Skip to content

Commit 0bc71d8

Browse files
committed
update
1 parent 934a3a8 commit 0bc71d8

9 files changed

Lines changed: 35 additions & 36 deletions

articles/security/fundamentals/antimalware.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.assetid: 265683c8-30d7-4f2b-b66c-5082a18f7a8b
88
ms.service: security
99
ms.subservice: security-fundamentals
1010
ms.topic: article
11-
ms.date: 04/24/2025
11+
ms.date: 01/12/2026
1212
ms.author: mbaldwin
1313
---
1414

@@ -42,7 +42,7 @@ Microsoft Antimalware for Azure consists of several components:
4242
- Antimalware PowerShell cmdlets
4343
- Azure Diagnostics Extension
4444

45-
### Platform Support and Deployment
45+
### Platform support and deployment
4646

4747
**Virtual Machines:**
4848
- Not installed by default
@@ -100,13 +100,13 @@ The following table summarizes the configuration settings available for the Anti
100100

101101
![Table 1](./media/antimalware/sec-azantimal-tb18.png)
102102

103-
## Antimalware Deployment Scenarios
103+
## Antimalware deployment scenarios
104104

105105
The scenarios to enable and configure antimalware, including monitoring for Azure Cloud Services and Virtual Machines, are discussed in this section.
106106

107107
### Virtual machines - enable and configure antimalware
108108

109-
#### Deployment While creating a VM using the Azure portal
109+
#### Deployment while creating a VM using the Azure portal
110110

111111
Follow these steps to enable and configure Microsoft Antimalware for Azure Virtual Machines using the Azure portal while provisioning a Virtual Machine:
112112

@@ -154,7 +154,7 @@ To enable and configure the Microsoft Antimalware service using Visual Studio:
154154
> [!NOTE]
155155
> The Visual Studio Virtual Machines configuration for Antimalware supports only JSON format configuration. For more information about sample configurations, see [Code samples to enable and configure Microsoft Antimalware for Azure](antimalware-code-samples.md).
156156
157-
#### Deployment Using PowerShell cmdlets
157+
#### Deployment using PowerShell cmdlets
158158

159159
An Azure application or service can enable and configure Microsoft Antimalware for Azure Virtual Machines using PowerShell cmdlets.
160160

@@ -166,7 +166,7 @@ To enable and configure Microsoft Antimalware using PowerShell cmdlets:
166166
> [!NOTE]
167167
>The Azure Virtual Machines configuration for Antimalware supports only JSON format configuration. For more information about sample configurations, see [Code samples to enable and configure Microsoft Antimalware for Azure](antimalware-code-samples.md).
168168
169-
### Enable and Configure Antimalware Using PowerShell cmdlets
169+
### Enable and configure antimalware using PowerShell cmdlets
170170

171171
An Azure application or service can enable and configure Microsoft Antimalware for Azure Cloud Services using PowerShell cmdlets. Microsoft Antimalware is installed in a disabled state in the Cloud Services platform and requires an action by an Azure application to enable it.
172172

@@ -177,7 +177,7 @@ To enable and configure Microsoft Antimalware using PowerShell cmdlets:
177177

178178
For more information about sample PowerShell commands, see [Code samples to enable and configure Microsoft Antimalware for Azure](antimalware-code-samples.md).
179179

180-
### Cloud Services and Virtual Machines - Configuration Using PowerShell cmdlets
180+
### Cloud Services and Virtual Machines - configuration using PowerShell cmdlets
181181

182182
An Azure application or service can retrieve the Microsoft Antimalware configuration for Cloud Services and Virtual Machines using PowerShell cmdlets.
183183

@@ -189,7 +189,7 @@ To retrieve the Microsoft Antimalware configuration using PowerShell cmdlets:
189189

190190
## Samples
191191

192-
### Remove Antimalware Configuration Using PowerShell cmdlets
192+
### Remove antimalware configuration using PowerShell cmdlets
193193

194194
An Azure application or service can completely remove Microsoft Antimalware protection by uninstalling the relevant extensions from your Cloud Services or Virtual Machines. This process removes both the antimalware protection and associated monitoring settings, completely discontinuing malware protection and event collection for the specified resources.
195195

@@ -211,7 +211,7 @@ Antimalware events are collected from the Windows event system logs to your Azur
211211

212212
![Metrics and diagnostics](./media/antimalware/sec-azantimal-fig8.PNG)
213213

214-
### Enable and configure Antimalware using PowerShell cmdlets for Azure Resource Manager VMs
214+
### Enable and configure antimalware using PowerShell cmdlets for Azure Resource Manager VMs
215215

216216
To enable and configure Microsoft Antimalware for Azure Resource Manager VMs using PowerShell cmdlets:
217217

@@ -223,7 +223,7 @@ The following code samples are available:
223223
- [Deploy Microsoft Antimalware on ARM template VMs](antimalware-code-samples.md#deploy-microsoft-antimalware-on-azure-resource-manager-vms)
224224
- [Add Microsoft Antimalware to Azure Service Fabric Clusters](antimalware-code-samples.md#add-microsoft-antimalware-to-azure-service-fabric-clusters)
225225

226-
### Enable and configure Antimalware to Azure Cloud Service Extended Support (CS-ES) using PowerShell cmdlets
226+
### Enable and configure antimalware to Azure Cloud Service Extended Support (CS-ES) using PowerShell cmdlets
227227

228228
To enable and configure Microsoft Antimalware using PowerShell cmdlets:
229229

@@ -234,7 +234,7 @@ The following code sample is available:
234234

235235
- [Add Microsoft Antimalware to Azure Cloud Service using Extended Support(CS-ES)](antimalware-code-samples.md#add-microsoft-antimalware-to-azure-cloud-service-using-extended-support)
236236

237-
### Enable and configure Antimalware using PowerShell cmdlets for Azure Arc-enabled servers
237+
### Enable and configure antimalware using PowerShell cmdlets for Azure Arc-enabled servers
238238

239239
To enable and configure Microsoft Antimalware for Azure Arc-enabled servers using PowerShell cmdlets:
240240

articles/security/fundamentals/managed-tls-changes.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: security
55
ms.service: security
66
ms.subservice: security-fundamentals
77
ms.topic: concept-article
8-
ms.date: 08/26/2025
8+
ms.date: 01/12/2026
99

1010
ms.author: sarahlipsey
1111
author: shlipsey3
@@ -30,7 +30,7 @@ Starting in late 2025, Azure began updating its managed TLS solution to align wi
3030
- Azure Container Apps
3131
- Azure Static Web Apps
3232

33-
## Key Changes
33+
## Key changes
3434

3535
This update includes two key changes:
3636

@@ -42,7 +42,7 @@ This update includes two key changes:
4242
- These new CAs will not support client authentication in accordance with browser trusted root program requirements.
4343
All managed TLS certificates under the new CAs will only include the Server Authentication Extended Key Usage (EKU).
4444

45-
## Potential Customer impact
45+
## Potential customer impact
4646

4747
To prepare for the change, it's important to know how the changes could potentially affect customers.
4848

articles/security/fundamentals/operational-best-practices.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,11 +14,13 @@ ms.author: mbaldwin
1414
---
1515

1616
# Azure Operational Security best practices
17+
1718
This article provides a set of operational best practices for protecting your data, applications, and other assets in Azure.
1819

1920
The best practices are based on a consensus of opinion, and they work with current Azure platform capabilities and feature sets. Opinions and technologies change over time and this article is updated on a regular basis to reflect those changes.
2021

2122
## Define and deploy strong operational security practices
23+
2224
Azure operational security refers to the services, controls, and features available to users for protecting their data, applications, and other assets in Azure. Azure operational security is built on a framework that incorporates the knowledge gained through capabilities that are unique to Microsoft, including the [Security Development Lifecycle (SDL)](https://www.microsoft.com/sdl), the [Microsoft Security Response Center](https://www.microsoft.com/msrc?rtc=1) program, and deep awareness of the cybersecurity threat landscape.
2325

2426
<a name='enforce-multi-factor-verification-for-users'></a>

articles/security/fundamentals/operational-overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: msmbaldwin
77
ms.service: security
88
ms.subservice: security-fundamentals
99
ms.topic: article
10-
ms.date: 12/03/2025
10+
ms.date: 01/12/2026
1111
ms.author: mbaldwin
1212

1313
---
@@ -98,7 +98,7 @@ You can also use monitoring data to gain deep insights about your application. T
9898

9999
Azure Monitor includes the following components.
100100

101-
### Azure Activity Log
101+
### Azure activity log
102102

103103
The [Azure Activity Log](/azure/azure-monitor/essentials/platform-logs-overview) provides insight into the operations that were performed on resources in your subscription. It was previously known as “Audit Log” or “Operational Log,” because it reports control-plane events for your subscriptions.
104104

@@ -114,7 +114,7 @@ Diagnostic logs differ from the [Activity Log](/azure/azure-monitor/essentials/p
114114

115115
Azure Monitor provides telemetry that gives you visibility into the performance and health of your workloads on Azure. The most important type of Azure telemetry data is the [metrics](/azure/azure-monitor/data-platform) (also called performance counters) emitted by most Azure resources. Azure Monitor provides several ways to configure and consume these metrics for monitoring and troubleshooting.
116116

117-
### Azure Diagnostics
117+
### Azure diagnostics
118118

119119
Azure Diagnostics enables the collection of diagnostic data on a deployed application. You can use the Diagnostics extension from various sources. Currently supported are [Azure cloud service roles](/visualstudio/azure/vs-azure-tools-configure-roles-for-cloud-service), [Azure virtual machines](/visualstudio/azure/vs-azure-tools-configure-roles-for-cloud-service) running Microsoft Windows, and [Azure Service Fabric](/azure/azure-monitor/agents/diagnostics-extension-overview).
120120

@@ -144,13 +144,13 @@ Network Watcher currently has the following capabilities:
144144

145145
For more information, see [Configure Network Watcher](../../network-watcher/network-watcher-create.md).
146146

147-
## Cloud Service Provider Access Transparency
147+
## Cloud service provider access transparency
148148

149149
[Customer Lockbox for Microsoft Azure](customer-lockbox-overview.md) is a service integrated into Azure portal that gives you explicit control in the rare instance when a Microsoft Support Engineer may need access to your data to resolve an issue.
150150
There are very few instances, such as a debugging remote access issue, where a Microsoft Support Engineer requires elevated permissions to resolve this issue. In such cases, Microsoft engineers use just-in-time access service that provides limited, time-bound authorization with access limited to the service.
151151
While Microsoft has always obtained customer consent for access, Customer Lockbox now gives you the ability to review and approve or deny such requests from the Azure portal. Microsoft support engineers will not be granted access until you approve the request.
152152

153-
## Standardized and Compliant Deployments
153+
## Standardized and compliant deployments
154154

155155
[Azure Blueprints](../../governance/blueprints/overview.md) enable cloud architects and central information technology groups to define a repeatable set of Azure resources that implement and adhere to an organization's standards, patterns, and requirements.
156156
This makes it possible for DevOps teams to rapidly build and stand up new environments and trust that they're building them with infrastructure that maintains organizational compliance.

articles/security/fundamentals/operational-security.md

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,19 +2,16 @@
22
title: Azure Operational Security | Microsoft Docs
33
description: Introduce yourself to Microsoft Azure Monitor logs, its services, and how it works by reading this overview.
44
services: security
5-
author: UnifyCloud
6-
manager: barbkess
7-
editor: TomSh
8-
5+
author: msmbaldwin
96
ms.service: security
107
ms.subservice: security-fundamentals
118
ms.topic: article
12-
ms.date: 11/21/2017
13-
ms.author: TomSh
9+
ms.date: 01/12/2026
10+
ms.author: mbaldwin
1411

1512
---
1613

17-
# Azure Operational Security
14+
# Azure operational security
1815
## Introduction
1916

2017
### Overview
@@ -91,7 +88,7 @@ The Azure Monitor service manages your cloud-based data securely by using the fo
9188

9289
Protected data in Azure Backup is stored in a backup vault located in a particular geographic region. The data is replicated within the same region and, depending on the type of vault, may also be replicated to another region for further resiliency.
9390

94-
### Management Solutions
91+
### Management solutions
9592
[Azure Monitor](../../security-center/security-center-introduction.md) is Microsoft's cloud-based IT management solution that helps you manage and protect your on-premises and cloud infrastructure.
9693

9794

@@ -172,7 +169,7 @@ Cloud applications are complex with many moving parts. Monitoring provides data
172169

173170
In addition, you can use monitoring data to gain deep insights about your application. That knowledge can help you to improve application performance or maintainability, or automate actions that would otherwise require manual intervention.
174171

175-
### Azure Activity Log
172+
### Azure activity log
176173

177174

178175
It is a log that provides insight into the operations that were performed on resources in your subscription. The Activity Log was previously known as “Audit Logs” or “Operational Logs,” since it reports control-plane events for your subscriptions.
@@ -181,7 +178,7 @@ It is a log that provides insight into the operations that were performed on res
181178

182179
Using the Activity Log, you can determine the ‘what, who, and when’ for any write operations (PUT, POST, DELETE) taken on the resources in your subscription. You can also understand the status of the operation and other relevant properties. The Activity Log does not include read (GET) operations or operations for resources that use the Classic model.
183180

184-
### Azure Diagnostic Logs
181+
### Azure diagnostic logs
185182

186183
These logs are emitted by a resource and provide rich, frequent data about the operation of that resource. The content of these logs varies by resource type.
187184

@@ -325,7 +322,7 @@ This article explains
325322
</ul>
326323
</ul>
327324

328-
## Next Steps
325+
## Next steps
329326

330327
- [Design and operational security](https://www.microsoft.com/trustcenter/security/designopsecurity)
331328

articles/security/fundamentals/protection-customer-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.assetid: 61e95a87-39c5-48f5-aee6-6f90ddcd336e
88
ms.service: security
99
ms.subservice: security-fundamentals
1010
ms.topic: article
11-
ms.date: 12/03/2025
11+
ms.date: 01/12/2026
1212
ms.author: mbaldwin
1313

1414
---

articles/security/fundamentals/services-technologies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.assetid: a5a7f60a-97e2-49b4-a8c5-7c010ff27ef8
88
ms.service: security
99
ms.subservice: security-fundamentals
1010
ms.topic: conceptual
11-
ms.date: 01/08/2026
11+
ms.date: 01/12/2026
1212
ms.author: mbaldwin
1313

1414
---

articles/security/fundamentals/shared-responsibility.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: msmbaldwin
66
ms.service: security
77
ms.subservice: security-fundamentals
88
ms.topic: article
9-
ms.date: 01/08/2026
9+
ms.date: 01/12/2026
1010
ms.author: mbaldwin
1111
#customer intent: As a cloud security administrator, I want to understand the shared responsibility model in Azure so that I can clearly identify which security tasks are mine and which are handled by Microsoft.
1212
---
@@ -72,7 +72,7 @@ Microsoft is responsible for the underlying cloud infrastructure, which includes
7272
- **Hypervisor** - Managing the virtualization layer that enables virtual machines in IaaS and PaaS.
7373
- **Platform services** - In PaaS and SaaS, Microsoft manages operating systems, runtime environments, and middleware.
7474

75-
## AI Shared Responsibility
75+
## AI shared responsibility
7676

7777
When using AI services, the shared responsibility model introduces unique considerations beyond traditional IaaS, PaaS, and SaaS. Microsoft is responsible for securing the AI infrastructure, model hosting, and platform-level safeguards. Customers, however, remain accountable for how AI is applied within their environment—this includes protecting sensitive data, managing prompt security, mitigating prompt injection risks, and ensuring compliance with organizational and regulatory requirements.
7878

articles/security/fundamentals/subdomain-takeover.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: msmbaldwin
88
ms.service: security
99
ms.subservice: security-fundamentals
1010
ms.topic: article
11-
ms.date: 04/16/2025
11+
ms.date: 01/12/2026
1212
ms.author: mbaldwin
1313

1414
---
@@ -182,7 +182,7 @@ It's often up to developers and operations teams to run cleanup processes to avo
182182
- Investigate why the address wasn't rerouted when the resource was decommissioned.
183183
- Delete the DNS record if it's no longer in use, or point it to the correct Azure resource (FQDN) owned by your organization.
184184

185-
### Clean up DNS pointers or Re-claim the DNS
185+
### Clean up DNS pointers or re-claim the DNS
186186

187187
Upon deletion of the classic cloud service resource, the corresponding DNS is reserved as per Azure DNS policies. During the reservation period, re-use of the DNS will be forbidden EXCEPT for subscriptions belonging to the Microsoft Entra tenant of the subscription originally owning the DNS. After the reservation expires, the DNS is free to be claimed by any subscription. By taking DNS reservations, the customer is afforded some time to either 1) clean up any associations/pointers to said DNS or 2) re-claim the DNS in Azure. The recommendation would be to delete unwanted DNS entries at the earliest. The DNS name being reserved can be derived by appending the cloud service name to the DNS zone for that cloud.
188188

0 commit comments

Comments
 (0)