You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-local/concepts/security-features.md
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: alkohli
5
5
ms.author: alkohli
6
6
ms.topic: conceptual
7
7
ms.service: azure-local
8
-
ms.date: 03/04/2025
8
+
ms.date: 03/06/2025
9
9
---
10
10
11
11
# Security features for Azure Local
@@ -160,7 +160,10 @@ Azure Local comes with Microsoft Defender Antivirus enabled and configured by de
160
160
161
161
Although we recommend using Microsoft Defender Antivirus for Azure Local, if you prefer non-Microsoft antivirus and security software, **we advise selecting one that your Independent Software Vendor (ISV) has validated for Azure Local** to minimize potential functionality issues.
162
162
163
-
For more information, see [Microsoft Defender Antivirus compatibility with other security products](/defender-endpoint/microsoft-defender-antivirus-compatibility).
163
+
For more information, see:
164
+
165
+
-[Microsoft Defender Antivirus compatibility with other security products](/defender-endpoint/microsoft-defender-antivirus-compatibility).
166
+
-[Microsoft Defender Antivirus and non-Microsoft antivirus solutions without Defender for Endpoint](/defender-endpoint/defender-antivirus-compatibility-without-mde).
164
167
165
168
In the rare instance that you experience any functionality issues with Azure Local using non-Microsoft antivirus software, you can exclude the following paths:
166
169
@@ -186,7 +189,6 @@ With the basic Defender for Cloud plan, you get recommendations on how to improv
186
189
For more information, see:
187
190
188
191
-[Manage system security with Microsoft Defender for Cloud (preview)](../manage/manage-security-with-defender-for-cloud.md).
189
-
-[Microsoft Defender Antivirus and non-Microsoft antivirus solutions without Defender for Endpoint](/defender-endpoint/defender-antivirus-compatibility-without-mde).
Copy file name to clipboardExpand all lines: azure-local/known-issues.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Release notes with fixed and known issues in Azure Local
3
3
description: Read about the known issues and fixed issues in Azure Local.
4
4
author: alkohli
5
5
ms.topic: conceptual
6
-
ms.date: 01/28/2025
6
+
ms.date: 03/06/2025
7
7
ms.author: alkohli
8
8
ms.reviewer: alkohli
9
9
---
@@ -306,6 +306,7 @@ The following table lists the known issues in this release:
306
306
307
307
|Feature |Issue |Workaround |
308
308
|---------|---------|---------|
309
+
| Azure Migrate | Migration of Gen 1 (non-sysprep) VMs using Azure Migrate fails with the error: *Failed to clean up seed ISO disk from the file system for VM*. |Contact Microsoft Support to apply a patch that resolves the VM failures associated with this issue. |
309
310
| Security vulnerability <!--ADO-->|Microsoft has identified a security vulnerability that could expose the local admin credentials used during the creation of Arc VMs on Azure Local to non-admin users on the VM and on the hosts. <br> Arc VMs running on releases prior to Azure Local 2411 release are vulnerable. |To identify the Arc VMs that require this change and to change the account passwords, see detailed instructions in: [Security vulnerability for Arc VMs on Azure Local](https://aka.ms/CVE-2024-49060).|
310
311
| Deployment <!--30273426--><br>Upgrade |If the timezone is not set to UTC before you deploy Azure Local, an *ArcOperationTimeOut* error occurs during validation. The following error message is displayed: *OperationTimeOut, No updates received from device for operation.* |Depending on your scenario, choose one of the following workarounds for this issue: <br><br> **Scenario 1.** Before you start the deployment, make sure that the timezone is set to UTC. <br><br>Connect to each of the Azure Local nodes and change the timezone to UTC. <br><br> Run the following command: `Set-TimeZone -Id "UTC"`. <br><br> **Scenario 2.** If you started the deployment without setting the UTC timezone and received the error mentioned in the validation phase, follow these steps:<br><br> 1. Connect to each Azure Local node. Change the time zone to UTC with `Set-TimeZone -Id "UTC"`. Reboot the nodes.<br><br> 2. After the nodes have restarted, go to the Azure Local resource in Azure portal. Start the validation again to resolve the issue and continue with the deployment or upgrade.<br><br> For detailed remediation steps, see the troubleshooting guide in the [Azure Local Supportability](https://github.com/Azure/AzureLocal-Supportability/blob/main/TSG/Deployment/Triggering-deployment-settings-validation-call-results-in-OperationTimeout-2411-0.md) GitHub repository.|
311
312
| Update <!--30345067-->| When updating from version 2408.2.7 to 2411.0.24, the update process could fail with the following error message: `Type 'CauPreRequisites' of Role 'CAU' raised an exception: Could not finish cau prerequisites due to error 'Cannot remove item C:\UpdateDistribution\<any_file_name>: Access to the path is denied.'`|For detailed steps on how to mitigate this issue, see [Azure Local Troubleshooting Guide for Update](https://github.com/Azure/AzureLocal-Supportability/blob/main/TSG/Update/mitigation-for-cannot-remove-c-update-distribution-with-access-denied.md).|
Copy file name to clipboardExpand all lines: azure-local/update/about-updates-23h2.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,7 +82,9 @@ Solution updates managed by this feature contain new versions of the Azure Stack
82
82
This solution is the recommended way to update your Azure Local.
83
83
84
84
> [!NOTE]
85
-
> Customer workloads aren't covered by this update solution.
85
+
86
+
> - Azure Local update includes updates for all components, including Azure CLI, PowerShell, and any extensions. Microsoft does not support out of band updates for individual components. The out of band updates could lead to incompatibility with Application Control for Windows.
87
+
> - Customer workloads aren't covered by this update solution.
| Virtual machine sizes | Azure supports a wide variety of sizes for VMs. To learn about the available sizes and options, refer to the [Windows VMs sizes](/azure/virtual-machines/sizes) and [Linux VM sizes](/azure/virtual-machines/linux/sizes) topics. | Azure Stack supports a subset of VM sizes that are available in Azure. To view the list of supported sizes, refer to the [VM sizes](#vm-sizes) section of this article. |
26
26
| Virtual machine quotas |[Quota limits](/azure/azure-subscription-service-limits#service-specific-limits) are set by Microsoft. | The Azure Stack cloud admin must assign quotas before they offer VM to their users. |
27
27
| Virtual machine extensions |Azure supports a wide variety of VM extensions. To learn about the available extensions, refer to the [VM extensions and features](/azure/virtual-machines/windows/extensions-features) article.| Azure Stack supports a subset of extensions that are available in Azure and each of the extensions have specific versions. The Azure Stack cloud admin can choose which extensions to be made available to for their users. To view the list of supported extensions, refer to the [VM extensions](#vm-extensions) section of this article. |
28
-
| Virtual machine network | Public IP addresses assigned to a tenant VM are accessible over the Internet.<br><br><br>Azure VMs have a fixed DNS name. | Public IP addresses assigned to a tenant VM are accessible within the Azure Stack Development Kit environment only. A user must have access to the Azure Stack Development Kit via [RDP](../asdk/asdk-connect.md#connect-to-azure-stack-using-rdp) or [VPN](../asdk/asdk-connect.md#connect-to-azure-stack-using-vpn) to connect to a VM that is created in Azure Stack.<br><br>VMs created within a specific Azure Stack instance have a DNS name based on the value that is configured by the cloud admin. |
28
+
| Virtual machine network | Public IP addresses assigned to a tenant VM are accessible over the Internet.<br><br><br>Azure VMs have a fixed DNS name. | Public IP addresses assigned to a tenant VM are accessible within the Azure Stack Development Kit environment only. A user must have access to VPN to connect to a VM that is created in Azure Stack.<br><br>VMs created within a specific Azure Stack instance have a DNS name based on the value that is configured by the cloud admin. |
29
29
| Virtual machine storage | Supports [managed disks.](/azure/virtual-machines/windows/managed-disks-overview)| Managed disks are supported in Azure Stack with version 1808 and later. |
30
30
| Virtual machine disk performance | Depends on disk type and size. | Depends on VM size of the VM, which the disks are attached to. For more info, refer to the [VM sizes supported in Azure Stack](azure-stack-vm-sizes.md) article.
31
31
| API versions | Azure always has the latest API versions for all the VM features. | Azure Stack supports specific Azure services and specific API versions for these services. To view the list of supported API versions, refer to the [API versions](#api-versions) section of this article. |
Copy file name to clipboardExpand all lines: azure-stack/operator/azure-stack-app-service-before-you-get-started.md
+3-64Lines changed: 3 additions & 64 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,11 +2,10 @@
2
2
title: Prerequisites to deploy Azure App Service on Azure Stack Hub
3
3
description: Learn the prerequisite steps to complete before you deploy Azure App Service on Azure Stack Hub.
4
4
author: sethmanheim
5
-
6
5
ms.topic: article
7
6
ms.custom:
8
7
- devx-track-arm-template
9
-
ms.date: 10/24/2022
8
+
ms.date: 03/06/2025
10
9
ms.author: sethm
11
10
ms.reviewer: anwestg
12
11
ms.lastreviewed: 10/28/2019
@@ -24,7 +23,7 @@ Before you deploy Azure App Service on Azure Stack Hub, you must complete the pr
24
23
25
24
## Before you get started
26
25
27
-
This section lists the prerequisites for both integrated system and Azure Stack Development Kit (ASDK) deployments.
26
+
This section lists the prerequisites for Azure Stack Hub integrated systems deployments.
28
27
29
28
### Resource provider prerequisites
30
29
@@ -260,66 +259,6 @@ RECONFIGURE;
260
259
GO
261
260
```
262
261
263
-
<!-- ASDK Only --->
264
-
## Certificates and server configuration (ASDK)
265
-
266
-
This section lists the prerequisites for ASDK deployments.
267
-
268
-
### Certificates required for ASDK deployment of Azure App Service
269
-
270
-
The *Create-AppServiceCerts.ps1* script works with the Azure Stack Hub certificate authority to create the four certificates that App Service needs.
271
-
272
-
| File name | Use |
273
-
| --- | --- |
274
-
|_.appservice.local.azurestack.external.pfx | App Service default SSL certificate |
275
-
| api.appservice.local.azurestack.external.pfx | App Service API SSL certificate |
276
-
| ftp.appservice.local.azurestack.external.pfx | App Service publisher SSL certificate |
277
-
| sso.appservice.local.azurestack.external.pfx | App Service identity application certificate |
278
-
279
-
To create the certificates, follow these steps:
280
-
281
-
1. Sign in to the ASDK host using the AzureStack\AzureStackAdmin account.
282
-
2. Open an elevated PowerShell session.
283
-
3. Run the *Create-AppServiceCerts.ps1* script from the folder where you extracted the helper scripts. This script creates four certificates in the same folder as the script that App Service needs for creating certificates.
284
-
4. Enter a password to secure the .pfx files, and make a note of it. You must enter it later, in the App Service on Azure Stack Hub installer.
285
-
286
-
#### Create-AppServiceCerts.ps1 script parameters
287
-
288
-
| Parameter | Required or optional | Default value | Description |
289
-
| --- | --- | --- | --- |
290
-
| pfxPassword | Required | Null | Password that helps protect the certificate private key |
291
-
| DomainName | Required | local.azurestack.external | Azure Stack Hub region and domain suffix |
292
-
293
-
### Quickstart template for file server for deployments of Azure App Service on ASDK.
294
-
295
-
For ASDK deployments only, you can use the [example Azure Resource Manager deployment template](https://aka.ms/appsvconmasdkfstemplate) to deploy a configured single-node file server. The single-node file server will be in a workgroup.
296
-
297
-
> [!NOTE]
298
-
> The ASDK instance must be able to download resources from GitHub in order to complete the deployment.
299
-
300
-
### SQL Server instance
301
-
302
-
For the Azure App Service on Azure Stack Hub hosting and metering databases, you must prepare a SQL Server instance to hold the App Service databases.
303
-
304
-
For ASDK deployments, you can use SQL Server Express 2014 SP2 or later. SQL Server must be configured to support **Mixed Mode** authentication because App Service on Azure Stack Hub **DOES NOT** support Windows Authentication.
305
-
306
-
The SQL Server instance for Azure App Service on Azure Stack Hub must be accessible from all App Service roles. You can deploy SQL Server within the Default Provider Subscription in Azure Stack Hub. Or you can make use of the existing infrastructure within your organization (as long as there's connectivity to Azure Stack Hub). If you're using an Azure Marketplace image, remember to configure the firewall accordingly.
307
-
308
-
> [!NOTE]
309
-
> A number of SQL IaaS VM images are available through the Marketplace Management feature. Make sure you always download the latest version of the SQL IaaS Extension before you deploy a VM using a Marketplace item. The SQL images are the same as the SQL VMs that are available in Azure. For SQL VMs created from these images, the IaaS extension and corresponding portal enhancements provide features such as automatic patching and backup capabilities.
310
-
>
311
-
> For any of the SQL Server roles, you can use a default instance or a named instance. If you use a named instance, be sure to manually start the SQL Server Browser service and open port 1434.
312
-
313
-
The App Service installer will check to ensure the SQL Server has database containment enabled. To enable database containment on the SQL Server that will host the App Service databases, run these SQL commands:
## Licensing concerns for required file server and SQL Server
324
263
325
264
Azure App Service on Azure Stack Hub requires a file server and SQL Server to operate. You're free to use pre-existing resources located outside of your Azure Stack Hub deployment or deploy resources within their Azure Stack Hub Default Provider Subscription.
@@ -335,7 +274,7 @@ Cloud operators are responsible for the maintenance and operation of the File Se
335
274
336
275
## Retrieve the Azure Resource Manager root certificate for Azure Stack Hub
337
276
338
-
Open an elevated PowerShell session on a computer that can reach the privileged endpoint on the Azure Stack Hub Integrated System or ASDK Host.
277
+
Open an elevated PowerShell session on a computer that can reach the privileged endpoint on the Azure Stack Hub integrated system.
339
278
340
279
Run the *Get-AzureStackRootCert.ps1* script from the folder where you extracted the helper scripts. The script creates a root certificate in the same folder as the script that App Service needs for creating certificates.
Copy file name to clipboardExpand all lines: azure-stack/operator/azure-stack-app-service-capacity-planning.md
+3-5Lines changed: 3 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,9 +2,8 @@
2
2
title: Plan App Service server roles capacity - Azure Stack Hub
3
3
description: Learn about capacity planning for App Service server roles in Azure Stack Hub.
4
4
author: sethmanheim
5
-
6
5
ms.topic: article
7
-
ms.date: 05/05/2020
6
+
ms.date: 03/06/2025
8
7
ms.author: sethm
9
8
ms.reviewer: anwestg
10
9
ms.lastreviewed: 04/13/2020
@@ -99,7 +98,7 @@ Cloud admins can monitor their worker tier allocation in the App Service admin a
99
98
100
99
## File server role
101
100
102
-
For the file server role, you can use a standalone file server for development and testing. For example, when deploying Azure App Service on the Azure Stack Development Kit (ASDK) you can use this [template](https://aka.ms/appsvconmasdkfstemplate). For production purposes, you should use a pre-configured Windows file server, or a pre-configured non-Windows file server.
101
+
For the file server role, you can use a standalone file server for development and testing. For production purposes, you should use a pre-configured Windows file server, or a pre-configured non-Windows file server.
103
102
104
103
In production environments, the file server role experiences intensive disk I/O. Because it houses all of the content and app files for user web sites, you should preconfigure one of the following resources for this role:
105
104
@@ -115,5 +114,4 @@ For more information, see [Provision a file server](azure-stack-app-service-befo
115
114
116
115
[Prerequisites for deploying App Service on Azure Stack Hub](azure-stack-app-service-before-you-get-started.md)
0 commit comments