Skip to content

Commit 2b00faf

Browse files
Merge pull request #16916 from LouisBerner/v-loberner-rebranding-update-23h2-references-3
Updated for rebranding to remove 23H2 references.
2 parents aa4a760 + a42c248 commit 2b00faf

7 files changed

+33
-33
lines changed

azure-local/manage/manage-bitlocker.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,18 +5,18 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
77
ms.service: azure-local
8-
ms.date: 12/11/2024
8+
ms.date: 02/03/2025
99
---
1010

11-
# Manage BitLocker encryption on Azure Local, version 23H2
11+
# Manage BitLocker encryption on Azure Local
1212

1313
[!INCLUDE [hci-applies-to-23h2](../includes/hci-applies-to-23h2.md)]
1414

1515
This article describes how to view and enable BitLocker encryption, and retrieve BitLocker recovery keys on your Azure Local instance.
1616

1717
## Prerequisites
1818

19-
Before you begin, make sure that you have access to an Azure Local, version 23H2 instance that is deployed, registered, and connected to Azure.
19+
Before you begin, make sure that you have access to an Azure Local instance that is deployed, registered, and connected to Azure.
2020

2121
## View BitLocker settings via Azure portal
2222

azure-local/manage/manage-secrets-rotation.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,11 @@ description: This article describes how to manage internal secret rotation on Az
44
author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
7-
ms.date: 01/13/2025
7+
ms.date: 02/03/2025
88
ms.service: azure-local
99
---
1010

11-
# Rotate secrets on Azure Local, version 23H2
11+
# Rotate secrets on Azure Local
1212

1313
[!INCLUDE [hci-applies-to-23h2](../includes/hci-applies-to-23h2.md)]
1414

@@ -117,4 +117,4 @@ To change the deployment service principal, follow these steps:
117117

118118
## Next steps
119119

120-
[Complete the prerequisites and checklist and install Azure Local, version 23H2](../deploy/deployment-prerequisites.md).
120+
[Complete the prerequisites and checklist and install Azure Local](../deploy/deployment-prerequisites.md).

azure-local/manage/manage-secure-baseline.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,18 +5,18 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
77
ms.service: azure-local
8-
ms.date: 12/12/2024
8+
ms.date: 02/03/2025
99
---
1010

11-
# Manage security defaults for Azure Local, version 23H2
11+
# Manage security defaults for Azure Local
1212

1313
[!INCLUDE [hci-applies-to-23h2](../includes/hci-applies-to-23h2.md)]
1414

1515
This article describes how to manage default security settings for your Azure Local instance. You can also modify drift control and protected security settings defined during deployment so your device starts in a known good state.
1616

1717
## Prerequisites
1818

19-
Before you begin, make sure that you have access to an Azure Local, version 23H2 system that is deployed, registered, and connected to Azure.
19+
Before you begin, make sure that you have access to an Azure Local system that is deployed, registered, and connected to Azure.
2020

2121
## View security default settings in the Azure portal
2222

azure-local/manage/manage-security-post-upgrade.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
77
ms.service: azure-local
8-
ms.date: 01/28/2025
8+
ms.date: 02/03/2025
99
---
1010

1111
# Manage security after upgrading Azure Local

azure-local/manage/manage-security-with-defender-for-cloud.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes how to use Microsoft Defender for Cloud to s
44
author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
7-
ms.date: 12/11/2024
7+
ms.date: 02/04/2025
88
ms.service: azure-local
99
---
1010

@@ -24,7 +24,7 @@ For more information about Microsoft Defender for Cloud, see [Microsoft Defender
2424

2525
Before you begin, make sure that the following prerequisites are completed:
2626

27-
- You have access to Azure Local, version 23H2 or Azure Local, version 22H2 that is deployed, registered, and connected to Azure.
27+
- You have access to Azure Local that is deployed, registered, and connected to Azure.
2828
- You have at least **Owner** or **Contributor** roles in your Azure subscription to turn on Foundational cloud security posture management (CSPM).
2929

3030
## Enable Defender for Cloud for Azure Local
@@ -96,7 +96,7 @@ After you've [enabled Defender for Cloud for Azure Local](#enable-defender-for-c
9696
:::image type="content" source="./media/manage-security-with-defender-for-cloud/recommendations-defender-for-cloud.png" alt-text="Screenshot of the Recommendations page in the Defender for Cloud portal." lightbox="./media/manage-security-with-defender-for-cloud/recommendations-defender-for-cloud.png" :::
9797

9898
> [!NOTE]
99-
> Azure Local-exclusive recommendations are available only on Azure Local, version 23H2. Azure Local, version 22H2 shows recommendations that are also available on Windows Server.
99+
> Azure Local-exclusive recommendations are available only on Azure Local 2311 or later. Azure Stack HCI, version 22H2 shows recommendations that are also available on Windows Server.
100100
101101
To learn more about the security recommendations specific to Azure Local, refer to the [Azure compute recommendations](/azure/defender-for-cloud/recommendations-reference-compute#azure-compute-recommendations) section in the [Compute security recommendations](/azure/defender-for-cloud/recommendations-reference-compute) article.
102102

@@ -116,4 +116,4 @@ Follow these steps to access the Microsoft Defender for Cloud portal's pages to
116116

117117
## Next steps
118118

119-
- [Review the deployment checklist and install Azure Local, version 23H2](../deploy/deployment-checklist.md).
119+
- [Review the deployment checklist and install Azure Local](../deploy/deployment-checklist.md).

azure-local/manage/manage-syslog-forwarding.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -5,20 +5,20 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
77
ms.service: azure-local
8-
ms.date: 11/16/2024
8+
ms.date: 02/03/2025
99
---
1010

1111
# Manage syslog forwarding for Azure Local
1212

1313
[!Include [Applies to: Azure Stack HCI, version 23H2](../includes/hci-applies-to-23h2.md)]
1414

15-
This article describes how to configure security events to be forwarded to a customer-managed security information and event management (SIEM) system using syslog protocol for Azure Local, version 23H2.
15+
This article describes how to configure security events to be forwarded to a customer-managed security information and event management (SIEM) system using syslog protocol for Azure Local.
1616

17-
Use syslog forwarding to integrate with security monitoring solutions and to retrieve relevant security event logs to store them for retention on your own SIEM platform. For more information about security features in this release, see [Security features for Azure Local, version 23H2](../concepts/security-features.md).
17+
Use syslog forwarding to integrate with security monitoring solutions and to retrieve relevant security event logs to store them for retention on your own SIEM platform. For more information about security features in this release, see [Security features for Azure Local](../concepts/security-features.md).
1818

1919
## Configure syslog forwarding
2020

21-
Syslog forwarding agents are deployed on every Azure Local host by default, ready to be configured. Each of the agents will forward security events in syslog format from the host to the customer-configured syslog server.
21+
Syslog forwarding agents are deployed on every Azure Local host by default, ready to be configured. Each agent forwards security events in syslog format from the host to the customer-configured syslog server.
2222

2323
Syslog forwarding agents work independently from each other but can be managed all together on any one of the hosts. Use PowerShell cmdlets with administrative privileges on any host to control the behavior of all forwarder agents.
2424

@@ -35,9 +35,9 @@ The syslog forwarder in Azure Local supports the following configurations:
3535
3636
### Cmdlets to configure syslog forwarding
3737

38-
Configuring syslog forwarder requires access to the physical host using a domain administrator account. A set of PowerShell cmdlets has been added to all Azure Local hosts to control behavior of the syslog forwarder.
38+
Configuring syslog forwarder requires access to the physical host using a domain administrator account. A set of PowerShell cmdlets is added to all Azure Local hosts to control behavior of the syslog forwarder.
3939

40-
The `Set-AzSSyslogForwarder` cmdlet is used to set the syslog forwarder configuration for all hosts. If successful, an action plan instance will be started to config the syslog forwarder agents across all hosts. The action plan instance ID will be returned.
40+
The `Set-AzSSyslogForwarder` cmdlet is used to set the syslog forwarder configuration for all hosts. If successful, an action plan instance is started to config the syslog forwarder agents across all hosts. The action plan instance ID is returned.
4141

4242
Use the following cmdlet to pass the syslog server information to the forwarder and to configure the transport protocol, the encryption, the authentication, and the optional certificate used between the client and the server:
4343

@@ -108,7 +108,7 @@ If you want to test the integration of your syslog server with the Azure Local s
108108
```
109109

110110
> [!IMPORTANT]
111-
> Microsoft recommends that you do not use the `-SkipServerCertificateCheck` flag in production environments.
111+
> Microsoft recommends that you don't use the `-SkipServerCertificateCheck` flag in production environments.
112112
113113
### Syslog forwarding with TCP and no encryption
114114

@@ -119,7 +119,7 @@ Set-AzSSyslogForwarder -ServerName <FQDN or IP address of syslog server> -Server
119119
```
120120

121121
> [!IMPORTANT]
122-
> Microsoft recommends that you do not use this configuration in production environments.
122+
> Microsoft recommends that you don't use this configuration in production environments.
123123
124124
### Syslog forwarding with UDP and no encryption
125125

@@ -132,7 +132,7 @@ Set-AzSSyslogForwarder -ServerName <FQDN or IP address of syslog server> -Server
132132
While UDP with no encryption is the easiest to configure, it doesn’t provide any protection against man-in-the-middle attacks or eavesdropping of messages.
133133

134134
> [!IMPORTANT]
135-
> Microsoft recommends that you do not use this configuration in production environments.
135+
> Microsoft recommends that you don't use this configuration in production environments.
136136
137137
## Enable syslog forwarding
138138

@@ -160,19 +160,19 @@ Parameter for `Enable-AzSSyslogForwarder` and `Disable-AzSSyslogForwarder` cmdle
160160

161161
## Verify syslog setup
162162

163-
After you successfully connect the syslog client to your syslog server, you will start to receive event notifications. If you don’t see notifications, verify your cluster syslog forwarder configuration by running the following cmdlet:
163+
After you successfully connect the syslog client to your syslog server, you'll start to receive event notifications. If you don’t see notifications, verify your cluster syslog forwarder configuration by running the following cmdlet:
164164

165165
```powershell
166166
Get-AzSSyslogForwarder [-Local | -PerNode | -Cluster]
167167
```
168168

169-
Each host has its own syslog forwarder agent that uses a local copy of the cluster configuration. They are always expected to be the same as the cluster configuration. You can verify the current configuration on each host by using the following cmdlet:
169+
Each host has its own syslog forwarder agent that uses a local copy of the cluster configuration. They're always expected to be the same as the cluster configuration. You can verify the current configuration on each host by using the following cmdlet:
170170

171171
```powershell
172172
Get-AzSSyslogForwarder -PerNode
173173
```
174174

175-
You can also use the following cmdlet to verify the configuration on the host you are connected to:
175+
You can also use the following cmdlet to verify the configuration on the host you're connected to:
176176

177177
```powershell
178178
Get-AzSSyslogForwarder -Local
@@ -286,7 +286,7 @@ Miscellaneous events that are forwarded. These events can't be customized.
286286
|Process Create (4688) |query="Security!*[System[EventID=4688]]" |
287287
|Event log service events specific to Security channel |query="Security!*[System[Provider[@Name='Microsoft-Windows-Eventlog']]]" |
288288
|Special Privileges (Admin-equivalent Access) assigned to new logon, excluding LocalSystem |query="Security!*[System[(EventID=4672)] and EventData[Data[1] != 'S-1-5-18']]" |
289-
|New user added to local, global or universal security group |query="Security!*[System[(EventID=4732 or EventID=4728 or EventID=4756)]]" |
289+
|New user added to local, global, or universal security group |query="Security!*[System[(EventID=4732 or EventID=4728 or EventID=4756)]]" |
290290
|User removed from local Administrators group |query="Security!*[System[(EventID=4733)] and EventData[Data[@Name='TargetUserName']='Administrators']]" |
291291
|Certificate Services received certificate request (4886), Approved and Certificate issued (4887), Denied request (4888) |query="Security!*[System[(EventID=4886 or EventID=4887 or EventID=4888)]]" |
292292
|New User Account Created(4720), User Account Enabled (4722), User Account Disabled (4725), User Account Deleted (4726) |query="Security!*[System[(EventID=4720 or EventID=4722 or EventID=4725 or EventID=4726)]]" |
@@ -298,7 +298,7 @@ Miscellaneous events that are forwarded. These events can't be customized.
298298
|Other Log cleared events (104) |query="System!*[System[(EventID=104)]]" |
299299
|EMET/Exploit protection events |query="Application!*[System[Provider[@Name='EMET']]]" |
300300
|WER events for application crashes only | query="Application!*[System[Provider[@Name='Windows Error Reporting']] and EventData[Data[3]='APPCRASH']]" |
301-
|User logging on with Temporary profile (1511), cannot create profile, using temporary profile (1518) |query="Application!*[System[Provider[@Name='Microsoft-Windows-User Profiles Service'] and (EventID=1511 or EventID=1518)]]" |
301+
|User logging on with Temporary profile (1511), can't create profile, using temporary profile (1518) |query="Application!*[System[Provider[@Name='Microsoft-Windows-User Profiles Service'] and (EventID=1511 or EventID=1518)]]" |
302302
|Application crash/hang events, similar to WER/1001. These include full path to faulting EXE/Module. |query="Application!*[System[Provider[@Name='Application Error'] and (EventID=1000)] or System[Provider[@Name='Application Hang'] and (EventID=1002)]]" |
303303
|Task scheduler Task Registered (106), Task Registration Deleted (141), Task Deleted (142) |query="Microsoft-Windows-TaskScheduler/Operational!*[System[Provider[@Name='Microsoft-Windows-TaskScheduler'] and (EventID=106 or EventID=141 or EventID=142 )]]" |
304304
|AppLocker packaged (Modern UI) app execution |query="Microsoft-Windows-AppLocker/Packaged app-Execution!*" |

azure-local/manage/manage-wdac.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,19 +4,19 @@ description: This article describes how to use Application Control on Azure Loca
44
author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
7-
ms.date: 12/10/2024
7+
ms.date: 02/03/2025
88
ms.service: azure-local
99
---
1010

11-
# Manage Application Control for Azure Local, version 23H2
11+
# Manage Application Control for Azure Local
1212

1313
[!INCLUDE [hci-applies-to-23h2](../includes/hci-applies-to-23h2.md)]
1414

15-
This article describes how to use Application Control to reduce the attack surface of Azure Local. For more information, see [Manage baseline security settings on Azure Local, version 23H2](../whats-new.md).
15+
This article describes how to use Application Control to reduce the attack surface of Azure Local. For more information, see [Manage baseline security settings on Azure Local](../whats-new.md).
1616

1717
## Prerequisites
1818

19-
Before you begin, make sure that you have access to an Azure Local, version 23H2 instance that is deployed, registered, and connected to Azure.
19+
Before you begin, make sure that you have access to an Azure Local instance that is deployed, registered, and connected to Azure.
2020

2121
## View Application Control settings via Azure portal
2222

@@ -133,4 +133,4 @@ Use the following steps to create a supplemental policy:
133133

134134
## Next steps
135135

136-
- [Complete the prerequisites and deployment checklist and install Azure Local, version 23H2](../deploy/deployment-prerequisites.md).
136+
- [Complete the prerequisites and deployment checklist and install Azure Local](../deploy/deployment-prerequisites.md).

0 commit comments

Comments
 (0)