Skip to content

Commit 5f1a8c1

Browse files
authored
Merge pull request #17746 from MicrosoftDocs/main
4/23/2025 PM Publish
2 parents c49e747 + 2b1f63f commit 5f1a8c1

File tree

5 files changed

+20
-16
lines changed

5 files changed

+20
-16
lines changed

AKS-Arc/aks-hci-network-system-requirements.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: AKS enabled by Azure Arc network requirements
33
description: Learn about AKS network prerequisites.
44
ms.topic: overview
5-
ms.date: 11/19/2024
5+
ms.date: 04/23/2025
66
author: sethmanheim
77
ms.author: sethm
88
ms.reviewer: abha
@@ -64,6 +64,9 @@ Regardless of the option you choose, you must ensure that the IP addresses alloc
6464

6565
Proxy settings in AKS are inherited from the underlying infrastructure system. The functionality to set individual proxy settings for Kubernetes clusters and change proxy settings isn't supported yet. For more information on how to set proxy correctly, see [proxy requirements for Azure Local](/azure/azure-local/manage/configure-proxy-settings-23h2).
6666

67+
> [!WARNING]
68+
> You cannot update incorrect proxy settings after you deploy Azure Local. If the proxy is misconfigured, you must redeploy Azure Local.
69+
6770
## Firewall URL exceptions
6871

6972
Firewall requirements for AKS have been consolidated with Azure Local firewall requirements. See [Azure Local firewall requirements](/azure/azure-local/concepts/firewall-requirements) for list of URLs that need to be allowed to successfully deploy AKS.

azure-local/deploy/download-23h2-software.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
77
ms.service: azure-local
8-
ms.date: 04/21/2025
8+
ms.date: 04/23/2025
99
---
1010

11-
# Download version 23H2 operating system for Azure Local deployment
11+
# Download operating system for Azure Local deployment
1212

1313
[!INCLUDE [hci-applies-to-23h2](../includes/hci-applies-to-23h2.md)]
1414

@@ -27,6 +27,7 @@ Before you begin the download of the software from Azure portal, ensure that you
2727
- [Pay-as-you-go](https://azure.microsoft.com/pricing/purchase-options/pay-as-you-go/) subscription with credit card.
2828
- Subscription obtained through an Enterprise Agreement (EA).
2929
- Subscription obtained through the Cloud Solution Provider (CSP) program.
30+
- At a minimum, you'll need **Reader** access at the subscription level.
3031

3132
- Register the Microsoft Azure Stack HCI resource provider. For more information, see [Register your machines and assign permissions for Azure Local deployment](deployment-arc-register-server-permissions.md).
3233

azure-local/manage/manage-secrets-rotation.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes how to manage internal secret rotation on Az
44
author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
7-
ms.date: 02/11/2025
7+
ms.date: 04/09/2025
88
ms.service: azure-local
99
---
1010

@@ -89,9 +89,9 @@ This section describes how you can change the storage account key for the cluste
8989
Set-ECEServiceSecret -ContainerName WitnessCredential -Credential $WitnessCred
9090
```
9191
92-
## Revoke SAS token for storage account used for Arc VM images
92+
## Revoke SAS token for storage account used for Azure Local VM images
9393
94-
This section describes how you can revoke the Shared Access Signature (SAS) token for the storage account used for Arc VM images.
94+
This section describes how you can revoke the Shared Access Signature (SAS) token for the storage account used for images used by Azure Local VMs enabled by Arc.
9595
9696
| SAS policy | SAS expired? | Steps to revoke |
9797
|---------|---------|---------|

azure-local/manage/manage-security-with-defender-for-cloud.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes how to use Microsoft Defender for Cloud to s
44
author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
7-
ms.date: 02/04/2025
7+
ms.date: 04/09/2025
88
ms.service: azure-local
99
---
1010

@@ -32,15 +32,15 @@ Before you begin, make sure that the following prerequisites are completed:
3232
Follow these steps to enable Defender for Cloud for Azure Local.
3333

3434
- Step 1: Turn on Foundational CSPM.
35-
- Step 2: Turn on Defender for Servers for individual machines and Arc VMs.
35+
- Step 2: Turn on Defender for Servers for individual machines and Azure Local VMs enabled by Arc.
3636

3737
### Step 1: Turn on Foundational CSPM
3838

3939
This step turns on the basic Defender for Cloud plan—at no extra cost. This plan lets you monitor and identify the steps that you can take to secure Azure Local, along with other Azure and Arc resources. For instructions, see [Enable Defender for Cloud on your Azure subscription](/azure/defender-for-cloud/connect-azure-subscription#enable-defender-for-cloud-on-your-azure-subscription).
4040

41-
### Step 2: Turn on Defender for Servers for individual machines and Arc VMs
41+
### Step 2: Turn on Defender for Servers for individual machines and Azure Local VMs
4242

43-
This step gets you enhanced security features including security alerts for individual machines and Arc VMs.
43+
This step gets you enhanced security features including security alerts for individual machines and VMs.
4444

4545
To do so, follow all the instructions in the [Enable the Defender for Servers plan](/azure/defender-for-cloud/tutorial-enable-servers-plan#enable-the-defender-for-servers-plan) section, which includes:
4646

@@ -100,17 +100,17 @@ After you've [enabled Defender for Cloud for Azure Local](#enable-defender-for-c
100100
101101
To learn more about the security recommendations specific to Azure Local, refer to the [Azure compute recommendations](/azure/defender-for-cloud/recommendations-reference-compute#azure-compute-recommendations) section in the [Compute security recommendations](/azure/defender-for-cloud/recommendations-reference-compute) article.
102102

103-
## Monitor servers and Arc VMs
103+
## Monitor servers and Azure Local VMs
104104

105-
Go to the Microsoft Defender for Cloud portal to monitor alerts for individual servers and Arc VMs running on Azure Local. You can utilize the regulatory compliance and attack path analysis features, among other enhanced security features.
105+
Go to the Microsoft Defender for Cloud portal to monitor alerts for individual servers and VMs running on Azure Local. You can utilize the regulatory compliance and attack path analysis features, among other enhanced security features.
106106

107-
Follow these steps to access the Microsoft Defender for Cloud portal's pages to monitor individual servers and Arc VMs:
107+
Follow these steps to access the Microsoft Defender for Cloud portal's pages to monitor individual servers and VMs:
108108

109109
1. Sign into the Azure portal, and search for and select **Microsoft Defender for Cloud**.
110110

111111
:::image type="content" source="./media/manage-security-with-defender-for-cloud/access-defender-for-cloud.png" alt-text="Screenshot that shows how to search for Defender for Cloud in the Azure portal." lightbox="./media/manage-security-with-defender-for-cloud/access-defender-for-cloud.png" :::
112112

113-
1. The **Overview** page of the Microsoft Defender for Cloud portal shows the overall security posture of your environment. From the left navigation pane, navigate to various portal pages, such as **Recommendations** to view security recommendations for individual servers and Arc VMs running on Azure Local, or **Security alerts** to monitor alerts for them.
113+
1. The **Overview** page of the Microsoft Defender for Cloud portal shows the overall security posture of your environment. From the left navigation pane, navigate to various portal pages, such as **Recommendations** to view security recommendations for individual servers and VMs running on Azure Local, or **Security alerts** to monitor alerts for them.
114114

115115
:::image type="content" source="./media/manage-security-with-defender-for-cloud/defender-for-cloud-overview.png" alt-text="Screenshot of the Defender for Cloud Overview page." lightbox="./media/manage-security-with-defender-for-cloud/defender-for-cloud-overview.png" :::
116116

azure-local/manage/monitor-multi-azure-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: alkohli
66
ms.reviewer: saniyaislam
77
ms.topic: how-to
88
ms.service: azure-local
9-
ms.date: 09/12/2024
9+
ms.date: 04/09/2025
1010
---
1111

1212
# Enable Insights for Azure Local at scale using Azure policies
@@ -722,7 +722,7 @@ To create a policy assignment, follow these steps:
722722

723723
1. Select **Next** to view the **Parameters** tab. If the policy definition you selected on the **Basics** tab included parameters, they show up on the **Parameters** tab.
724724

725-
For example, the policy to repair AMA shows the **Include Arc connected machines** parameter. Select **True** to include Arc connected machines in the policy assignment.
725+
For example, the policy to repair AMA shows the **Include Arc connected machines** parameter. Select **True** to include Arc-enabled servers in the policy assignment.
726726

727727
:::image type="content" source="./media/monitor-multi-azure-policies/policy-assign-parameters-tab.png" alt-text="Screenshot of the Parameters tab on Assign policy page to define or modify parameters." lightbox="./media/monitor-multi-azure-policies/policy-assign-parameters-tab.png":::
728728

0 commit comments

Comments
 (0)