You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/concept-secure-remote-workers.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ This guide assumes that your cloud only or hybrid identities have been establish
34
34
35
35
### Guided walkthrough
36
36
37
-
For a guided walkthrough of many of the recommendations in this article, see the [Set up Azure AD](https://go.microsoft.com/fwlink/?linkid=2221308) guide.
37
+
For a guided walkthrough of many of the recommendations in this article, see the [Set up Azure AD](https://go.microsoft.com/fwlink/?linkid=2224193) guide when signed in to the Microsoft 365 Admin Center. To review best practices without signing in and activating automated setup features, go to the [M365 Setup portal](https://go.microsoft.com/fwlink/?linkid=2221308).
38
38
39
39
## Guidance for Azure AD Free, Office 365, or Microsoft 365 customers.
Copy file name to clipboardExpand all lines: articles/active-directory/identity-protection/concept-identity-protection-risks.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,6 +68,7 @@ Premium detections are visible only to Azure AD Premium P2 customers. Customers
68
68
| Activity from anonymous IP address | Offline | This detection is discovered by [Microsoft Defender for Cloud Apps](/cloud-app-security/anomaly-detection-policy#activity-from-anonymous-ip-addresses). This detection identifies that users were active from an IP address that has been identified as an anonymous proxy IP address. |
69
69
| Suspicious inbox forwarding | Offline | This detection is discovered by [Microsoft Defender for Cloud Apps](/cloud-app-security/anomaly-detection-policy#suspicious-inbox-forwarding). This detection looks for suspicious email forwarding rules, for example, if a user created an inbox rule that forwards a copy of all emails to an external address. |
70
70
| Mass Access to Sensitive Files | Offline | This detection is discovered by [Microsoft Defender for Cloud Apps](/defender-cloud-apps/investigate-anomaly-alerts#unusual-file-access-by-user). This detection looks at your environment and triggers alerts when users access multiple files from Microsoft SharePoint or Microsoft OneDrive. An alert is triggered only if the number of accessed files is uncommon for the user and the files might contain sensitive information|
71
+
| Verified threat actor IP | Real-time | This risk detection type indicates sign-in activity that is consistent with known IP addresses associated with nation state actors or cyber crime groups, based on Microsoft Threat Intelligence Center (MSTIC).|
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/howto-use-recommendations.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,6 +72,9 @@ Each recommendation provides the same set of details that explain what the recom
72
72
73
73
- The **Impacted resources** table contains a list of resources identified by the recommendation. The resource's name, ID, date it was first detected, and status are provided. The resource could be an application or resource service principal, for example.
74
74
75
+
> [!NOTE]
76
+
> In the Azure portal the impacted resources are limited to a maximum of 50 resources. To view more resources, you should use the expand query parameter at the end of your API query on Microsoft graph. For example: Get: https://graph.microsoft.com/beta/directory/recommendations?$expand=impactedResources
77
+
75
78
## How to update a recommendation
76
79
77
80
To update the status of a recommendation or a related resource, sign in to Azure using a least-privileged role for updating a recommendation.
@@ -136,4 +139,4 @@ For more information, see the [Microsoft Graph documentation for recommendations
136
139
## Next steps
137
140
138
141
- [Review the Azure AD recommendations overview](overview-recommendations.md)
139
-
- [Learn about Service Health notifications](overview-service-health-notifications.md)
142
+
- [Learn about Service Health notifications](overview-service-health-notifications.md)
Copy file name to clipboardExpand all lines: articles/app-service/app-service-undelete.md
+34-7Lines changed: 34 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Restore deleted apps
3
3
description: Learn how to restore a deleted app in Azure App Service. Avoid the headache of an accidentally deleted app.
4
4
author: seligj95
5
5
ms.author: jordanselig
6
-
ms.date: 11/4/2022
6
+
ms.date: 4/3/2023
7
7
ms.topic: article
8
8
ms.custom: devx-track-azurepowershell
9
9
---
@@ -14,8 +14,8 @@ If you happened to accidentally delete your app in Azure App Service, you can re
14
14
15
15
> [!NOTE]
16
16
> - Deleted apps are purged from the system 30 days after the initial deletion. After an app is purged, it can't be recovered.
17
-
> - Undelete functionality isn't supported for the Consumption plan.
18
-
> -Apps Service apps running in an App Service Environment don't support snapshots. Therefore, undelete functionality and clone functionality aren't supported for App Service apps running in an App Service Environment.
17
+
> - Undelete functionality isn't supported for function apps hosted on the Consumption plan or Elastic Premium plan.
18
+
> -App Service apps running in an App Service Environment don't support snapshots. Therefore, undelete functionality and clone functionality aren't supported for App Service apps running in an App Service Environment.
19
19
>
20
20
21
21
## Re-register App Service resource provider
@@ -49,12 +49,12 @@ The detailed information includes:
49
49
## Restore deleted app
50
50
51
51
>[!NOTE]
52
-
>-`Restore-AzDeletedWebApp` isn't supported for function apps.
52
+
>-`Restore-AzDeletedWebApp` isn't supported for function apps hosted on the Consumption plan or Elastic Premium plan.
53
53
>- The Restore-AzDeletedWebApp cmdlet restores a deleted web app. The web app specified by TargetResourceGroupName, TargetName, and TargetSlot will be overwritten with the contents and settings of the deleted web app. If the target parameters are not specified, they will automatically be filled with the deleted web app's resource group, name, and slot. If the target web app does not exist, it will automatically be created in the app service plan specified by TargetAppServicePlanName.
54
54
>- By default `Restore-AzDeletedWebApp` will restore both your app configuration as well any content. If you want to only restore content, you use the **`-RestoreContentOnly`** flag with this commandlet.
55
55
56
56
57
-
Once the app you want to restore has been identified, you can restore it using `Restore-AzDeletedWebApp`, please see below examples
57
+
After identifying the app you want to restore, you can restore it using `Restore-AzDeletedWebApp`, as shown in the following examples.
58
58
>*You can find the full commandlet reference here: **[Restore-AzDeletedWebApp](/powershell/module/az.websites/restore-azdeletedwebapp)*** .
-**Target Resource Group**: Target resource group where the app will be restored
93
+
-**Target Resource Group**: Target resource group where the app is to be restored
94
94
-**TargetName**: Target app for the deleted app to be restored to
95
95
-**TargetAppServicePlanName**: App Service plan linked to the app
96
96
-**Name**: Name for the app, should be globally unique.
97
97
-**ResourceGroupName**: Original resource group for the deleted app
98
98
-**Slot**: Slot for the deleted app
99
-
-**RestoreContentOnly**: By default `Restore-AzDeletedWebApp`will restore both your app configuration as well any content. If you want to only restore content, you can use the `-RestoreContentOnly` flag with this commandlet.
99
+
-**RestoreContentOnly**: By default `Restore-AzDeletedWebApp`restores both your app configuration as well any content. If you want to only restore content, you can use the `-RestoreContentOnly` flag with this commandlet.
100
100
101
101
> [!NOTE]
102
102
> If the app was hosted on and then deleted from an App Service Environment, it can be restored only if the corresponding App Service Environment still exists.
103
103
104
+
## Restore deleted function app
105
+
106
+
If the function app was hosted on a **Dedicated app service plan**, it can be restored, as long as it was using the default App Service storage.
107
+
108
+
1. Fetch the DeletedSiteId of the app version you want to restore, using Get-AzDeletedWebApp cmdlet:
2. Create a new function app in a Dedicated plan. Refer to the instructions for [how to create an app in the portal](../azure-functions/functions-create-function-app-portal.md#create-a-function-app).
114
+
3. Restore to the newly created function app using this cmdlet:
Currently there's no support for Undelete (Restore-AzDeletedWebApp) Function app that's hosted in a Consumption plan or Elastic premium plan since the content resides on Azure Files in a Storage account. If you haven't 'hard' deleted that Azure Files storage account, or if the account exists and file shares haven't been deleted, then you may use the steps as workaround:
121
+
122
+
123
+
1. Create a new function app in a Consumption or Premium plan. Refer the instructions for [how to create an app in the portal](../azure-functions/functions-create-function-app-portal.md#create-a-function-app).
124
+
2. Set the following [app settings](../azure-functions/functions-how-to-use-azure-function-app-settings.md?tabs=portal#settings) to refer to the old storage account , which contains the content from the previous app.
125
+
126
+
| App Setting | Suggested value |
127
+
| ------------ | ---------------- |
128
+
|**AzureWebJobsStorage**| Connection String for the storage account used by the deleted app. |
129
+
|**WEBSITE_CONTENTAZUREFILECONNECTIONSTRING**| Connection String for the storage account used by the deleted app. |
130
+
|**WEBSITE_CONTENTSHARE**| File share on storage account used by the deleted app. |
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-networking-options.md
+9Lines changed: 9 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -283,6 +283,15 @@ The following APIs let you programmatically manage regional virtual network inte
283
283
+**Azure CLI**: Use the [`az functionapp vnet-integration`](/cli/azure/functionapp/vnet-integration) commands to add, list, or remove a regional virtual network integration.
284
284
+**ARM templates**: Regional virtual network integration can be enabled by using an Azure Resource Manager template. For a full example, see [this Functions quickstart template](https://azure.microsoft.com/resources/templates/function-premium-vnet-integration/).
285
285
286
+
## Testing
287
+
288
+
When testing functions in a function app with private endpoints, you must do your testing from within the same virtual network, such as on a virtual machine (VM) in that network. To use the **Code + Test** option in the portal from that VM, you need to add following [CORS origins](./functions-how-to-use-azure-function-app-settings.md?tabs=portal#cors) to your function app:
0 commit comments