Skip to content

Commit e339355

Browse files
authored
Merge pull request #281419 from MicrosoftDocs/main
Publish to live, Monday 4 AM PST, 7/22
2 parents 4153e5e + 3bd7190 commit e339355

32 files changed

+327
-179
lines changed

articles/ai-studio/how-to/prompt-flow-tools/prompt-flow-tools-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,15 +20,15 @@ author: lgayhardt
2020
The following table provides an index of tools in prompt flow.
2121

2222
| Tool name | Description | Package name |
23-
|------|-----------|-------------|--------------|
23+
|------|-----------|-------------|
2424
| [LLM](./llm-tool.md) | Use large language models (LLM) with the Azure OpenAI Service for tasks such as text completion or chat. | [promptflow-tools](https://pypi.org/project/promptflow-tools/) |
2525
| [Prompt](./prompt-tool.md) | Craft a prompt by using Jinja as the templating language. | [promptflow-tools](https://pypi.org/project/promptflow-tools/) |
2626
| [Python](./python-tool.md) | Run Python code. | [promptflow-tools](https://pypi.org/project/promptflow-tools/) |
2727
| [Azure OpenAI GPT-4 Turbo with Vision](./azure-open-ai-gpt-4v-tool.md) | Use an Azure OpenAI GPT-4 Turbo with Vision model deployment to analyze images and provide textual responses to questions about them. | [promptflow-tools](https://pypi.org/project/promptflow-tools/) |
2828
| [Content Safety (Text)](./content-safety-tool.md) | Use Azure AI Content Safety to detect harmful content. | [promptflow-tools](https://pypi.org/project/promptflow-tools/) |
2929
| [Embedding](./embedding-tool.md) | Use Azure OpenAI embedding models to create an embedding vector that represents the input text. | [promptflow-tools](https://pypi.org/project/promptflow-tools/) |
3030
| [Serp API](./serp-api-tool.md) | Use Serp API to obtain search results from a specific search engine. | [promptflow-tools](https://pypi.org/project/promptflow-tools/) |
31-
| [Index Lookup](./index-lookup-tool.md) | Search a vector-based query for relevant results using one or more text queries. | [promptflow-vectordb](https://pypi.org/project/promptflow-vectordb/) |
31+
| [Index Lookup](./index-lookup-tool.md)<sup>1</sup> | Search a vector-based query for relevant results using one or more text queries. | [promptflow-vectordb](https://pypi.org/project/promptflow-vectordb/) |
3232

3333
<sup>1</sup> The Index Lookup tool replaces the three deprecated legacy index tools: Vector Index Lookup, Vector DB Lookup, and Faiss Index Lookup. If you have a flow that contains one of those tools, follow the [migration steps](./index-lookup-tool.md#migrate-from-legacy-tools-to-the-index-lookup-tool) to upgrade your flow.
3434

articles/azure-monitor/agents/data-collection-log-text.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,9 +62,8 @@ The incoming stream of data includes the columns in the following table.
6262
## Custom table
6363
Before you can collect log data from a text file, you must create a custom table in your Log Analytics workspace to receive the data. The table schema must match the data you are collecting, or you must add a transformation to ensure that the output schema matches the table.
6464

65-
>
66-
> Warning: You shouldn’t use an existing custom log table used by MMA agents. Your MMA agents won't be able to write to the table once the first AMA agent writes to the table. You should create a new table for AMA to use to prevent MMA data loss.
67-
>
65+
> [!Warning]
66+
> You shouldn’t use an existing custom log table used by MMA agents. Your MMA agents won't be able to write to the table once the first AMA agent writes to the table. You should create a new table for AMA to use to prevent MMA data loss.
6867
6968

7069
For example, you can use the following PowerShell script to create a custom table with `RawData` and `FilePath`. You wouldn't need a transformation for this table because the schema matches the default schema of the incoming stream.

articles/azure-monitor/essentials/activity-log.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -155,8 +155,6 @@ You can also access activity log events by using the following methods:
155155
- Use the [Get-AzLog](/powershell/module/az.monitor/get-azlog) cmdlet to retrieve the activity log from PowerShell. See [Azure Monitor PowerShell samples](../powershell-samples.md#retrieve-activity-log).
156156
- Use [az monitor activity-log](/cli/azure/monitor/activity-log) to retrieve the activity log from the CLI. See [Azure Monitor CLI samples](../cli-samples.md#view-activity-log).
157157
- Use the [Azure Monitor REST API](/rest/api/monitor/) to retrieve the activity log from a REST client.
158-
-
159-
-
160158
## Legacy collection methods
161159

162160
> [!NOTE]

articles/business-continuity-center/tutorial-view-protectable-resources.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Tutorial - View protectable resources
33
description: In this tutorial, learn how to view your resources that are currently not protected by any solution using Azure Business Continuity center.
44
ms.topic: tutorial
5-
ms.date: 03/29/2024
5+
ms.date: 07/22/2024
66
ms.service: azure-business-continuity-center
77
ms.custom:
88
- ignite-2023
@@ -18,7 +18,7 @@ This tutorial shows you how to view your resources that are currently not protec
1818

1919
Before you start this tutorial:
2020

21-
- Review supported regions for ABC Center.
21+
- Review [supported regions for ABC Center](business-continuity-center-support-matrix.md#supported-regions).
2222
- Ensure you have the required resource permissions to view them in the ABC center.
2323

2424
## View protectable resources

articles/defender-for-cloud/faq-vulnerability-assessments.yml

Lines changed: 12 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ metadata:
55
services: defender-for-cloud
66
ms.author: dacurwin
77
author: dcurwin
8-
manager: raynew
98
ms.topic: faq
109
ms.date: 06/20/2023
1110
title: Common questions about vulnerability assessment
@@ -14,6 +13,18 @@ summary: |
1413
sections:
1514
- name: Ignored
1615
questions:
16+
17+
- question: |
18+
What is the Auto-Provisioning feature for BYOL, and can it work on multiple solutions?
19+
answer: |
20+
The Defender for Cloud BYOL integration allows only one solution to have auto-provisioning enabled per subscription. This feature scans all unhealthy machines in the subscription (those without any VA solution installed) and automatically remediates them by installing the selected VA solution. Auto-provisioning will use the single selected BYOL solution for remediation. If no solution is selected or if multiple solutions have auto-provisioning enabled, the system will not perform auto-remediation, as it can't implicitly decide which solution to prioritize.
21+
22+
- question: |
23+
Why do I have to specify a resource group when configuring a Bring Your Own License (BYOL) solution?
24+
answer: |
25+
When you set up your solution, you must choose a resource group to attach it to. The solution isn't an Azure resource, so it won't be included in the list of the resource group’s resources. Nevertheless, it's attached to that resource group. If you later delete the resource group, the BYOL solution is unavailable.
26+
27+
1728
- question: |
1829
Are there any additional charges for the Qualys license?
1930
answer: |
@@ -99,7 +110,3 @@ sections:
99110
There are multiple Qualys platforms across various geographic locations. The SOC CIDR and URLs differ depending on the host platform of your Qualys subscription. [Identify your Qualys host platform](https://www.qualys.com/platform-identification/).
100111
101112
102-
- question: |
103-
Why do I have to specify a resource group when configuring a Bring Your Own License (BYOL) solution?
104-
answer: |
105-
When you set up your solution, you must choose a resource group to attach it to. The solution isn't an Azure resource, so it won't be included in the list of the resource group’s resources. Nevertheless, it's attached to that resource group. If you later delete the resource group, the BYOL solution is unavailable.

articles/defender-for-cloud/recommendations-reference-ai.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,10 +33,20 @@ This recommendation replaces the old recommendation *Cognitive Services accounts
3333

3434
**Description**: By restricting network access, you can ensure that only allowed networks can access the service. This can be achieved by configuring network rules so that only applications from allowed networks can access the Azure AI service resource.
3535

36-
This recommendation replaces the old recommendation *Cognitive Services accounts should restrict network access*. It was formerly in category Cognitive Services and Cognitive Search, and was updated to comply with the Azure AI Services naming format and align with the relevant resources.
36+
This recommendation replaces the old recommendation *Cognitive Services accounts should restrict network access*. It was formerly in category Cognitive Services and Cognitive Search, and was updated to comply with the Azure AI Services naming format and align with the relevant resources.
3737
**Severity**: Medium
3838

3939

40+
### [(Enable if required) Azure AI Services resources should encrypt data at rest with a customer-managed key (CMK)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/18bf29b3-a844-e170-2826-4e95d0ba4dc9/showSecurityCenterCommandBar~/false)
41+
42+
**Description**: Using customer-managed keys to encrypt data at rest provides more control over the key lifecycle, including rotation and management. This is particularly relevant for organizations with related compliance requirements.
43+
44+
This is not assessed by default and should only be applied when required by compliance or restrictive policy requirements. If not enabled, the data will be encrypted using platform-managed keys. To implement this, update the 'Effect' parameter in the Security Policy for the applicable scope. (Related policy: [Azure AI Services resources should encrypt data at rest with a customer-managed key (CMK)](/azure/ai-services/openai/how-to/use-your-data-securely))
45+
46+
This recommendation replaces the old recommendation *Cognitive services accounts should enable data encryption using customer keys*. It was formerly in category Data recommendations, and was updated to comply with the Azure AI Services naming format and align with the relevant resources.
47+
48+
**Severity**: Low
49+
4050
### Resource logs in Azure Machine Learning Workspaces should be enabled (Preview)
4151

4252
**Description & related policy**: Resource logs enable recreating activity trails to use for investigation purposes when a security incident occurs or when your network is compromised.

articles/defender-for-cloud/recommendations-reference-data.md

Lines changed: 0 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -82,15 +82,6 @@ Manage encryption at rest of your Azure Machine Learning workspace data with cus
8282
**Severity**: Medium
8383

8484

85-
### [(Enable if required) Cognitive Services accounts should enable data encryption with a customer-managed key (CMK)](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/18bf29b3-a844-e170-2826-4e95d0ba4dc9)
86-
87-
**Description**: Recommendations to use customer-managed keys for encryption of data at rest are not assessed by default, but are available to enable for applicable scenarios. Data is encrypted automatically using platform-managed keys, so the use of customer-managed keys should only be applied when obligated by compliance or restrictive policy requirements.
88-
To enable this recommendation, navigate to your Security Policy for the applicable scope, and update the *Effect* parameter for the corresponding policy to audit or enforce the use of customer-managed keys. Learn more in [Manage security policies](tutorial-security-policy.md).
89-
Customer-managed keys (CMK) are commonly required to meet regulatory compliance standards. CMKs enable the data stored in Cognitive Services to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more about CMK encryption at <https://aka.ms/cosmosdb-cmk>.
90-
(Related policy: [Cognitive Services accounts should enable data encryption with a customer-managed key?(CMK)](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f67121cc7-ff39-4ab8-b7e3-95b84dab487d))
91-
92-
**Severity**: Low
93-
9485
### [(Enable if required) MySQL servers should use customer-managed keys to encrypt data at rest](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/6b51b7f7-cbed-75bf-8a02-43384bf47562)
9586

9687
**Description**: Recommendations to use customer-managed keys for encryption of data at rest are not assessed by default, but are available to enable for applicable scenarios. Data is encrypted automatically using platform-managed keys, so the use of customer-managed keys should only be applied when obligated by compliance or restrictive policy requirements.

articles/defender-for-cloud/release-notes-recommendations-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ New and updated recommendations and alerts are added to the table in date order.
4848
| ----------- | ------------------------------ | ------------------------------------------------------------ | ------------------------------------------------------------ |
4949
| June 28 | Recommendation | GA | [Azure DevOps repositories should require minimum two-reviewer approval for code pushes](recommendations-reference-devops.md#preview-azure-devops-repositories-should-require-minimum-two-reviewer-approval-for-code-pushes) |
5050
| June 28 | Recommendation | GA | [Azure DevOps repositories should not allow requestors to approve their own Pull Requests](recommendations-reference-devops.md#preview-azure-devops-repositories-should-not-allow-requestors-to-approve-their-own-pull-requests) |
51-
| June 28 | Recommendation | GA | [GitHub organizations should not make action secrets accessible to all repositories](recommendations-reference-devops.md#github-organizations-should-not-make-action-secrets-accessible-to-all repositories) |
51+
| June 28 | Recommendation | GA | [GitHub organizations should not make action secrets accessible to all repositories](recommendations-reference-devops.md#github-organizations-should-not-make-action-secrets-accessible-to-all-repositories) |
5252
| June 27 | Alert | Deprecation | `Security incident detected suspicious source IP activity`<br><br/> Severity: Medium/High |
5353
| June 27 | Alert | Deprecation | `Security incident detected on multiple resources`<br><br/> Severity: Medium/High |
5454
| June 27 | Alert | Deprecation | `Security incident detected compromised machine`<br><br/> Severity: Medium/High |

articles/defender-for-cloud/secrets-scanning.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,20 @@ Defender for Cloud provides secrets scanning for virtual machines, and for cloud
2323
- **Cloud deployments**: Agentless secrets scanning across multicloud infrastructure-as-code deployment resources.
2424
- **Azure DevOps**: [Scanning to discover exposed secrets in Azure DevOps](defender-for-devops-introduction.md).
2525

26+
## Prerequisites
27+
28+
Required roles and permissions:
29+
30+
- Security Reader
31+
32+
- Security Admin
33+
34+
- Reader
35+
36+
- Contributor
37+
38+
- Owner
39+
2640
## Deploying secrets scanning
2741

2842
Secrets scanning is provided as a feature in Defender for Cloud plans:

articles/hdinsight/benefits-of-migrating-to-hdinsight-40.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Benefits of migrating to Azure HDInsight 4.0.
33
description: Learn the benefits of migrating to Azure HDInsight 4.0.
44
ms.service: hdinsight
55
ms.topic: conceptual
6-
ms.date: 10/16/2023
6+
ms.date: 07/22/2024
77
---
88
# Significant version changes in HDInsight 4.0 and advantages
99

@@ -27,7 +27,7 @@ HDInsight 4.0 has several advantages over HDInsight 3.6. Here's an overview of w
2727
**Hive**
2828
- Advanced features
2929
- LLAP workload management
30-
- LLAP Support JDBC, Druid and Kafka connectors
30+
- LLAP Support JDBC, Druid, and Kafka connectors
3131
- Better SQL features – Constraints and default values
3232
- Surrogate Keys
3333
- Information schema.
@@ -95,14 +95,14 @@ Set synchronization of partitions to occur every 10 minutes expressed in seconds
9595

9696

9797
> [!WARNING]
98-
> With the `management.task` running every 10 minutes, there will be pressure on the SQL server DTU.
99-
>
98+
> With the `management.task` running every 10 minutes, there will be pressure on the SQL server DTU. This feature also adds cost to Storage access as the partition management threads runs at regular intervals even when cluster is idle.
99+
100100
You can verify the output from Microsoft Azure portal.
101101

102102
:::image type="content" source="./media/hdinsight-migrate-to-40/hive-verify-output.png" alt-text="Screenshot showing compute utilization graph.":::
103103

104104
Hive drops the metadata and corresponding data in any partition created after the retention period. You express the retention time using a numeral and the following character or characters.
105-
Hive drops the metadata and corresponding data in any partition created after the retention period. You express the retention time using a numeral and the following character(s).
105+
Hive drops the metadata and corresponding data in any partition created after the retention period. You express the retention time using a numeral and the following characters.
106106

107107
```
108108
ms (milliseconds)
@@ -189,7 +189,7 @@ More information, see [Hive - Materialized Views - Microsoft Tech Community](htt
189189

190190
Use the built-in `SURROGATE_KEY` user-defined function (UDF) to automatically generate numerical Ids for rows as you enter data into a table. The generated surrogate keys can replace wide, multiple composite keys.
191191

192-
Hive supports the surrogate keys on ACID tables only. The table you want to join using surrogate keys can't have column types that need casting. These data types must be primitives, such as INT or `STRING`.
192+
Hive supports the surrogate keys on ACID tables only. The table you want to join using surrogate keys can't have column types that need to cast. These data types must be primitives, such as INT or `STRING`.
193193

194194
Joins using the generated keys are faster than joins using strings. Using generated keys doesn't force data into a single node by a row number. You can generate keys as abstractions of natural keys. Surrogate keys have an advantage over UUIDs, which are slower and probabilistic.
195195

0 commit comments

Comments
 (0)