You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: AKS-Arc/aks-hci-network-system-requirements.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: AKS enabled by Azure Arc network requirements
3
3
description: Learn about AKS network prerequisites.
4
4
ms.topic: overview
5
-
ms.date: 11/19/2024
5
+
ms.date: 04/23/2025
6
6
author: sethmanheim
7
7
ms.author: sethm
8
8
ms.reviewer: abha
@@ -64,6 +64,9 @@ Regardless of the option you choose, you must ensure that the IP addresses alloc
64
64
65
65
Proxy settings in AKS are inherited from the underlying infrastructure system. The functionality to set individual proxy settings for Kubernetes clusters and change proxy settings isn't supported yet. For more information on how to set proxy correctly, see [proxy requirements for Azure Local](/azure/azure-local/manage/configure-proxy-settings-23h2).
66
66
67
+
> [!WARNING]
68
+
> You cannot update incorrect proxy settings after you deploy Azure Local. If the proxy is misconfigured, you must redeploy Azure Local.
69
+
67
70
## Firewall URL exceptions
68
71
69
72
Firewall requirements for AKS have been consolidated with Azure Local firewall requirements. See [Azure Local firewall requirements](/azure/azure-local/concepts/firewall-requirements) for list of URLs that need to be allowed to successfully deploy AKS.
@@ -27,6 +27,7 @@ Before you begin the download of the software from Azure portal, ensure that you
27
27
-[Pay-as-you-go](https://azure.microsoft.com/pricing/purchase-options/pay-as-you-go/) subscription with credit card.
28
28
- Subscription obtained through an Enterprise Agreement (EA).
29
29
- Subscription obtained through the Cloud Solution Provider (CSP) program.
30
+
- At a minimum, you'll need **Reader** access at the subscription level.
30
31
31
32
- Register the Microsoft Azure Stack HCI resource provider. For more information, see [Register your machines and assign permissions for Azure Local deployment](deployment-arc-register-server-permissions.md).
## Revoke SAS token for storage account used for Arc VM images
92
+
## Revoke SAS token for storage account used for Azure Local VM images
93
93
94
-
This section describes how you can revoke the Shared Access Signature (SAS) token for the storage account used for Arc VM images.
94
+
This section describes how you can revoke the Shared Access Signature (SAS) token for the storage account used for images used by Azure Local VMs enabled by Arc.
Copy file name to clipboardExpand all lines: azure-local/manage/manage-security-with-defender-for-cloud.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This article describes how to use Microsoft Defender for Cloud to s
4
4
author: alkohli
5
5
ms.author: alkohli
6
6
ms.topic: how-to
7
-
ms.date: 02/04/2025
7
+
ms.date: 04/09/2025
8
8
ms.service: azure-local
9
9
---
10
10
@@ -32,15 +32,15 @@ Before you begin, make sure that the following prerequisites are completed:
32
32
Follow these steps to enable Defender for Cloud for Azure Local.
33
33
34
34
- Step 1: Turn on Foundational CSPM.
35
-
- Step 2: Turn on Defender for Servers for individual machines and Arc VMs.
35
+
- Step 2: Turn on Defender for Servers for individual machines and Azure Local VMs enabled by Arc.
36
36
37
37
### Step 1: Turn on Foundational CSPM
38
38
39
39
This step turns on the basic Defender for Cloud plan—at no extra cost. This plan lets you monitor and identify the steps that you can take to secure Azure Local, along with other Azure and Arc resources. For instructions, see [Enable Defender for Cloud on your Azure subscription](/azure/defender-for-cloud/connect-azure-subscription#enable-defender-for-cloud-on-your-azure-subscription).
40
40
41
-
### Step 2: Turn on Defender for Servers for individual machines and Arc VMs
41
+
### Step 2: Turn on Defender for Servers for individual machines and Azure Local VMs
42
42
43
-
This step gets you enhanced security features including security alerts for individual machines and Arc VMs.
43
+
This step gets you enhanced security features including security alerts for individual machines and VMs.
44
44
45
45
To do so, follow all the instructions in the [Enable the Defender for Servers plan](/azure/defender-for-cloud/tutorial-enable-servers-plan#enable-the-defender-for-servers-plan) section, which includes:
46
46
@@ -100,17 +100,17 @@ After you've [enabled Defender for Cloud for Azure Local](#enable-defender-for-c
100
100
101
101
To learn more about the security recommendations specific to Azure Local, refer to the [Azure compute recommendations](/azure/defender-for-cloud/recommendations-reference-compute#azure-compute-recommendations) section in the [Compute security recommendations](/azure/defender-for-cloud/recommendations-reference-compute) article.
102
102
103
-
## Monitor servers and Arc VMs
103
+
## Monitor servers and Azure Local VMs
104
104
105
-
Go to the Microsoft Defender for Cloud portal to monitor alerts for individual servers and Arc VMs running on Azure Local. You can utilize the regulatory compliance and attack path analysis features, among other enhanced security features.
105
+
Go to the Microsoft Defender for Cloud portal to monitor alerts for individual servers and VMs running on Azure Local. You can utilize the regulatory compliance and attack path analysis features, among other enhanced security features.
106
106
107
-
Follow these steps to access the Microsoft Defender for Cloud portal's pages to monitor individual servers and Arc VMs:
107
+
Follow these steps to access the Microsoft Defender for Cloud portal's pages to monitor individual servers and VMs:
108
108
109
109
1. Sign into the Azure portal, and search for and select **Microsoft Defender for Cloud**.
110
110
111
111
:::image type="content" source="./media/manage-security-with-defender-for-cloud/access-defender-for-cloud.png" alt-text="Screenshot that shows how to search for Defender for Cloud in the Azure portal." lightbox="./media/manage-security-with-defender-for-cloud/access-defender-for-cloud.png" :::
112
112
113
-
1. The **Overview** page of the Microsoft Defender for Cloud portal shows the overall security posture of your environment. From the left navigation pane, navigate to various portal pages, such as **Recommendations** to view security recommendations for individual servers and Arc VMs running on Azure Local, or **Security alerts** to monitor alerts for them.
113
+
1. The **Overview** page of the Microsoft Defender for Cloud portal shows the overall security posture of your environment. From the left navigation pane, navigate to various portal pages, such as **Recommendations** to view security recommendations for individual servers and VMs running on Azure Local, or **Security alerts** to monitor alerts for them.
114
114
115
115
:::image type="content" source="./media/manage-security-with-defender-for-cloud/defender-for-cloud-overview.png" alt-text="Screenshot of the Defender for Cloud Overview page." lightbox="./media/manage-security-with-defender-for-cloud/defender-for-cloud-overview.png" :::
Copy file name to clipboardExpand all lines: azure-local/manage/monitor-multi-azure-policies.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: alkohli
6
6
ms.reviewer: saniyaislam
7
7
ms.topic: how-to
8
8
ms.service: azure-local
9
-
ms.date: 09/12/2024
9
+
ms.date: 04/09/2025
10
10
---
11
11
12
12
# Enable Insights for Azure Local at scale using Azure policies
@@ -722,7 +722,7 @@ To create a policy assignment, follow these steps:
722
722
723
723
1. Select **Next** to view the **Parameters** tab. If the policy definition you selected on the **Basics** tab included parameters, they show up on the **Parameters** tab.
724
724
725
-
For example, the policy to repair AMA shows the **Include Arc connected machines** parameter. Select **True** to include Arc connected machines in the policy assignment.
725
+
For example, the policy to repair AMA shows the **Include Arc connected machines** parameter. Select **True** to include Arc-enabled servers in the policy assignment.
726
726
727
727
:::image type="content" source="./media/monitor-multi-azure-policies/policy-assign-parameters-tab.png" alt-text="Screenshot of the Parameters tab on Assign policy page to define or modify parameters." lightbox="./media/monitor-multi-azure-policies/policy-assign-parameters-tab.png":::
0 commit comments