Skip to content

Commit ff2bb3e

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into cosmos-alerts
2 parents eab9f92 + 4478786 commit ff2bb3e

File tree

6 files changed

+134
-64
lines changed

6 files changed

+134
-64
lines changed

articles/active-directory/manage-apps/f5-aad-integration.md

Lines changed: 15 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,7 @@ Having Azure AD pre-authenticate access to BIG-IP published services provides ma
2828

2929
- Preemptive [Conditional Access](../conditional-access/overview.md) and [Azure AD Multi-Factor Authentication (MFA)](../authentication/concept-mfa-howitworks.md)
3030

31-
- [Identity Protection](../identity-protection/overview-identity-protection.md) - Adaptive control through user and session risk profiling
32-
33-
- [Leaked credential detection](../identity-protection/concept-identity-protection-risks.md)
31+
- [Identity Protection](../identity-protection/overview-identity-protection.md) - Adaptive protection through user and session risk profiling, plus [Leaked credential detection](../identity-protection/concept-identity-protection-risks.md)
3432

3533
- [Self-service password reset (SSPR)](../authentication/tutorial-enable-sspr.md)
3634

@@ -77,15 +75,15 @@ Whether a direct employee, affiliate, or consumer, most users are already acquai
7775

7876
Users now find their BIG-IP published services consolidated in the [MyApps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510) or [O365 launchpads](https://airhead.io/airbase/launchpads/R3kW-RkDFEedipcU1AFlnA) along with self-service capabilities to a broader set of services, no matter the type of device or location. Users can even continue accessing published services directly via the BIG-IPs proprietary Webtop portal, if preferred. When logging off, SHA ensures a users’ session is terminated at both ends, the BIG-IP and Azure AD, ensuring services remain fully protected from unauthorized access.
7977

80-
The screenshots provided are from the Azure AD app portal that users access securely to find their BIG-IP published services and for managing their account properties.
78+
Users access the Microsoft MyApps portal to easily find their BIG-IP published services and for managing their account properties.
8179

8280
![The screenshot shows woodgrove myapps gallery](media/f5-aad-integration/woodgrove-app-gallery.png)
8381

8482
![The screenshot shows woodgrove myaccounts self-service page](media/f5-aad-integration/woodgrove-myaccount.png)
8583

8684
## Insights and analytics
8785

88-
A BIG-IP’s role is critical to any business, so deployed BIG-IP instances should be monitored to ensure published services are highly available, both at an SHA level and operationally too.
86+
A BIG-IP’s role is critical to any business, so deployed BIG-IP instances can be monitored to ensure published services are highly available, both at an SHA level and operationally too.
8987

9088
Several options exist for logging events either locally, or remotely through a Security Information and Event Management (SIEM) solution, enabling off-box storage and processing of telemetry. A highly effective solution for monitoring Azure AD and SHA-specific activity, is to use [Azure Monitor](../../azure-monitor/overview.md) and [Microsoft Sentinel](../../sentinel/overview.md), together offering:
9189

@@ -97,7 +95,7 @@ Several options exist for logging events either locally, or remotely through a S
9795

9896
## Prerequisites
9997

100-
Integrating F5 BIG-IP with Azure AD for SHA have the following pre-requisites:
98+
Integrating an F5 BIG-IP with Azure AD for SHA has the following pre-requisites:
10199

102100
- An F5 BIG-IP instance running on either of the following platforms:
103101

@@ -111,13 +109,13 @@ Integrating F5 BIG-IP with Azure AD for SHA have the following pre-requisites:
111109

112110
- An active F5 BIG-IP APM license, through one of the following options:
113111

114-
- F5 BIG-IP® Best bundle (or)
112+
- F5 BIG-IP® Best bundle
115113

116-
- F5 BIG-IP Access Policy Manager™ standalone license
114+
- F5 BIG-IP Access Policy Manager™ standalone license
117115

118-
- F5 BIG-IP Access Policy Manager™ (APM) add-on license on an existing BIG-IP F5 BIG-IP® Local Traffic Manager™ (LTM)
116+
- F5 BIG-IP Access Policy Manager™ (APM) add-on license on an existing BIG-IP F5 BIG-IP® Local Traffic Manager™ (LTM)
119117

120-
- A 90-day BIG-IP Access Policy Manager™ (APM) [trial license](https://www.f5.com/trial/big-ip-trial.php)
118+
- A 90-day BIG-IP Access Policy Manager™ (APM) [trial license](https://www.f5.com/trial/big-ip-trial.php)
121119

122120
- Azure AD licensing through either of the following options:
123121

@@ -130,7 +128,7 @@ No previous experience or F5 BIG-IP knowledge is necessary to implement SHA, but
130128
## Configuration scenarios
131129

132130
Configuring a BIG-IP for SHA is achieved using any of the many available methods, including several template based options, or a manual configuration.
133-
The following tutorials provide detailed guidance on implementing some of the more common patterns for BIG-IP and Azure AD SHA, using these methods.
131+
The following tutorials provide detailed guidance on implementing some of the more common patterns for BIG-IP and Azure AD secure hybrid access.
134132

135133
**Advanced configuration**
136134

@@ -154,7 +152,7 @@ Refer to the following advanced configuration tutorials for your integration req
154152

155153
The Guided Configuration wizard, available from BIG-IP version 13.1 aims to minimize time and effort implementing common BIG-IP publishing scenarios. Its workflow-based framework provides an intuitive deployment experience tailored to specific access topologies.
156154

157-
The latest version of the Guided Configuration 16.1 now offers an Easy Button feature. With **Easy Button**, admins no longer go back and forth between Azure AD and a BIG-IP to enable services for SHA. The end-to-end deployment and policy management is handled directly between the APM’s Guided Configuration wizard and Microsoft Graph. This rich integration between BIG-IP APM and Azure AD ensures applications can quickly, easily support identity federation, SSO, and Azure AD Conditional Access, without management overhead of having to do so on a per app basis.
155+
Version 16.x of the Guided Configuration now offers an Easy Button feature. With **Easy Button**, admins no longer go back and forth between Azure AD and a BIG-IP to enable services for SHA. The end-to-end deployment and policy management is handled directly between the APM’s Guided Configuration wizard and Microsoft Graph. This rich integration between BIG-IP APM and Azure AD ensures applications can quickly, easily support identity federation, SSO, and Azure AD Conditional Access, without management overhead of having to do so on a per app basis.
158156

159157
Refer to the following guided configuration tutorials using Easy Button templates for your integration requirements:
160158

@@ -178,16 +176,16 @@ Refer to the following guided configuration tutorials using Easy Button template
178176

179177
## Next steps
180178

181-
Consider running an SHA Proof of concept (POC) using your existing BIG-IP infrastructure, or by deploying a trial instance. [Deploying a BIG-IP Virtual Edition (VE) VM into Azure](f5-bigip-deployment-guide.md) takes approximately 30 minutes, at which point you'll have:
179+
Consider running an SHA Proof of concept (POC) using your existing BIG-IP infrastructure, or by [Deploying a BIG-IP Virtual Edition (VE) VM into Azure](f5-bigip-deployment-guide.md) takes approximately 30 minutes, at which point you'll have:
182180

183-
- A fully secured platform to model an SHA proof of concept
181+
- A fully secured platform to model a SHA proof of concept
184182

185-
- A pre-production instance, fully secured platform to use for testing new BIG-IP system updates and hotfixes
183+
- A pre-production instance for testing new BIG-IP system updates and hotfixes
186184

187-
At the same time, you should identify one or two applications that can be targeted for publishing via the BIG-IP and protecting with SHA.
185+
At the same time, you should identify one or two applications that can be published via the BIG-IP and protected with SHA.
188186

189187
Our recommendation is to start with an application that isn’t yet published via a BIG-IP, so as to avoid potential disruption to production services. The guidelines mentioned in this article will help you get acquainted with the general procedure for creating the various BIG-IP configuration objects and setting up SHA. Once complete you should be able to do the same with any other new services, plus also have enough knowledge to convert existing BIG-IP published services over to SHA with minimal effort.
190188

191-
The below interactive guide walks through the high-level procedure for implementing SHA and seeing the end-user experience.
189+
The below interactive guide walks through the high-level procedure for implementing SHA using a non Easy Button template, and seeing the end-user experience.
192190

193191
[![The image shows interactive guide cover](media/f5-aad-integration/interactive-guide.png)](https://aka.ms/Secure-Hybrid-Access-F5-Interactive-Guide)

articles/defender-for-cloud/kubernetes-workload-protections.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Defender for Cloud offers more container security features if you enable Microso
2626
| Release state: | General availability (GA) |
2727
| Pricing: | Free for AKS workloads<br>For Azure Arc-enabled Kubernetes or EKS, it's billed according to the Microsoft Defender for Containers plan |
2828
| Required roles and permissions: | **Owner** or **Security admin** to edit an assignment<br>**Reader** to view the recommendations |
29-
| Environment requirements: | Kubernetes v1.14 (or higher) is required<br>No PodSecurityPolicy resource (old PSP model) on the clusters<br>Windows nodes are not supported |
29+
| Environment requirements: | Kubernetes v1.14 (or newer) is required<br>No PodSecurityPolicy resource (old PSP model) on the clusters<br>Windows nodes are not supported |
3030
| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National (Azure Government, Azure China 21Vianet) |
3131
| | |
3232

articles/devtest-labs/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@
7373
href: configure-lab-remote-desktop-gateway.md
7474
- name: Post announcement in a lab
7575
href: devtest-lab-announcements.md
76-
- name: Enable browser connection on VMs
76+
- name: Connect via browser on VMs with Bastion
7777
href: enable-browser-connection-lab-virtual-machines.md
7878
- name: Configure cost management
7979
href: devtest-lab-configure-cost-management.md

articles/devtest-labs/enable-browser-connection-lab-virtual-machines.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.topic: how-to
55
ms.date: 11/02/2021
66
---
77

8-
# Enable browser connection to DevTest Labs VMs
8+
# Enable browser connection to DevTest Labs VMs with Azure Bastion
99

1010
Azure DevTest Labs integrates with [Azure Bastion](../bastion/index.yml) to allow connecting to lab virtual machines (VMs) through a browser. As a lab owner, you can enable browser access to all your lab VMs through Azure Bastion.
1111

articles/security/fundamentals/feature-availability.md

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -209,7 +209,7 @@ The following tables display the current Microsoft Sentinel feature availability
209209

210210
| Feature | Azure | Azure Government |
211211
| ----- | ----- | ---- |
212-
| **Incidents** | |
212+
| **Incidents** | | |
213213
|- [Automation rules](../../sentinel/automate-incident-handling-with-automation-rules.md) | Public Preview | Public Preview |
214214
| - [Cross-tenant/Cross-workspace incidents view](../../sentinel/multiple-workspace-view.md) |GA | GA |
215215
| - [Entity insights](../../sentinel/enable-entity-behavior-analytics.md) | GA | Public Preview |
@@ -223,7 +223,7 @@ The following tables display the current Microsoft Sentinel feature availability
223223
| - [Notebook integration with Azure Synapse](../../sentinel/notebooks-with-synapse.md) | Public Preview | Not Available|
224224
| **Watchlists** | | |
225225
|- [Watchlists](../../sentinel/watchlists.md) | GA | GA |
226-
| **Hunting** | |
226+
| **Hunting** | | |
227227
| - [Hunting](../../sentinel/hunting.md) | GA | GA |
228228
| **Content and content management** | | |
229229
| - [Content hub](../../sentinel/sentinel-solutions.md) and [solutions](../../sentinel/sentinel-solutions-catalog.md) | Public preview | Not Available|
@@ -245,7 +245,7 @@ The following tables display the current Microsoft Sentinel feature availability
245245
| - [Anomalous Windows File Share Access Detection](../../sentinel/fusion.md) | Public Preview | Not Available |
246246
| - [Anomalous RDP Login Detection](../../sentinel/data-connectors-reference.md#configure-the-security-events--windows-security-events-connector-for-anomalous-rdp-login-detection)<br>Built-in ML detection | Public Preview | Not Available |
247247
| - [Anomalous SSH login detection](../../sentinel/connect-syslog.md#configure-the-syslog-connector-for-anomalous-ssh-login-detection)<br>Built-in ML detection | Public Preview | Not Available |
248-
| **Domain solution content** | | |
248+
| **Domain solution content** | | |
249249
| - [Apache Log4j Vulnerability Detection](../../sentinel/sentinel-solutions-catalog.md#domain-solutions) | Public Preview | Not Available |
250250
| - [Cybersecurity Maturity Model Certification (CMMC)](../../sentinel/sentinel-solutions-catalog.md#domain-solutions) | Public Preview | Not Available |
251251
| - [IoT/OT Threat Monitoring with Defender for IoT](../../sentinel/sentinel-solutions-catalog.md#domain-solutions) | Public Preview | Not Available |
@@ -258,15 +258,15 @@ The following tables display the current Microsoft Sentinel feature availability
258258
| - [Azure Active Directory](../../sentinel/connect-azure-active-directory.md) | GA | GA |
259259
| - [Azure ADIP](../../sentinel/data-connectors-reference.md#azure-active-directory-identity-protection) | GA | GA |
260260
| - [Azure DDoS Protection](../../sentinel/data-connectors-reference.md#azure-ddos-protection) | GA | GA |
261-
| - [Microsoft Defender for Cloud](../../sentinel/connect-azure-security-center.md) | GA | GA |
262-
| - [Microsoft Defender for IoT](../../sentinel/data-connectors-reference.md#microsoft-defender-for-iot) | Public Preview | Not Available |
263-
| - [Microsoft Insider Risk Management](../../sentinel/sentinel-solutions-catalog.md#domain-solutions) | Public Preview | Not Available |
264261
| - [Azure Firewall ](../../sentinel/data-connectors-reference.md#azure-firewall) | GA | GA |
265262
| - [Azure Information Protection](../../sentinel/data-connectors-reference.md#azure-information-protection-preview) | Public Preview | Not Available |
266263
| - [Azure Key Vault ](../../sentinel/data-connectors-reference.md#azure-key-vault) | Public Preview | Not Available |
267264
| - [Azure Kubernetes Services (AKS)](../../sentinel/data-connectors-reference.md#azure-kubernetes-service-aks) | Public Preview | Not Available |
268265
| - [Azure SQL Databases](../../sentinel/data-connectors-reference.md#azure-sql-databases) | GA | GA |
269266
| - [Azure WAF](../../sentinel/data-connectors-reference.md#azure-web-application-firewall-waf) | GA | GA |
267+
| - [Microsoft Defender for Cloud](../../sentinel/connect-azure-security-center.md) | GA | GA |
268+
| - [Microsoft Defender for IoT](../../sentinel/data-connectors-reference.md#microsoft-defender-for-iot) | Public Preview | Not Available |
269+
| - [Microsoft Insider Risk Management](../../sentinel/sentinel-solutions-catalog.md#domain-solutions) | Public Preview | Not Available |
270270
| **Windows connectors** | | |
271271
| - [Windows Firewall](../../sentinel/data-connectors-reference.md#windows-firewall) | GA | GA |
272272
| - [Windows Security Events](/azure/sentinel/connect-windows-security-events) | GA | GA |
@@ -431,6 +431,14 @@ Office 365 GCC is paired with Azure Active Directory (Azure AD) in Azure. Office
431431
| - Office 365 GCC | Public Preview | - |
432432
| - Office 365 GCC High | - | Not Available |
433433
| - Office 365 DoD | - | Not Available |
434+
| - **[Microsoft Power BI](../../sentinel/data-connectors-reference.md#microsoft-power-bi-preview)** | | |
435+
| - Office 365 GCC | Public Preview | - |
436+
| - Office 365 GCC High | - | Not Available |
437+
| - Office 365 DoD | - | Not Available |
438+
| - **[Microsoft Project](../../sentinel/data-connectors-reference.md#microsoft-project-preview)** | | |
439+
| - Office 365 GCC | Public Preview | - |
440+
| - Office 365 GCC High | - | Not Available |
441+
| - Office 365 DoD | - | Not Available |
434442
| **[Office 365](../../sentinel/data-connectors-reference.md#microsoft-office-365)** | | |
435443
| - Office 365 GCC | GA | - |
436444
| - Office 365 GCC High | - | GA |

0 commit comments

Comments
 (0)