Skip to content

Commit ff32218

Browse files
committed
Updated version references in post-upgrade article.
1 parent de27555 commit ff32218

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

azure-local/manage/manage-security-post-upgrade.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,26 @@
11
---
2-
title: Manage security after upgrading your Azure Local from version 22H2 to version 23H2.
3-
description: Learn how to manage security posture after you have upgraded Azure Local to version 23H2.
2+
title: Manage security after upgrading your Azure Local from an Azure Stack HCI, version 22H2.
3+
description: Learn how to manage security posture after you upgrade Azure Local from an Azure Stack HCI, version 22H2.
44
author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
77
ms.service: azure-local
8-
ms.date: 12/11/2024
8+
ms.date: 01/28/2025
99
---
1010

1111
# Manage security after upgrading Azure Local
1212

1313
[!INCLUDE [hci-applies-to-23h2](../includes/hci-applies-to-23h2.md)]
1414

15-
This article describes how to manage security settings on an Azure Local that was upgraded from version 22H2 to version 23H2.
15+
This article describes how to manage security settings on an Azure Local that was upgraded from an Azure Stack HCI, version 22H2.
1616

1717
## Prerequisites
1818

19-
Before you begin, make sure that you have access to an Azure Local, version 23H2 system that was upgraded from version 22H2.
19+
Before you begin, make sure that you have access to an Azure Local system that was upgraded from an Azure Stack HCI, version 22H2.
2020

2121
## Post upgrade security changes
2222

23-
When you upgrade your Azure Local from version 22H2 to version 23H2, the security posture of your system doesn't change. We strongly recommend that you update the security settings after the upgrade to benefit from enhanced security.
23+
When you upgrade your Azure Local from Azure Stack HCI, version 22H2, the security posture of your system doesn't change. We strongly recommend that you update the security settings after the upgrade to benefit from enhanced security.
2424

2525
Here are the benefits of updating the security settings:
2626

@@ -51,7 +51,7 @@ A new deployment of Azure Local introduces two baselines documents injected by t
5151
The new security posture of your servers will combine the previous settings, the new settings, and the overlapping settings with updated values.
5252

5353
> [!NOTE]
54-
> Microsoft tests and vaildates the Azure Local, version 23H2 security settings. We strongly recommend that you keep these settings. Use of custom settings can potentially lead to system instability, incompatibility with the new product scenarios, and could require extensive testing and troubleshooting on your part.
54+
> Microsoft tests and vaildates the Azure Local security settings. We strongly recommend that you keep these settings. Use of custom settings can potentially lead to system instability, incompatibility with the new product scenarios, and could require extensive testing and troubleshooting on your part.
5555
5656
1. When running the followign commands, you'll find the documents aren't in place. These cmdlets won't return any output.
5757

@@ -108,7 +108,7 @@ If you need to enable BitLocker on any of your volumes, see [Manage BitLocker en
108108

109109
Application control for business (formerly known as Windows Defender Application Control or WDAC) provides a great layer of defense against running untrusted code.
110110

111-
After you've upgraded to version 23H2, consider enabling Application Control. This can be disruptive if the necessary measures aren't taken for proper validation of existing third party software already existing on the servers.
111+
After you upgrade your system, consider enabling Application Control. This can be disruptive if the necessary measures aren't taken for proper validation of existing third party software already existing on the servers.
112112

113113
For new deployments, Application Control is enabled in *Enforced* mode (blocking nontrusted binaries), whereas for upgraded systems we recommend that you follow these steps:
114114

0 commit comments

Comments
 (0)