Skip to content

Commit 0f8e79e

Browse files
author
Manika Dhiman
committed
Merge branch 'main' into md-remove-23h2-references
2 parents cb2c658 + ec7e165 commit 0f8e79e

File tree

77 files changed

+622
-3021
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

77 files changed

+622
-3021
lines changed

.openpublishing.redirection.azure-local.json

Lines changed: 175 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1734,6 +1734,181 @@
17341734
"source_path": "azure-local/manage/storage-repair-speed.md",
17351735
"redirect_url": "/windows-server/storage/storage-spaces/storage-repair-speed",
17361736
"redirect_document_id": false
1737+
},
1738+
{
1739+
"source_path": "azure-local/known-issues-2311.md",
1740+
"redirect_url": "/azure/azure-local/known-issues",
1741+
"redirect_document_id": false
1742+
},
1743+
{
1744+
"source_path": "azure-local/known-issues-2311-2.md",
1745+
"redirect_url": "/azure/azure-local/known-issues",
1746+
"redirect_document_id": false
1747+
},
1748+
{
1749+
"source_path": "azure-local/known-issues-2311-3.md",
1750+
"redirect_url": "/azure/azure-local/known-issues",
1751+
"redirect_document_id": false
1752+
},
1753+
{
1754+
"source_path": "azure-local/known-issues-2311-4.md",
1755+
"redirect_url": "/azure/azure-local/known-issues",
1756+
"redirect_document_id": false
1757+
},
1758+
{
1759+
"source_path": "azure-local/known-issues-2311-5.md",
1760+
"redirect_url": "/azure/azure-local/known-issues",
1761+
"redirect_document_id": false
1762+
},
1763+
{
1764+
"source_path": "azure-local/known-issues-2402.md",
1765+
"redirect_url": "/azure/azure-local/known-issues",
1766+
"redirect_document_id": false
1767+
},
1768+
{
1769+
"source_path": "azure-local/known-issues-2402-1.md",
1770+
"redirect_url": "/azure/azure-local/known-issues",
1771+
"redirect_document_id": false
1772+
},
1773+
{
1774+
"source_path": "azure-local/known-issues-2402-2.md",
1775+
"redirect_url": "/azure/azure-local/known-issues",
1776+
"redirect_document_id": false
1777+
},
1778+
{
1779+
"source_path": "azure-local/known-issues-2402-3.md",
1780+
"redirect_url": "/azure/azure-local/known-issues",
1781+
"redirect_document_id": false
1782+
},
1783+
{
1784+
"source_path": "azure-local/known-issues-2402-4.md",
1785+
"redirect_url": "/azure/azure-local/known-issues",
1786+
"redirect_document_id": false
1787+
},
1788+
{
1789+
"source_path": "azure-local/known-issues-2405.md",
1790+
"redirect_url": "/azure/azure-local/known-issues",
1791+
"redirect_document_id": false
1792+
},
1793+
{
1794+
"source_path": "azure-local/known-issues-2405-1.md",
1795+
"redirect_url": "/azure/azure-local/known-issues",
1796+
"redirect_document_id": false
1797+
},
1798+
{
1799+
"source_path": "azure-local/known-issues-2405-2.md",
1800+
"redirect_url": "/azure/azure-local/known-issues",
1801+
"redirect_document_id": false
1802+
},
1803+
{
1804+
"source_path": "azure-local/known-issues-2405-3.md",
1805+
"redirect_url": "/azure/azure-local/known-issues",
1806+
"redirect_document_id": false
1807+
},
1808+
{
1809+
"source_path": "azure-local/known-issues-2408.md",
1810+
"redirect_url": "/azure/azure-local/known-issues",
1811+
"redirect_document_id": false
1812+
},
1813+
{
1814+
"source_path": "azure-local/known-issues-2408-1.md",
1815+
"redirect_url": "/azure/azure-local/known-issues",
1816+
"redirect_document_id": false
1817+
},
1818+
{
1819+
"source_path": "azure-local/known-issues-2408-2.md",
1820+
"redirect_url": "/azure/azure-local/known-issues",
1821+
"redirect_document_id": false
1822+
},
1823+
{
1824+
"source_path": "azure-local/known-issues-2411.md",
1825+
"redirect_url": "/azure/azure-local/known-issues",
1826+
"redirect_document_id": false
1827+
},
1828+
{
1829+
"source_path": "azure-local/known-issues-2411-1.md",
1830+
"redirect_url": "/azure/azure-local/known-issues",
1831+
"redirect_document_id": false
1832+
},
1833+
{
1834+
"source_path": "azure-local/known-issues-2411-2.md",
1835+
"redirect_url": "/azure/azure-local/known-issues",
1836+
"redirect_document_id": false
1837+
},
1838+
{
1839+
"source_path": "azure-local/security-update/security-update-nov-2023.md",
1840+
"redirect_url": "/azure/azure-local/security-update/security-update",
1841+
"redirect_document_id": false
1842+
},
1843+
{
1844+
"source_path": "azure-local/security-update/security-update-dec-2023.md",
1845+
"redirect_url": "/azure/azure-local/security-update/security-update",
1846+
"redirect_document_id": false
1847+
},
1848+
{
1849+
"source_path": "azure-local/security-update/security-update-jan-2024.md",
1850+
"redirect_url": "/azure/azure-local/security-update/security-update",
1851+
"redirect_document_id": false
1852+
},
1853+
{
1854+
"source_path": "azure-local/security-update/security-update-feb-2024.md",
1855+
"redirect_url": "/azure/azure-local/security-update/security-update",
1856+
"redirect_document_id": false
1857+
},
1858+
{
1859+
"source_path": "azure-local/security-update/security-update-mar-2024.md",
1860+
"redirect_url": "/azure/azure-local/security-update/security-update",
1861+
"redirect_document_id": false
1862+
},
1863+
{
1864+
"source_path": "azure-local/security-update/security-update-apr-2024.md",
1865+
"redirect_url": "/azure/azure-local/security-update/security-update",
1866+
"redirect_document_id": false
1867+
},
1868+
{
1869+
"source_path": "azure-local/security-update/security-update-may-2024.md",
1870+
"redirect_url": "/azure/azure-local/security-update/security-update",
1871+
"redirect_document_id": false
1872+
},
1873+
{
1874+
"source_path": "azure-local/security-update/security-update-jun-2024.md",
1875+
"redirect_url": "/azure/azure-local/security-update/security-update",
1876+
"redirect_document_id": false
1877+
},
1878+
{
1879+
"source_path": "azure-local/security-update/security-update-jul-2024.md",
1880+
"redirect_url": "/azure/azure-local/security-update/security-update",
1881+
"redirect_document_id": false
1882+
},
1883+
{
1884+
"source_path": "azure-local/security-update/security-update-aug-2024.md",
1885+
"redirect_url": "/azure/azure-local/security-update/security-update",
1886+
"redirect_document_id": false
1887+
},
1888+
{
1889+
"source_path": "azure-local/security-update/security-update-sep-2024.md",
1890+
"redirect_url": "/azure/azure-local/security-update/security-update",
1891+
"redirect_document_id": false
1892+
},
1893+
{
1894+
"source_path": "azure-local/security-update/security-update-oct-2024.md",
1895+
"redirect_url": "/azure/azure-local/security-update/security-update",
1896+
"redirect_document_id": false
1897+
},
1898+
{
1899+
"source_path": "azure-local/security-update/security-update-nov-2024.md",
1900+
"redirect_url": "/azure/azure-local/security-update/security-update",
1901+
"redirect_document_id": false
1902+
},
1903+
{
1904+
"source_path": "azure-local/security-update/security-update-dec-2024.md",
1905+
"redirect_url": "/azure/azure-local/security-update/security-update",
1906+
"redirect_document_id": false
1907+
},
1908+
{
1909+
"source_path": "azure-local/security-update/security-update-jan-2025.md",
1910+
"redirect_url": "/azure/azure-local/security-update/security-update",
1911+
"redirect_document_id": false
17371912
}
17381913
]
17391914
}

adaptive-cloud/app-solutions/overview-app-design-considerations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Hybrid app design considerations in Azure and Azure Stack Hub
33
description: Learn about design considerations when building a hybrid app for the intelligent cloud and intelligent edge, including placement, scalability, availability, and resilience.
4-
author: ronmiab
4+
author: sethmanheim
55
ms.topic: article
66
ms.date: 06/07/2020
7-
ms.author: robess
7+
ms.author: sethm
88
ms.reviewer: anajod
99
ms.lastreviewed: 11/05/2019
1010

adaptive-cloud/app-solutions/pattern-hybrid-relay.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Hybrid relay pattern in Azure and Azure Stack Hub
33
description: Use the hybrid relay pattern in Azure and Azure Stack Hub to connect to edge resources protected by firewalls.
4-
author: ronmiab
4+
author: sethmanheim
55
ms.topic: article
66
ms.date: 11/05/2019
7-
ms.author: robess
7+
ms.author: sethm
88
ms.reviewer: anajod
99
ms.lastreviewed: 11/05/2019
1010

azure-local/concepts/firewall-requirements.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This topic provides guidance on firewall requirements for the Azure
44
author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
7-
ms.date: 01/02/2025
7+
ms.date: 02/14/2025
88
---
99

1010
# Firewall requirements for Azure Local
@@ -18,7 +18,7 @@ This article also describes how to optionally use a highly locked-down firewall
1818
If your network uses a proxy server for internet access, see [Configure proxy settings for Azure Local](../manage/configure-proxy-settings-23h2.md).
1919

2020
> [!IMPORTANT]
21-
> Azure Express Route and Azure Private Link are not supported for Azure Local, version 23H2 or any of its components as it is not possible to access the public endpoints required for Azure Local, version 23H2.
21+
> Azure Express Route and Azure Private Link are not supported for Azure Local or any of its components as it is not possible to access the public endpoints required for Azure Local.
2222
2323
## Firewall requirements for outbound endpoints
2424

@@ -37,33 +37,33 @@ As shown in the following diagram, Azure Local can access Azure using more than
3737

3838
:::image type="content" source="./media/firewall-requirements/firewalls-diagram.png" alt-text="Diagram shows Azure Local accessing service tag endpoints through Port 443 (HTTPS) of firewalls." lightbox="./media/firewall-requirements/firewalls-diagram.png":::
3939

40-
## Required firewall URLs for Azure Local, version 23H2 deployments
40+
## Required firewall URLs for Azure Local deployments
4141

42-
Starting with Azure Local, version 23H2, all the clusters automatically enables Azure Resource Bridge and AKS infrastructure and uses the Arc for Servers agent to connect to Azure control plane. Along with the list of HCI specific endpoints on the following table, the [Azure Resource Bridge on Azure Local](/azure/azure-arc/resource-bridge/network-requirements) endpoints, the [AKS on Azure Local](/azure/aks/hybrid/aks-hci-network-system-requirements#firewall-url-exceptions) endpoints and the [Azure Arc-enabled servers](/azure/azure-arc/servers/network-requirements) endpoints must be included in the allow list of your firewall.
42+
Azure Local instances automatically enables Azure Resource Bridge and AKS infrastructure and uses the Arc for Servers agent to connect to Azure control plane. Along with the list of HCI specific endpoints on the following table, the [Azure Resource Bridge on Azure Local](/azure/azure-arc/resource-bridge/network-requirements) endpoints, the [AKS on Azure Local](/azure/aks/hybrid/aks-hci-network-system-requirements#firewall-url-exceptions) endpoints and the [Azure Arc-enabled servers](/azure/azure-arc/servers/network-requirements) endpoints must be included in the allow list of your firewall.
4343

4444
For a consolidated list of endpoints for East US that includes Azure Local, Arc-enabled servers, ARB, and AKS, use:
45-
- [Required endpoints in East US for Azure Local, version 23H2](https://github.com/Azure/AzureStack-Tools/blob/master/HCI/EastUSendpoints/eastus-hci-endpoints.md)
45+
- [Required endpoints in East US for Azure Local](https://github.com/Azure/AzureStack-Tools/blob/master/HCI/EastUSendpoints/eastus-hci-endpoints.md)
4646

4747
For a consolidated list of endpoints for West Europe that includes Azure Local, Arc-enabled servers, ARB, and AKS, use:
48-
- [Required endpoints in West Europe for Azure Local, version 23H2](https://github.com/Azure/AzureStack-Tools/blob/master/HCI/WestEuropeendpoints/westeurope-hci-endpoints.md)
48+
- [Required endpoints in West Europe for Azure Local](https://github.com/Azure/AzureStack-Tools/blob/master/HCI/WestEuropeendpoints/westeurope-hci-endpoints.md)
4949

5050
For a consolidated list of endpoints for Australia East that includes Azure Local, Arc-enabled servers, ARB, and AKS, use:
51-
- [Required endpoints in Australia East for Azure Local, version 23H2](https://github.com/Azure/AzureStack-Tools/blob/master/HCI/AustraliaEastendpoints/AustraliaEast-hci-endpoints.md)
51+
- [Required endpoints in Australia East for Azure Local](https://github.com/Azure/AzureStack-Tools/blob/master/HCI/AustraliaEastendpoints/AustraliaEast-hci-endpoints.md)
5252

5353
For a consolidated list of endpoints for Canada Central that includes Azure Local, Arc-enabled servers, ARB, and AKS, use:
54-
- [Required endpoints in Canada Central for Azure Local, version 23H2](https://github.com/Azure/AzureStack-Tools/blob/master/HCI/CanadaCentralEndpoints/canadacentral-hci-endpoints.md)
54+
- [Required endpoints in Canada Central for Azure Local](https://github.com/Azure/AzureStack-Tools/blob/master/HCI/CanadaCentralEndpoints/canadacentral-hci-endpoints.md)
5555

5656
For a consolidated list of endpoints for India Central that includes Azure Local, Arc-enabled servers, ARB, and AKS, use:
57-
- [Required endpoints in India Central for Azure Local, version 23H2](https://github.com/Azure/AzureStack-Tools/blob/master/HCI/IndiaCentralEndpoints/IndiaCentral-hci-endpoints.md)
57+
- [Required endpoints in India Central for Azure Local](https://github.com/Azure/AzureStack-Tools/blob/master/HCI/IndiaCentralEndpoints/IndiaCentral-hci-endpoints.md)
5858

5959
For a consolidated list of endpoints for SouthEast Asia that includes Azure Local, Arc-enabled servers, ARB, and AKS, use:
60-
- [Required endpoints in SouthEast Asia for Azure Local, version 23H2](https://github.com/Azure/AzureStack-Tools/blob/master/HCI/SouthEastAsiaEndpoints/southeastasia-hci-endpoints.md)
60+
- [Required endpoints in SouthEast Asia for Azure Local](https://github.com/Azure/AzureStack-Tools/blob/master/HCI/SouthEastAsiaEndpoints/southeastasia-hci-endpoints.md)
6161

6262
For a consolidated list of endpoints for Japan East that includes Azure Local, Arc-enabled servers, ARB, and AKS, use:
63-
- [Required endpoints in Japan East for Azure Local, version 23H2](https://github.com/Azure/AzureStack-Tools/blob/master/HCI/JapanEastEndpoints/japaneast-hci-endpoints.md)
63+
- [Required endpoints in Japan East for Azure Local](https://github.com/Azure/AzureStack-Tools/blob/master/HCI/JapanEastEndpoints/japaneast-hci-endpoints.md)
6464

6565
For a consolidated list of endpoints for South Central US that includes Azure Local, Arc-enabled servers, ARB, and AKS, use:
66-
- [Required endpoints in South Central US for Azure Local, version 23H2](https://github.com/Azure/AzureStack-Tools/blob/master/HCI/SouthCentralUSEndpoints/southcentralus-hci-endpoints.md)
66+
- [Required endpoints in South Central US for Azure Local](https://github.com/Azure/AzureStack-Tools/blob/master/HCI/SouthCentralUSEndpoints/southcentralus-hci-endpoints.md)
6767

6868
## Firewall requirements for additional Azure services
6969

@@ -82,7 +82,7 @@ Depending on additional Azure services you enable for Azure Local, you may need
8282

8383
## Firewall requirements for internal rules and ports
8484

85-
Ensure that the proper network ports are open between all nodes, both within a site and between sites for stretched instances (stretched instance functionality is only available in Azure Local, version 22H2.). You'll need appropriate firewall rules to allow ICMP, SMB (port 445, plus port 5445 for SMB Direct if using iWARP RDMA), and WS-MAN (port 5985) bi-directional traffic between all nodes in the cluster.
85+
Ensure that the proper network ports are open between all nodes, both within a site and between sites for stretched instances (stretched instance functionality is only available in Azure Stack HCI, version 22H2). You'll need appropriate firewall rules to allow ICMP, SMB (port 445, plus port 5445 for SMB Direct if using iWARP RDMA), and WS-MAN (port 5985) bi-directional traffic between all nodes in the cluster.
8686

8787
When using the **Creation wizard** in Windows Admin Center to create the cluster, the wizard automatically opens the appropriate firewall ports on each server in the cluster for Failover Clustering, Hyper-V, and Storage Replica. If you're using a different firewall on each machine, open the ports as described in the following sections:
8888

@@ -92,7 +92,7 @@ Ensure that the following firewall rules are configured in your on-premises fire
9292

9393
| Rule | Action | Source | Destination | Service | Ports |
9494
|:--|:--|:--|:--|:--|:--|
95-
| Allow inbound/outbound traffic to and from the Azure Local service on Azure Local instance machines | Allow | Instance nodes | Instance nodes | TCP | 30301 |
95+
| Allow inbound/outbound traffic to and from the Azure Local service on Azure Local machines | Allow | Instance nodes | Instance nodes | TCP | 30301 |
9696

9797
### Windows Admin Center
9898

@@ -197,5 +197,5 @@ This section shows how to configure Microsoft Defender firewall to allow IP addr
197197
198198
For more information, see also:
199199
200-
- The Windows Firewall and WinRM 2.0 ports section of [Installation and configuration for Windows Remote Management](/windows/win32/winrm/installation-and-configuration-for-windows-remote-management#windows-firewall-and-winrm-20-ports)
201-
- See [About Azure Local, version 23H2 deployment](../deploy/deployment-introduction.md)
200+
- The Windows Firewall and WinRM 2.0 ports section of [Installation and configuration for Windows Remote Management](/windows/win32/winrm/installation-and-configuration-for-windows-remote-management#windows-firewall-and-winrm-20-ports).
201+
- [About Azure Local deployment](../deploy/deployment-introduction.md).

azure-local/concepts/host-network-requirements.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Host network requirements for Azure Local
33
description: Learn the host network requirements for Azure Local
44
author: dcuomo
55
ms.topic: how-to
6-
ms.date: 10/17/2024
6+
ms.date: 02/14/2025
77
ms.author: dacuo
88
---
99

azure-local/concepts/physical-network-requirements.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Physical network requirements for Azure Local
33
description: Physical network requirements and considerations for Azure Local, including network switches.
44
author: jacobpedd
55
ms.topic: conceptual
6-
ms.date: 10/17/2024
6+
ms.date: 02/14/2025
77
ms.author: jgerend
88
ms.reviewer: JasonGerend
99
---

azure-local/concepts/security-features.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: conceptual
77
ms.service: azure-local
8-
ms.date: 12/11/2024
8+
ms.date: 02/14/2025
99
---
1010

11-
# Security features for Azure Local, version 23H2
11+
# Security features for Azure Local
1212

1313
[!INCLUDE [hci-applies-to-23h2](../includes/hci-applies-to-23h2.md)]
1414

@@ -36,7 +36,7 @@ For more information, see [Manage security defaults on Azure Local](../manage/ma
3636

3737
## Application Control
3838

39-
Application Control is a software-based security layer that reduces attack surface by enforcing an explicit list of software that is allowed to run. Application Control is enabled by default and limits the applications and code that you can run on the core platform. For more information, see [Manage Application Control for Azure Local, version 23H2](../manage/manage-wdac.md#manage-application-control-settings-with-powershell).
39+
Application Control is a software-based security layer that reduces attack surface by enforcing an explicit list of software that is allowed to run. Application Control is enabled by default and limits the applications and code that you can run on the core platform. For more information, see [Manage Application Control for Azure Local](../manage/manage-wdac.md#manage-application-control-settings-with-powershell).
4040

4141
Application Control provides two main operation modes, Enforcement mode and Audit mode. In Enforcement mode, untrusted code is blocked and events are recorded. In Audit mode, untrusted code is allowed to run and events are recorded. To learn more about Application Control-related events, see [List of Events](/windows/security/application-security/application-control/windows-defender-application-control/operations/event-id-explanations).
4242

@@ -140,7 +140,7 @@ For more information, see [Manage secrets rotation](../manage/manage-secrets-rot
140140

141141
## Syslog forwarding of security events
142142

143-
For customers and organizations that require their own local security information and event management (SIEM) system, Azure Local, version 23H2 includes an integrated mechanism that enables you to forward security-related events to a SIEM.
143+
For customers and organizations that require their own local security information and event management (SIEM) system, Azure Local includes an integrated mechanism that enables you to forward security-related events to a SIEM.
144144

145145
Azure Local has an integrated syslog forwarder that, once configured, generates syslog messages defined in RFC3164, with the payload in Common Event Format (CEF).
146146

0 commit comments

Comments
 (0)