Skip to content

Commit f31741b

Browse files
committed
More changes
1 parent 8eb146b commit f31741b

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

azure-local/concepts/security-features.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: conceptual
77
ms.service: azure-local
8-
ms.date: 12/11/2024
8+
ms.date: 02/14/2025
99
---
1010

11-
# Security features for Azure Local, version 23H2
11+
# Security features for Azure Local
1212

1313
[!INCLUDE [hci-applies-to-23h2](../includes/hci-applies-to-23h2.md)]
1414

@@ -36,7 +36,7 @@ For more information, see [Manage security defaults on Azure Local](../manage/ma
3636

3737
## Application Control
3838

39-
Application Control is a software-based security layer that reduces attack surface by enforcing an explicit list of software that is allowed to run. Application Control is enabled by default and limits the applications and code that you can run on the core platform. For more information, see [Manage Application Control for Azure Local, version 23H2](../manage/manage-wdac.md#manage-application-control-settings-with-powershell).
39+
Application Control is a software-based security layer that reduces attack surface by enforcing an explicit list of software that is allowed to run. Application Control is enabled by default and limits the applications and code that you can run on the core platform. For more information, see [Manage Application Control for Azure Local](../manage/manage-wdac.md#manage-application-control-settings-with-powershell).
4040

4141
Application Control provides two main operation modes, Enforcement mode and Audit mode. In Enforcement mode, untrusted code is blocked and events are recorded. In Audit mode, untrusted code is allowed to run and events are recorded. To learn more about Application Control-related events, see [List of Events](/windows/security/application-security/application-control/windows-defender-application-control/operations/event-id-explanations).
4242

@@ -140,7 +140,7 @@ For more information, see [Manage secrets rotation](../manage/manage-secrets-rot
140140

141141
## Syslog forwarding of security events
142142

143-
For customers and organizations that require their own local security information and event management (SIEM) system, Azure Local, version 23H2 includes an integrated mechanism that enables you to forward security-related events to a SIEM.
143+
For customers and organizations that require their own local security information and event management (SIEM) system, Azure Local includes an integrated mechanism that enables you to forward security-related events to a SIEM.
144144

145145
Azure Local has an integrated syslog forwarder that, once configured, generates syslog messages defined in RFC3164, with the payload in Common Event Format (CEF).
146146

0 commit comments

Comments
 (0)