Skip to content

Commit f410ee7

Browse files
authored
Merge pull request #260790 from MicrosoftDocs/main
Publish to live, Sunday 4 AM PST, 12/10
2 parents 0a35bb3 + 070c70b commit f410ee7

22 files changed

+132
-47
lines changed

articles/api-management/self-hosted-gateway-settings-reference.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,9 @@ ms.author: danlep
1212

1313
# Reference: Self-hosted gateway container configuration settings
1414

15-
This article provides a reference for required and optional settings that are used to configure the API Management [self-hosted gateway container](self-hosted-gateway-overview.md).
15+
This article provides a reference for required and optional settings that are used to configure the API Management [self-hosted gateway container](self-hosted-gateway-overview.md).
16+
17+
To learn more about our (Kubernetes) production guidance, we recommend reading [this article](how-to-self-hosted-gateway-on-kubernetes-in-production.md).
1618

1719
> [!IMPORTANT]
1820
> This reference applies only to the self-hosted gateway v2. Minimum versions for availability of settings are provided.

articles/automation/troubleshoot/runbooks.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -179,6 +179,10 @@ To determine what's wrong, follow these steps:
179179
#Logging in to Azure...
180180
$connectionResult = Connect-AzAccount `
181181
Start-Sleep -Seconds 30
182+
if($connectionResult)
183+
{
184+
$logonResult = $True
185+
}
182186
}
183187
```
184188

articles/azure-monitor/logs/log-analytics-workspace-insights-overview.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,12 @@ ms.date: 06/27/2022
1414

1515
Log Analytics Workspace Insights provides comprehensive monitoring of your workspaces through a unified view of your workspace usage, performance, health, agent, queries, and change log. This article helps you understand how to onboard and use Log Analytics Workspace Insights.
1616

17+
## Permissions required
18+
19+
- You need `Microsoft.OperationalInsights/workspaces/read` permissions to the Log Analytics workspace whose insights you want to see, as provided by the [Log Analytics Reader built-in role](./manage-access.md#log-analytics-reader), for example..
20+
- To run the additional usage queries, you need `*/read` permissions, as provided by the [Log Analytics Reader built-in role](./manage-access.md#log-analytics-reader), for example.
21+
22+
1723
## Overview of your Log Analytics workspaces
1824

1925
When you access Log Analytics Workspace Insights through Azure Monitor Insights, the **At scale** perspective is shown. Here you can:

articles/azure-resource-manager/templates/template-tutorial-add-variables.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ az deployment group create \
7070
--name addnamevariable \
7171
--resource-group myResourceGroup \
7272
--template-file $templateFile \
73-
--parameters storagePrefix=store storageSKU=Standard_LRS
73+
--parameters '{"storagePrefix": {"value":"store"}}' '{"storageSKU": {"value":"Standard_LRS"}}'
7474
```
7575

7676
---

articles/cost-management-billing/understand/analyze-unexpected-charges.md

Lines changed: 34 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.reviewer: micflan
77
ms.service: cost-management-billing
88
ms.subservice: cost-management
99
ms.topic: conceptual
10-
ms.date: 11/14/2023
10+
ms.date: 12/08/2023
1111
ms.author: banders
1212
---
1313

@@ -25,7 +25,7 @@ In general, there are three types of changes that you might want to investigate:
2525

2626
## Identify cost anomalies
2727

28-
The cloud comes with the promise of significant cost savings compared to on-premises costs. However, savings require diligence to proactively plan, govern, and monitor your cloud solutions. Even with proactive processes, cost surprises can still happen. For example, you might notice that something has changed, but you're not sure what. Using Cost Management anomaly detection for your subscriptions can help minimize surprises.
28+
The cloud comes with the promise of significant cost savings compared to on-premises costs. However, savings require diligence to proactively plan, govern, and monitor your cloud solutions. Even with proactive processes, cost surprises can still happen. For example, you might notice that something changed, but you're not sure what. Using Cost Management anomaly detection for your subscriptions can help minimize surprises.
2929

3030
Whether you know if you have any existing cost anomalies or not, Cost analysis informs you if it finds anything unusual as part of Insights. If not, Cost analysis shows **No anomalies detected**.
3131

@@ -43,7 +43,7 @@ If you don't have any anomalies, you see a **No anomalies detected** insight, co
4343

4444
### Drill into anomaly details
4545

46-
To drill into the underlying data for something that has changed, select the insight link. It opens a view in classic cost analysis where you can review your daily usage by resource group for the time range that was evaluated.
46+
To drill into the underlying data for something that changed, select the insight link. It opens a view in classic cost analysis where you can review your daily usage by resource group for the time range that was evaluated.
4747

4848
Continuing from the previous example of the anomaly labeled **Daily run rate down 748% on Sep 28**, let's examine its details after the link is selected. The following example image shows details about the anomaly. Notice the large increase in costs, a cost spike, and eventual drop in from a temporary, short-lived resource.
4949

@@ -64,10 +64,10 @@ You can create an alert to automatically get notified when an anomaly is detecte
6464
6565
An anomaly alert email includes a summary of changes in resource group count and cost. It also includes the top resource group changes for the day compared to the previous 60 days. And, it has a direct link to the Azure portal so that you can review the cost and investigate further.
6666

67-
An anomaly alert email is sent only one time when it's detected.
67+
An anomaly alert email is sent only once - at the time of detection.
6868

6969
1. From Azure Home, select **Cost Management** under **Tools**.
70-
1. Verify you've selected the correct subscription in the scope at the top of the page.
70+
1. Verify the correct subscription is selected in the scope at the top of the page.
7171
1. In the left menu, select **Cost alerts**.
7272
1. On the toolbar, select **+ Add**.
7373
1. On the Create alert rule page, select **Anomaly** as the **Alert type**.
@@ -95,7 +95,7 @@ Let's examine the increase in cost for the resource group more fully. To drill i
9595

9696
:::image type="content" source="./media/analyze-unexpected-charges/drill-in-articmustang-daily-cost.png" alt-text="Example screenshot showing an increase in daily costs." lightbox="./media/analyze-unexpected-charges/drill-in-articmustang-daily-cost.png" :::
9797

98-
So far, we've found an increase in cost for the `articmustang` resource group at the end of June and the beginning of July. You might notice that the cost increase spanned over two days. The change took two days because a change in the middle of a day doesn't show the full effect of that change until the following full day.
98+
So far, we found an increase in cost for the `articmustang` resource group at the end of June and the beginning of July. You might notice that the cost increase spanned over two days. The change took two days because a change in the middle of a day doesn't show the full effect of that change until the following full day.
9999

100100
Let's continue drilling into the data to find out more about the cost increase. Select the item that increased in cost (`articmustang`) to automatically set a filter for the resource group name. Then, change the **Group by** list to **Resource**. Then set the date range to a smaller period. For example, June 28 to July 4. In the following example image, the increase in cost is clearly shown. The type of resource is shown as _microsoft.network/virtualnetworkgateways_.
101101

@@ -111,7 +111,7 @@ At this point, you know what changed and the value that costs changed. However,
111111

112112
## Find people responsible for changed resource use
113113

114-
Using Cost analysis, you might have found resources that had sudden changes in usage. However, it might not be obvious who is responsible for the resource or why the change was made. Often, the team responsible for a given resource knows about changes that were made to a resource. Engaging them is useful as you identify why charges might appear. For example, the owning team may have recently created the resource, updated its SKU (thereby changing the resource rate), or increased the load on the resource due to code changes.
114+
Using Cost analysis, you might find resources that had sudden changes in usage. However, it might not be obvious who is responsible for the resource or why the change was made. Often, the team responsible for a given resource knows about changes that were made to a resource. Engaging them is useful as you identify why charges might appear. For example, the owning team created the resource, updated its SKU (thereby changing the resource rate), or increased the load on the resource due to code changes.
115115

116116
The [Get resource changes](../../governance/resource-graph/how-to/get-resource-changes.md) article for Azure Resource Graph might help you to find additional information about configuration changes to resources.
117117

@@ -129,9 +129,35 @@ People that have write access to a subscription or resource group typically have
129129

130130
If you have an existing policy of [tagging resources](../costs/cost-mgt-best-practices.md#tag-shared-resources), the resource might be tagged with identifying information. For example, resources might be tagged with owner, cost center, or development environment information. If you don't already have a resource tagging policy in place, consider adopting one to help identify resources in the future.
131131

132+
## Other strategies to identify unexpected charges
133+
134+
If you used the preceding strategies and you still don't understand why you received a charge or if you need other help with billing issues, review the following sections.
135+
136+
### Why am I not receiving emails from anomaly alerts?
137+
138+
There are several reasons why you're not receiving alert emails. Try the following actions:
139+
140+
- Confirm that the creator of the schedule continues to have Reader role assigned or `Microsoft.CostManagement/scheduledActions/read` permission, if it's a custom role.
141+
- Confirm that your email address is shown as a recipient and that it's correct.
142+
- Make sure that there are no email rules that block `[email protected]`.
143+
- Check your spam or junk mail folder for emails from `[email protected]`.
144+
- Check to see if the alert is expired or deleted. You can extend or create a new anomaly alert rule to fix the problem.
145+
- Work with your admin to reenable the [view charges policy](../costs/assign-access-acm-data.md#enable-access-to-costs-in-the-azure-portal) in the Azure portal. The policy applies to indirect Enterprise Agreements and to Microsoft Customer Agreements with a Microsoft partner.
146+
147+
>[!NOTE]
148+
> Azure checks the permissions of the alert rule creator before sending the alert email. If your organization has a policy that prohibits permanently assigning higher privileges to users, you can use a service principal and create the alert directly using the [Scheduled Actions API](/rest/api/cost-management/scheduled-actions/create-or-update-by-scope#createorupdateinsightalertscheduledactionbyscope).
149+
150+
### Why am I not able to create an anomaly alert rule?
151+
152+
Try the following steps:
153+
154+
- Anomaly alert rules can only be created at the subscription scope. Ensure that the correct scope is selected.
155+
- Verify that you have the Owner, Contributor, or Cost Management Contributor role on the subscription.
156+
- If you got an error message indicating that you reached the limit of five alerts per subscription, consider editing an existing anomaly alert rule. Add yourself as a recipient instead of creating a new rule in case you exhausted the limit.
157+
132158
## Get help to identify charges
133159

134-
If you've used the preceding strategies and you still don't understand why you received a charge or if you need other help with billing issues, [create a support request](https://go.microsoft.com/fwlink/?linkid=2083458).
160+
If used the preceding strategies and you still don't understand why you received a charge or if you need other help with billing issues, [create a support request](https://go.microsoft.com/fwlink/?linkid=2083458).
135161

136162
## Next steps
137163

articles/defender-for-cloud/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -942,7 +942,9 @@
942942
- name: Capabilities to counter identity-based supply chain attacks
943943
href: episode-thirty-seven.md
944944
- name: Data security dashboard
945-
href: episode-thirty-eight.md
945+
href: episode-thirty-eight.md
946+
- name: Defender for APIs reaches GA
947+
href: episode-thirty-nine.md
946948
- name: Manage user data
947949
href: privacy.md
948950
- name: Microsoft Defender for IoT documentation

articles/defender-for-cloud/episode-thirty-eight.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Data Security Dashboard | Defender for Cloud in the Field
33
description: Learn about Defender for Cloud's data security dashboard.
44
ms.topic: reference
5-
ms.date: 12/06/2023
5+
ms.date: 12/07/2023
66
---
77

88
# Data security dashboard in Defender for Cloud
@@ -34,4 +34,4 @@ ms.date: 12/06/2023
3434
## Next steps
3535

3636
> [!div class="nextstepaction"]
37-
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)
37+
> [New AWS Connector in Microsoft Defender for Cloud](episode-thirty-nine.md)
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
---
2+
title: Defender for APIs reaches GA | Defender for Cloud in the Field
3+
description: Learn about what's new in Defender for APIs GA.
4+
ms.topic: reference
5+
ms.date: 12/10/2023
6+
---
7+
8+
# Defender for APIs reaches GA
9+
10+
**Episode description**: In this episode of Defender for Cloud in the Field, Haris Sohail joins Yuri Diogenes to talk about what's news in Defender for APIs GA. Haris gives a quick recap about API security, explains the value proposition of Defender APIs, and covers all the Ignite announcements related to Defender for APIs. Haris also demonstrates some features, such as the integration with Purview, Defender CSPM, and the new partnership with 42Crunch.
11+
12+
> [!VIDEO https://aka.ms/docs/player?id=62f3c0ca-13b1-47d4-b48a-e09fb4ca0395]
13+
14+
- [01:37](/shows/mdc-in-the-field/defender-api-generally-available#time=01m37s) - Recap of Defender for APIs release
15+
- [03:18](/shows/mdc-in-the-field/defender-api-generally-available#time=03m18s) - What's new in Defender for APIs GA
16+
- [05:24](/shows/mdc-in-the-field/defender-api-generally-available#time=05m24s) - Defender for APIs integration with Microsoft Purview
17+
- [06:46](/shows/mdc-in-the-field/defender-api-generally-available#time=06m46s) - Demonstration
18+
19+
## Recommended resources
20+
21+
- [Learn more](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/announcing-microsoft-defender-for-cloud-capabilities-to-counter/ba-p/3876012)
22+
- Subscribe to [Microsoft Security on YouTube](https://www.youtube.com/playlist?list=PL3ZTgFEc7LysiX4PfHhdJPR7S8mGO14YS)
23+
- Learn more about [Microsoft Security](https://msft.it/6002T9HQY)
24+
25+
- Follow us on social media:
26+
27+
- [LinkedIn](https://www.linkedin.com/showcase/microsoft-security/)
28+
- [Twitter](https://twitter.com/msftsecurity)
29+
30+
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity)
31+
32+
## Next steps
33+
34+
> [!div class="nextstepaction"]
35+
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)

articles/defender-for-cloud/subassessment-rest-api.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,7 @@ ms.topic: how-to
1515
Azure Resource Graph (ARG) provides a REST API that can be used to pragmatically access vulnerability assessment results for both Azure registry and runtime vulnerabilities recommendations.
1616
Learn more about [ARG references and query examples](/azure/governance/resource-graph/overview).
1717

18-
Azure container registry vulnerabilities sub assessments are published to ARG as part of the security resources. For more information, see:
19-
- [Security Resources ARG Query Samples](/azure/governance/resource-graph/samples/samples-by-category?tabs=azure-cli#list-container-registry-vulnerability-assessment-results)
20-
- [Generic Security Sub Assessment Query](/azure/governance/resource-graph/samples/samples-by-category?tabs=azure-cli#list-container-registry-vulnerability-assessment-results)
18+
Azure container registry vulnerabilities sub-assessments are published to ARG as part of the security resources. Learn more about [security sub-assessments](/azure/governance/resource-graph/samples/samples-by-category?tabs=azure-cli#list-container-registry-vulnerability-assessment-results).
2119

2220
## ARG query examples
2321

0 commit comments

Comments
 (0)