Skip to content

Commit 491117d

Browse files
authored
Sync release-aks-ee-feb with main
Sync release-aks-ee-feb with main
2 parents 63cf492 + 1a60ab0 commit 491117d

File tree

3 files changed

+24
-24
lines changed

3 files changed

+24
-24
lines changed

azure-local/manage/connect-arc-vm-using-ssh.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
77
ms.service: azure-local
8-
ms.date: 02/11/2025
8+
ms.date: 02/18/2025
99

1010
#customer intent: As a Senior Content Developer, I want to provide customers with the highest level of content for using disconneced operations to deploy and manage their Azure Local instances.
1111
---
@@ -61,7 +61,7 @@ Before you begin, ensure that you:
6161
$resourceGroup="<your resource group>"
6262
$serverName = "<your server name>"
6363
$location = "<your location>"
64-
$localUser = "Administrator" # Use a local admin account for testing
64+
$localUser = "<your username>" # Use a local admin account for testing
6565
```
6666

6767
e. Install the `OpenSSH` Arc Extension:
@@ -107,7 +107,7 @@ Before you begin, ensure that you:
107107

108108
:::image type="content" source="./media/connect-arc-vm-using-ssh/azure-portal-extensions-list-view-3.png" alt-text="Screenshot of Azure portal Extensions list view." lightbox="./media/connect-arc-vm-using-ssh/azure-portal-extensions-list-view-3.png":::
109109

110-
## Use SSH to connect to Azure Local
110+
## Use SSH to connect to an Arc VM on Azure Local
111111

112112
> [!NOTE]
113113
> You may be asked to allow Arc SSH to set up port 22 for SSH.
@@ -124,7 +124,7 @@ Use the following steps to connect to Azure Local.
124124

125125
:::image type="content" source="./media/connect-arc-vm-using-ssh/server-connection-6.png" alt-text="Screenshot of server connection over SSH." lightbox="./media/connect-arc-vm-using-ssh/server-connection-6.png":::
126126

127-
## Use RDP over SSH to connect to Azure Local
127+
## Use RDP over SSH to connect an Arc VM on Azure Local
128128

129129
1. To sign into Azure Local using RDP over SSH, run the following command with the RDP parameter:
130130

azure-local/manage/manage-security-post-upgrade.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
77
ms.service: azure-local
8-
ms.date: 02/03/2025
8+
ms.date: 02/18/2025
99
---
1010

1111
# Manage security after upgrading Azure Local
@@ -41,31 +41,31 @@ Each of these steps is described in detail in the following sections.
4141
A new deployment of Azure Local introduces two baselines documents injected by the security management layer, while the upgraded cluster doesn't.
4242

4343
> [!IMPORTANT]
44-
> After applying the security baseline documents, a new mechanism is used to apply and maintain the [Security baseline settings](https://aka.ms/hci-securitybase).
44+
> After you apply the security baseline documents, a new mechanism is used to apply and maintain [Security baseline settings](https://aka.ms/hci-securitybase).
4545
4646
1. If your servers inherit baseline settings through mechanisms such as GPO, DSC, or scripts, we recommend that you:
4747

4848
- Remove these duplicate settings from such mechanisms.
49-
- Alternatively, after applying the security baseline, [Disable the drift control mechanism](./manage-secure-baseline.md).
49+
- Alternatively, after you apply the security baseline, [Disable the drift control mechanism](./manage-secure-baseline.md).
5050

51-
The new security posture of your servers will combine the previous settings, the new settings, and the overlapping settings with updated values.
51+
The new security posture of your servers combines previous settings, new settings, and overlapping settings with updated values.
5252

5353
> [!NOTE]
54-
> Microsoft tests and vaildates the Azure Local security settings. We strongly recommend that you keep these settings. Use of custom settings can potentially lead to system instability, incompatibility with the new product scenarios, and could require extensive testing and troubleshooting on your part.
54+
> Microsoft tests and vaildates the Azure Local security settings. We strongly recommend that you keep these settings. Use of custom settings can potentially lead to system instability, incompatibility with new product scenarios, and could require extensive testing and troubleshooting on your part.
5555
56-
1. When running the followign commands, you'll find the documents aren't in place. These cmdlets won't return any output.
56+
1. When running the following commands, you'll find the documents aren't in place. These cmdlets won't return any output.
5757

58-
```powershell
59-
Get-AzSSecuritySettingsConfiguration
60-
Get-AzSSecuredCoreConfiguration
61-
```
58+
```powershell
59+
Get-ASOSConfigSecuredCoreDoc
60+
Get-ASOSConfigSecuritySettingsDoc
61+
```
6262

6363
1. To enable the baselines, go to each of the nodes you upgraded. Run the following commands locally or remotely using a privileged administrator account:
6464

65-
```powershell
66-
Start-AzSSecuritySettingsConfiguration
67-
Start-AzSSecuredCoreConfiguration
68-
```
65+
```powershell
66+
Start-AzSSecuritySettingsConfiguration
67+
Start-AzSSecuredCoreConfiguration
68+
```
6969

7070
1. Reboot the nodes in a proper sequence for the new settings to become effective.
7171

@@ -78,9 +78,9 @@ Get-AzSSecuritySettingsConfiguration
7878
Get-AzSSecuredCoreConfiguration
7979
```
8080

81-
You'll get an output for each cmdlet with the baseline information.
81+
You get an output for each cmdlet with baseline information.
8282

83-
Here is an example of the baseline output:
83+
Here's an example of the baseline output:
8484

8585
```powershell
8686
OsConfiguration": {
@@ -108,7 +108,7 @@ If you need to enable BitLocker on any of your volumes, see [Manage BitLocker en
108108

109109
Application control for business (formerly known as Windows Defender Application Control or WDAC) provides a great layer of defense against running untrusted code.
110110

111-
After you upgrade your system, consider enabling Application Control. This can be disruptive if the necessary measures aren't taken for proper validation of existing third party software already existing on the servers.
111+
After you upgrade your system, consider enabling Application Control. This can be disruptive if the necessary measures aren't taken for proper validation of existing non-Microsoft software already existing on the servers.
112112

113113
For new deployments, Application Control is enabled in *Enforced* mode (blocking nontrusted binaries), whereas for upgraded systems we recommend that you follow these steps:
114114

@@ -118,7 +118,7 @@ For new deployments, Application Control is enabled in *Enforced* mode (blocking
118118
1. Repeat steps #2 and #3 as necessary until no further audit events are observed. Switch to *Enforced* mode.
119119

120120
> [!WARNING]
121-
> Failure to create the necessary AppControl policies to enable additional third party software will prevent that software from running.
121+
> Failure to create the necessary AppControl policies to enable non-Microsoft software may prevent that software from running.
122122
123123
For instructions to enable in *Enforced* mode, see [Manage Windows Defender Application Control for Azure Local](./manage-wdac.md#switch-application-control-policy-modes).
124124

azure-local/manage/support-tools.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article provides guidance on the Support Diagnostic Tool for A
44
author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
7-
ms.date: 01/16/2025
7+
ms.date: 02/18/2025
88
---
99

1010
# Use the Support Diagnostic Tool to troubleshoot Azure Local issues
@@ -235,7 +235,7 @@ Data collection done C:\temp\Azs.Support\XXXXXXX\SupportDataBundle-XX-XX_XX-XX-X
235235
## Questions or Feedback?
236236

237237
Do you have an issue? Would you like to share feedback with us about the Azure Local Support Diagnostic Tool?
238-
We Listen! To submit feedback, use the "contact owners" option inside PSGallery.
238+
We Listen! To submit feedback, contact [[email protected]](mailto:[email protected]).
239239

240240
## Next steps
241241

0 commit comments

Comments
 (0)