize/workbooks-overview) or [Azure Data Explorer with Power BI](/azure/data-explorer/power-bi-data-connector?tabs=web-ui).
8378

84-
## Next step
79+
## Related content
8580

86-
> [!div class="nextstepaction"]
87-
> [Manage business processes](manage-business-process.md)
81+
- [Set up continuous integration and deployment](set-up-continuous-integration-deployment.md)
82+
- [Manage business processes](manage-business-process.md)
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
---
2+
ms.service: azure-logic-apps
3+
ms.topic: include
4+
author: ecfan
5+
ms.author: estfan
6+
ms.date: 06/08/2022
7+
---
8+
9+
Applies to: **Azure Logic Apps (Standard)**

0 commit comments

Comments
 (0)