Skip to content

Commit ed10834

Browse files
authored
Merge pull request #262765 from MicrosoftDocs/main
Publish to live, Tuesday 4 AM PST, 1/9
2 parents 2451dda + a103b32 commit ed10834

21 files changed

+33444
-33352
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 33248 additions & 32724 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -914,6 +914,11 @@
914914
"source_path_from_root": "/articles/defender-for-cloud/tutorial-security-incident.md",
915915
"redirect_url": "/azure/defender-for-cloud/managing-and-responding-alerts",
916916
"redirect_document_id": true
917+
},
918+
{
919+
"source_path_from_root": "/articles/defender-for-cloud/how-to-migrate-to-built-in.md",
920+
"redirect_url": "/azure/defender-for-cloud/how-to-transition-to-built-in",
921+
"redirect_document_id": true
917922
}
918923
]
919924
}

.openpublishing.redirection.json

Lines changed: 2 additions & 525 deletions
Large diffs are not rendered by default.

articles/azure-app-configuration/cli-samples.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ author: maud-lv
55
ms.author: malev
66
ms.service: azure-app-configuration
77
ms.topic: sample
8-
ms.date: 08/09/2022
8+
ms.date: 1/9/2024
99
ms.custom: devx-track-azurecli, devdivchpfy22
1010
---
1111

1212
# Azure CLI samples
1313

14-
The following table includes links to bash scripts for Azure App Configuration by using the [az appconfig](/cli/azure/appconfig) commands in the Azure CLI:
14+
The following table includes links to Azure CLI scripts for Azure App Configuration using the [az appconfig](/cli/azure/appconfig) commands in the Azure CLI:
1515

1616
| Script | Description |
1717
|-|-|

articles/azure-app-configuration/pull-key-value-devops-pipeline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ The following parameters are used by the Azure App Configuration task:
8787
- **Selection Mode**: Specifies how the key-values read from a configuration store are selected. The 'Default' selection mode allows the use of key and label filters. The 'Snapshot' selection mode allows key-values to be selected from a snapshot. Default value is **Default**.
8888
- **Key Filter**: The filter can be used to select what key-values are requested from Azure App Configuration. A value of * will select all key-values. For more information on, see [Query key values](concept-key-value.md#query-key-values).
8989
- **Label**: Specifies which label should be used when selecting key-values from the App Configuration store. If no label is provided, then key-values with the no label will be retrieved. The following characters are not allowed: , *.
90-
-**Snapshot Name**: Specifies snapshot from which key-values should be retrieved in Azure App Configuration.
90+
- **Snapshot Name**: Specifies snapshot from which key-values should be retrieved in Azure App Configuration.
9191
- **Trim Key Prefix**: Specifies one or more prefixes that should be trimmed from App Configuration keys before setting them as variables. Multiple prefixes can be separated by a new-line character.
9292
- **Suppress Warning For Overridden Keys**: Default value is unchecked. Specifies whether to show warnings when existing keys are overridden. Enable this option when it is expected that the key-values downloaded from App Configuration have overlapping keys with what exists in pipeline variables.
9393

articles/azure-monitor/alerts/alerts-log-alert-query-samples.md

Lines changed: 20 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -10,13 +10,24 @@ ms.reviewer: nolavime
1010

1111
# Sample log alert queries that include ADX and ARG
1212

13-
A log alert rule monitors a resource by using a Log Analytics query to evaluate resource logs at a set frequency. You can include data from Azure Data Explorer and Azure Resource Graph in your log alert rule queries.
13+
A log alert rule monitors a resource by using a Log Analytics query to evaluate logs at a set frequency. You can include data from Azure Data Explorer and Azure Resource Graph in your log alert rule queries.
1414

1515
This article provides examples of log alert rule queries that use Azure Data Explorer and Azure Resource Graph. For more information about creating a log alert rule, see [Create a log alert rule](./alerts-create-log-alert-rule.md).
1616

17-
## Query that checks virtual machine health
17+
## Queries that check virtual machine health
1818

19-
This query finds virtual machines that are marked as critical and that had a heartbeat more than 24 hours ago, but that haven't had a heartbeat in the last 2 minutes.
19+
This query finds virtual machines marked as critical that haven't had a heartbeat in the last 2 minutes.
20+
21+
```kusto
22+
arg("").Resources
23+
| where type == "microsoft.compute/virtualmachines"
24+
| summarize LastCall = max(case(isnull(TimeGenerated), make_datetime(1970, 1, 1), TimeGenerated)) by name, id
25+
| extend SystemDown = case(LastCall < ago(2m), 1, 0)
26+
| where SystemDown == 1
27+
```
28+
29+
30+
This query finds virtual machines marked as critical that had a heartbeat more than 24 hours ago, but that haven't had a heartbeat in the last 2 minutes.
2031

2132
```kusto
2233
{
@@ -38,15 +49,15 @@ This query finds virtual machines that are marked as critical and that had a hea
3849
## Query that filters virtual machines that need to be monitored
3950

4051
```kusto
41-
{
52+
{
4253
let RuleGroupTags = dynamic(['Linux']);
43-
Perf | where ObjectName == 'Processor' and CounterName == '% Idle Time' and (InstanceName == '_Total' or InstanceName == 'total')
54+
Perf | where ObjectName == 'Processor' and CounterName == '% Idle Time' and (InstanceName in ('_Total,'total'))
4455
| extend CpuUtilisation = (100 - CounterValue)   
4556
| join kind=inner hint.remote=left (arg("").Resources
46-
| where type =~ 'Microsoft.Compute/virtualMachines'
57+
| where type =~ 'Microsoft.Compute/virtualMachines'
4758
| project _ResourceId=tolower(id), tags) on _ResourceId
4859
| project-away _ResourceId1
49-
| where (isnull(tags.monitored) or tolower(tostring(tags.monitored)) != 'false') and (tostring(tags.monitorRuleGroup) in (RuleGroupTags) or isnull(tags.monitorRuleGroup) or tostring(tags.monitorRuleGroup) == '')
60+
| where (tostring(tags.monitorRuleGroup) in (RuleGroupTags))
5061
}
5162
```
5263

@@ -68,10 +79,10 @@ This query finds virtual machines that are marked as critical and that had a hea
6879
```kusto
6980
{
7081
arg("").resourcechanges
71-
| extend changeTime = todatetime(properties.changeAttributes.timestamp), targetResourceId = tostring(properties.targetResourceId),
82+
| extend changeTime = todatetime(properties.changeAttributes.timestamp),
7283
changeType = tostring(properties.changeType),targetResourceType = tostring(properties.targetResourceType),
7384
changedBy = tostring(properties.changeAttributes.changedBy)
74-
| where changeType == "Create"
85+
| where changeType == "Create" and changeTime <ago(1h)
7586
| project changeTime,targetResourceId,changedBy
7687
}
7788
```

articles/defender-for-cloud/TOC.yml

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -517,22 +517,22 @@
517517
displayName: mde, tvm, vulnerability, va, arc, hybrid, defender vulnerability
518518
management
519519
href: deploy-vulnerability-assessment-defender-vulnerability-management.md
520-
- name: Enable vulnerability scanning with the integrated Qualys scanner
521-
displayName: qualys, va, vulnerability, arc, hybrid
522-
href: deploy-vulnerability-assessment-vm.md
523520
- name: Enable vulnerability scanning with a Bring Your Own License (BYOL)
524521
solution
525522
displayName: qualys, rapid7, vulnerability
526523
href: deploy-vulnerability-assessment-byol-vm.md
527524
- name: Automatically enable a vulnerability assessment solution
528525
displayName: qualys, rapid7, vulnerability, auto provision
529526
href: auto-deploy-vulnerability-assessment.md
530-
- name: Transition to the integrated Microsoft Defender Vulnerability Management vulnerability assessment solution
527+
- name: Transition to Microsoft Defender Vulnerability Management for servers
531528
displayName: qualys, rapid7, vulnerability, migrate, transition, Microsoft Defender Vulnerability Management, mdvm
532529
href: how-to-transition-to-built-in.md
533530
- name: Common questions
534531
displayName: questions, common, MDVM, Qualys, BYOL, bring your own license, agent, consolidated, vulnerability, management, faq, frequently asked questions
535532
href: faq-scanner-detection.yml
533+
- name: Enable vulnerability scanning with the integrated Qualys scanner (deprecated)
534+
displayName: qualys, va, vulnerability, arc, hybrid
535+
href: deploy-vulnerability-assessment-vm.md
536536
- name: Enable just-in-time access on VMs
537537
displayName: jit, management, ports
538538
href: just-in-time-access-usage.md
@@ -599,9 +599,6 @@
599599
- name: How does Defender for Containers work?
600600
displayName: containers
601601
href: defender-for-containers-architecture.md
602-
- name: Vulnerability assessment for Azure powered by Qualys
603-
displayName: ACR, registry, images, qualys
604-
href: defender-for-containers-vulnerability-assessment-azure.md
605602
- name: Vulnerability assessments powered by Microsoft Defender Vulnerability Management
606603
items:
607604
- name: Vulnerability assessments for Azure
@@ -622,12 +619,15 @@
622619
href: transition-to-defender-vulnerability-management.md
623620
- name: Common questions
624621
href: common-questions-microsoft-defender-vulnerability-management.md
625-
- name: Vulnerability assessment for AWS powered by Trivy (deprecated)
626-
displayName: AWS, ECR, registry, images, qualys
627-
href: defender-for-containers-vulnerability-assessment-elastic.md
628622
- name: Kubernetes data plane hardening
629623
displayName: k8s, containers, aks
630624
href: kubernetes-workload-protections.md
625+
- name: Vulnerability assessment for Azure powered by Qualys (Deprecated)
626+
displayName: ACR, registry, images, qualys
627+
href: defender-for-containers-vulnerability-assessment-azure.md
628+
- name: Vulnerability assessment for AWS powered by Trivy (deprecated)
629+
displayName: AWS, ECR, registry, images, qualys
630+
href: defender-for-containers-vulnerability-assessment-elastic.md
631631
- name: Defender for Kubernetes (deprecated)
632632
displayName: clusters, k8s, aks
633633
href: defender-for-kubernetes-introduction.md

articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,24 @@
11
---
2-
title: Vulnerability assessment for Azure powered by Qualys
2+
title: Vulnerability assessment for Azure powered by Qualys (Deprecated)
33
description: Learn how to use Defender for Containers to scan images in your Azure Container Registry to find vulnerabilities.
44
author: dcurwin
55
ms.author: dacurwin
6-
ms.date: 12/19/2023
6+
ms.date: 12/25/2023
77
ms.topic: how-to
88
ms.custom: ignite-2022, build-2023
99
---
1010

11-
# Vulnerability assessment for Azure powered by Qualys
11+
# Vulnerability assessment for Azure powered by Qualys (Deprecated)
12+
13+
> [!IMPORTANT]
14+
>
15+
> The Defender for Cloud Containers Vulnerability Assessment powered by Qualys is now on a retirement path completing on **March 1st, 2024**. If you are currently using container vulnerability assessment powered by Qualys, start planning your transition to [Vulnerability assessments for Azure with Microsoft Defender Vulnerability Management](agentless-vulnerability-assessment-azure.md).
16+
>
17+
> - For more information about our decision to unify our vulnerability assessment offering with Microsoft Defender Vulnerability Management, see [this blog post](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-cloud-unified-vulnerability-assessment-powered-by/ba-p/3990112).
18+
>
19+
> - For more information about migrating to our new container vulnerability assessment offering powered by Microsoft Defender Vulnerability Management, see [Transition from Qualys to Microsoft Defender Vulnerability Management](transition-to-defender-vulnerability-management.md).
20+
>
21+
> - For common questions about the transition to Microsoft Defender Vulnerability Management, see [Common questions about the Microsoft Defender Vulnerability Management solution](common-questions-microsoft-defender-vulnerability-management.md).
1222
1323
Vulnerability assessment for Azure, powered by Qualys, is an out-of-box solution that empowers security teams to easily discover and remediate vulnerabilities in Linux container images, with zero configuration for onboarding, and without deployment of any agents.
1424

articles/defender-for-cloud/deploy-vulnerability-assessment-defender-vulnerability-management.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,22 @@ title: Enable vulnerability scanning with Microsoft Defender Vulnerability Manag
33
description: Enable, deploy, and use Microsoft Defender Vulnerability Management with Microsoft Defender for Cloud to discover weaknesses in your Azure and hybrid machines
44
ms.topic: how-to
55
ms.custom: ignite-2022
6-
ms.date: 06/29/2023
6+
ms.date: 01/08/2024
77
ms.author: dacurwin
88
author: dcurwin
99
---
1010

1111
# Enable vulnerability scanning with Microsoft Defender Vulnerability Management
1212

13+
> [!IMPORTANT]
14+
> Defender for Server's vulnerability assessment solution powered by Qualys, is on a retirement path that set to complete on **May 1st, 2024**. If you are a currently using the built-in vulnerability assessment powered by Qualys, you should plan to [transition to the Microsoft Defender Vulnerability Management vulnerability scanning solution](how-to-transition-to-built-in.md).
15+
>
16+
> For more information about our decision to unify our vulnerability assessment offering with Microsoft Defender Vulnerability Management, see [this blog post](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-cloud-unified-vulnerability-assessment-powered-by/ba-p/3990112).
17+
>
18+
> Check out the [common questions](faq-scanner-detection.yml) regarding the transition to Microsoft Defender Vulnerability Management.
19+
>
20+
> Customers who want to continue using Qualys, can do so with the [Bring Your Own License (BYOL) method](deploy-vulnerability-assessment-byol-vm.md).
21+
1322
[Microsoft Defender Vulnerability Management](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management) is included with Microsoft Defender for Servers and uses built-in and agentless scanners to:
1423

1524
- Discover vulnerabilities and misconfigurations in near real time

articles/defender-for-cloud/deploy-vulnerability-assessment-vm.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,23 @@
11
---
2-
title: Enable vulnerability scanning with the integrated Qualys scanner
2+
title: Enable vulnerability scanning with the integrated Qualys scanner (deprecated)
33
description: Install a vulnerability assessment solution on your Azure machines to get recommendations in Microsoft Defender for Cloud that can help you protect your Azure and hybrid machines
44
author: dcurwin
55
ms.author: dacurwin
66
ms.topic: how-to
77
ms.custom: ignite-2022
8-
ms.date: 12/18/2023
8+
ms.date: 01/08/2024
99
---
1010

11-
# Enable vulnerability scanning with the integrated Qualys scanner
11+
# Enable vulnerability scanning with the integrated Qualys scanner (deprecated)
12+
13+
> [!IMPORTANT]
14+
> Defender for Server's vulnerability assessment solution powered by Qualys, is on a retirement path that set to complete on **May 1st, 2024**. If you are a currently using the built-in vulnerability assessment powered by Qualys, you should plan to [transition to the Microsoft Defender Vulnerability Management vulnerability scanning solution](how-to-transition-to-built-in.md).
15+
>
16+
> For more information about our decision to unify our vulnerability assessment offering with Microsoft Defender Vulnerability Management, see [this blog post](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-cloud-unified-vulnerability-assessment-powered-by/ba-p/3990112).
17+
>
18+
> Check out the [common questions](faq-scanner-detection.yml) regarding the transition to Microsoft Defender Vulnerability Management.
19+
>
20+
> Customers who want to continue using Qualys, can do so with the [Bring Your Own License (BYOL) method](deploy-vulnerability-assessment-byol-vm.md).
1221
1322
A core component of every cyber risk and security program is the identification and analysis of vulnerabilities. Defender for Cloud regularly checks your connected machines to ensure they're running vulnerability assessment tools.
1423

0 commit comments

Comments
 (0)