Skip to content

Commit 2b1f63f

Browse files
Merge pull request #17606 from v-sissondan/azl-rebrand-manage-security
Azure Local VM rebrand - Manage security
2 parents 0e906c3 + 688760e commit 2b1f63f

File tree

2 files changed

+11
-11
lines changed

2 files changed

+11
-11
lines changed

azure-local/manage/manage-secrets-rotation.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes how to manage internal secret rotation on Az
44
author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
7-
ms.date: 02/11/2025
7+
ms.date: 04/09/2025
88
ms.service: azure-local
99
---
1010

@@ -89,9 +89,9 @@ This section describes how you can change the storage account key for the cluste
8989
Set-ECEServiceSecret -ContainerName WitnessCredential -Credential $WitnessCred
9090
```
9191
92-
## Revoke SAS token for storage account used for Arc VM images
92+
## Revoke SAS token for storage account used for Azure Local VM images
9393
94-
This section describes how you can revoke the Shared Access Signature (SAS) token for the storage account used for Arc VM images.
94+
This section describes how you can revoke the Shared Access Signature (SAS) token for the storage account used for images used by Azure Local VMs enabled by Arc.
9595
9696
| SAS policy | SAS expired? | Steps to revoke |
9797
|---------|---------|---------|

azure-local/manage/manage-security-with-defender-for-cloud.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes how to use Microsoft Defender for Cloud to s
44
author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
7-
ms.date: 02/04/2025
7+
ms.date: 04/09/2025
88
ms.service: azure-local
99
---
1010

@@ -32,15 +32,15 @@ Before you begin, make sure that the following prerequisites are completed:
3232
Follow these steps to enable Defender for Cloud for Azure Local.
3333

3434
- Step 1: Turn on Foundational CSPM.
35-
- Step 2: Turn on Defender for Servers for individual machines and Arc VMs.
35+
- Step 2: Turn on Defender for Servers for individual machines and Azure Local VMs enabled by Arc.
3636

3737
### Step 1: Turn on Foundational CSPM
3838

3939
This step turns on the basic Defender for Cloud plan—at no extra cost. This plan lets you monitor and identify the steps that you can take to secure Azure Local, along with other Azure and Arc resources. For instructions, see [Enable Defender for Cloud on your Azure subscription](/azure/defender-for-cloud/connect-azure-subscription#enable-defender-for-cloud-on-your-azure-subscription).
4040

41-
### Step 2: Turn on Defender for Servers for individual machines and Arc VMs
41+
### Step 2: Turn on Defender for Servers for individual machines and Azure Local VMs
4242

43-
This step gets you enhanced security features including security alerts for individual machines and Arc VMs.
43+
This step gets you enhanced security features including security alerts for individual machines and VMs.
4444

4545
To do so, follow all the instructions in the [Enable the Defender for Servers plan](/azure/defender-for-cloud/tutorial-enable-servers-plan#enable-the-defender-for-servers-plan) section, which includes:
4646

@@ -100,17 +100,17 @@ After you've [enabled Defender for Cloud for Azure Local](#enable-defender-for-c
100100
101101
To learn more about the security recommendations specific to Azure Local, refer to the [Azure compute recommendations](/azure/defender-for-cloud/recommendations-reference-compute#azure-compute-recommendations) section in the [Compute security recommendations](/azure/defender-for-cloud/recommendations-reference-compute) article.
102102

103-
## Monitor servers and Arc VMs
103+
## Monitor servers and Azure Local VMs
104104

105-
Go to the Microsoft Defender for Cloud portal to monitor alerts for individual servers and Arc VMs running on Azure Local. You can utilize the regulatory compliance and attack path analysis features, among other enhanced security features.
105+
Go to the Microsoft Defender for Cloud portal to monitor alerts for individual servers and VMs running on Azure Local. You can utilize the regulatory compliance and attack path analysis features, among other enhanced security features.
106106

107-
Follow these steps to access the Microsoft Defender for Cloud portal's pages to monitor individual servers and Arc VMs:
107+
Follow these steps to access the Microsoft Defender for Cloud portal's pages to monitor individual servers and VMs:
108108

109109
1. Sign into the Azure portal, and search for and select **Microsoft Defender for Cloud**.
110110

111111
:::image type="content" source="./media/manage-security-with-defender-for-cloud/access-defender-for-cloud.png" alt-text="Screenshot that shows how to search for Defender for Cloud in the Azure portal." lightbox="./media/manage-security-with-defender-for-cloud/access-defender-for-cloud.png" :::
112112

113-
1. The **Overview** page of the Microsoft Defender for Cloud portal shows the overall security posture of your environment. From the left navigation pane, navigate to various portal pages, such as **Recommendations** to view security recommendations for individual servers and Arc VMs running on Azure Local, or **Security alerts** to monitor alerts for them.
113+
1. The **Overview** page of the Microsoft Defender for Cloud portal shows the overall security posture of your environment. From the left navigation pane, navigate to various portal pages, such as **Recommendations** to view security recommendations for individual servers and VMs running on Azure Local, or **Security alerts** to monitor alerts for them.
114114

115115
:::image type="content" source="./media/manage-security-with-defender-for-cloud/defender-for-cloud-overview.png" alt-text="Screenshot of the Defender for Cloud Overview page." lightbox="./media/manage-security-with-defender-for-cloud/defender-for-cloud-overview.png" :::
116116

0 commit comments

Comments
 (0)