You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/advanced-ransomware-protection.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.custom: references_regions
11
11
# Customer intent: "As a data engineer, I want to understand the advanced ransomware protection features of Azure NetApp Files, so that I can safeguard the cloud file data against ransomware attacks."
Advanced ransomware protection (ARP) in Azure NetApp Files is a built-in capability that helps safeguard your cloud file data against ransomware attacks. It uses intelligent, AI-driven monitoring to detect unusual file activity in real time and automatically creates a secure snapshot of your data when a potential ransomware threat is detected. This approach provides an extra line of defense at the storage layer – preserving clean recovery points and minimizing data loss if ransomware encrypts your files, without requiring any external appliances or software.
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/azure-netapp-files-create-volumes-smb.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,10 +87,10 @@ Before creating an SMB volume, you need to create an Active Directory connection
87
87
***Availability Zone**
88
88
This option lets you deploy the new volume in the logical availability zone that you specify. Select an availability zone where Azure NetApp Files resources are present. For details, see [Manage availability zone volume placement](manage-availability-zone-volume-placement.md).
89
89
90
-
***Encryption key source**
90
+
***Encryption key source**
91
91
Select Microsoft Managed Key or Customer Managed Key. See [Configure customer-managed keys for Azure NetApp Files volume encryption](configure-customer-managed-keys.md) and [Azure NetApp Files double encryption at rest](double-encryption-at-rest.md) to learn more about this field.
92
92
93
-
***Advanced Ransomware Protection**
93
+
***Advanced Ransomware Protection**
94
94
Select **Enabled** to configure ransomware threat detection alerts for your volumes. For more information, see [Configure advanced ransomware protection](ransomware-configure.md).
95
95
96
96
* If you want to apply an existing snapshot policy to the volume, select **Show advanced section** to expand it, specify whether you want to hide the snapshot path, and select a snapshot policy in the pull-down menu.
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/azure-netapp-files-create-volumes.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -106,10 +106,10 @@ This article shows you how to create an NFS volume. For SMB volumes, see [Create
106
106
* **Availability zone**
107
107
This option lets you deploy the new volume in the logical availability zone that you specify. Select an availability zone where Azure NetApp Files resources are present. For details, see [Manage availability zone volume placement](manage-availability-zone-volume-placement.md).
108
108
109
-
* **Encryption key source**
109
+
* **Encryption key source**
110
110
You can select Microsoft Managed Key or Customer Managed Key. See [Configure customer-managed keys for Azure NetApp Files volume encryption](configure-customer-managed-keys.md) and [Azure NetApp Files double encryption at rest](double-encryption-at-rest.md) about using this field.
111
111
112
-
* **Advanced Ransomware Protection**
112
+
* **Advanced Ransomware Protection**
113
113
Select **Enabled** to configure ransomware threat detection alerts for your volumes. For more information, see [Configure advanced ransomware protection](ransomware-configure.md).
114
114
115
115
* If you want to apply an existing snapshot policy to the volume, select **Show advanced section** to expand it, specify whether you want to hide the snapshot path, and select a snapshot policy in the pull-down menu.
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/azure-netapp-files-introduction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -93,7 +93,7 @@ Azure NetApp Files provides built-in data management and security capabilities t
93
93
| Azure platform integration and compliance certifications | Compliance with regulatory requirements and Azure platform integration. | Adheres to Azure standards and regulatory compliance and ensures audit and governance completion.
94
94
| Azure Identity & Access Management (IAM) | Azure role-based access control (RBAC) allows you to manage permissions for resources at any level. | Simplifies access management and improves compliance with Azure-native RBAC, empowering you to easily control user access to configuration management.
95
95
| AD/LDAP authentication, export policies, and access control lists (ACLs) | Authenticate and authorize access to data by using existing AD/LDAP credentials and allow for the creation of export policies and ACLs to govern data access and usage. | Prevents data breaches and ensures compliance with data security regulations, with enhanced granular control over access to data volumes, directories, and files. |
96
-
|Built-in ransomware protection | Azure NetApp Files advanced ransomware protection can be enabled at the volume level, using machine learning to observe deviations in your volume behaviors that resemble ransomware attacks. | Ransomware protection enables you to stay vigilant and attuned to aberrations in your workloads, improving the resiliency of your applications with alerts customized to the specific patterns of your volumes. |
96
+
|Ransomware protection | Azure NetApp Files advanced ransomware protection can be enabled at the volume level, using machine learning to observe deviations in your volume behaviors that resemble ransomware attacks. | Ransomware protection enables you to stay vigilant and attuned to aberrations in your workloads, improving the resiliency of your applications with alerts customized to the specific patterns of your volumes. |
97
97
98
98
These features work together to provide a comprehensive data management solution that helps to ensure that your data is always available, recoverable, and secure.
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/create-volumes-dual-protocol.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -114,13 +114,12 @@ To create NFS volumes, see [Create an NFS volume](azure-netapp-files-create-volu
114
114
* **Availability zone**
115
115
This option lets you deploy the new volume in the logical availability zone that you specify. Select an availability zone where Azure NetApp Files resources are present. For details, see [Manage availability zone volume placement](manage-availability-zone-volume-placement.md).
116
116
117
-
* **Encryption key source**
117
+
* **Encryption key source**
118
118
You can select `Microsoft Managed Key` or `Customer Managed Key`. See [Configure customer-managed keys for Azure NetApp Files volume encryption](configure-customer-managed-keys.md) and [Azure NetApp Files double encryption at rest](double-encryption-at-rest.md) about using this field.
119
119
120
-
* **Advanced Ransomware Protection**
120
+
* **Advanced Ransomware Protection**
121
121
Select **Enabled** to configure ransomware threat detection alerts for your volumes. For more information, see [Configure advanced ransomware protection](ransomware-configure.md).
122
122
123
-
124
123
* If you want to apply an existing snapshot policy to the volume, select **Show advanced section** to expand it, specify whether you want to hide the snapshot path, and select a snapshot policy in the pull-down menu.
125
124
126
125
For information about creating a snapshot policy, see [Manage snapshot policies](snapshots-manage-policy.md).
# Configure advanced ransomware protection for Azure NetApp Files volumes
12
12
13
13
Ransomware attacks pose a huge threat to the integrity and reliability of data. Azure NetApp Files' advanced ransomware protection adds a line of defense at the storage level for your data. Advanced ransomware protection uses machine learning to develop a profile of your volumes, alerting you of perceived threats. Advanced ransomware protection is available to Azure NetApp Files at no additional cost.
14
14
15
-
Advanced ransomware protection builds its profile based on three inputs:
15
+
Advanced ransomware protection builds its profile based on many inputs, including but not limited to:
16
16
17
17
* File extension types in the volume
18
18
* Data entropy patterns in the volume
19
-
*I/OPS patterns in the volume
19
+
*IOPS patterns in the volume
20
20
21
-
With this data, advanced ransomware protection monitors your volumes for patterns and extension types that deviate from observed pattern, marking them as ransomware threats. Advanced ransomware protection builds a profile from machine learning and continues to refine its understanding of your workloads based on usage patterns. Advanced ransomware protection hones this profile based on your inputs, learning as you respond to threats.
21
+
With this data, advanced ransomware protection monitors your volumes for patterns and extension types that deviate from observed patterns, marking them as ransomware threats. Advanced ransomware protection builds a profile from machine learning and continues to refine its understanding of your workloads based on usage patterns. Advanced ransomware protection hones this profile based on your inputs, learning as you respond to threats.
22
22
23
23
Advanced ransomware protection's alert mechanisms enable you to stay vigilant in preventing ransomware attacks on your data and maintaining the resiliency of your workload. If a threat is detected, Azure NetApp Files creates a point-in-time snapshot of the volume. You can then evaluate the threat and, if necessary, restore the volume based on the snapshot, ensuring the continuity and safety of your data.
24
24
25
-
## Register the feature
25
+
## Considerations
26
26
27
-
Advanced ransomware protection is currently in preview. You must register the feature before using it for the first time.
27
+
* Attack reports are retained for 30 days.
28
+
* Ransomware threat notifications are sent in the Azure Activity log.
29
+
* It’s recommended that you enable no more than 10 volumes per Azure subscription with advanced ransomware protection to mitigate performance issues. If you want to enable more than 10 volumes per Azure subscription, raise an Azure support request. For more information, see [Request limit increase](azure-netapp-files-resource-limits.md#request-limit-increase).
30
+
* It's recommended you increase QoS capacity by 5 to 10 percent due to potential performance impacts of advanced ransomware protection. The scale of the impact can vary based on the configurations across your Azure NetApp Files deployment.
31
+
* Azure NetApp Files advanced ransomware protection is suited for the following workloads:
32
+
* Images and video
33
+
* Windows or Linux home directories
34
+
You can create files with extensions that weren't detected in the learning period. This increases the possibility of false positives in this workload. Examples of this are extensions involving health care records and Electronic Design Automation (EDA) data.
35
+
* Azure NetApp Files advanced ransomware protection is not suited for the following workloads:
36
+
* Test/Development workloads – these have a high frequency of file create/delete (hundreds of thousands of files in few seconds)
37
+
* Threat detection recognizes an unusual surge in file create, rename, or delete activity as ransomware activity. If a legitimate application displays this type of file activity, it will likely be identified as ransomware activity.
38
+
* Workloads where the application/host encrypts data. Advanced ransomware protection analyzes incoming data as encrypted or unencrypted. If the application itself is encrypting the data, then the effectiveness of advanced ransomware protection is reduced. However, it can still detect ransomware based on file activity (delete, overwrite, or create, or create or rename with a new file extension) and file type.
> The **RegistrationState** may be in the `Registering` state for up to 60 minutes before changing to `Registered`. Wait until the status is `Registered` before continuing.
You can also use [Azure CLI commands](/cli/azure/feature) `az feature register` and `az feature show` to register the feature and display the registration status.
45
40
46
41
## Enable advanced ransomware protection on a new volume
47
42
48
43
1. Follow the workflow to create a new [NFS](azure-netapp-files-create-volumes.md), [SMB](azure-netapp-files-create-volumes-smb.md), or [dual-protocol](create-volumes-dual-protocol.md) volume.
49
44
1. In the **Advanced Ransomware Protection** field of the Basics tab, select **Enabled**.
50
45
1. After you create the volume, you can confirm your settings in the volume overview. If you've enabled ransomware protection, the **Advanced Ransomware Protection** shows as enabled.
51
46
47
+
52
48
## Enable advanced ransomware protection for existing volumes
53
49
54
50
1. Navigate to the volume for which you want to enable advanced ransomware protection.
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/management/relocation/relocation-firewall.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -111,7 +111,7 @@ If you're running classic firewall rules without Firewall policy, migrate to Fir
111
111
- `firewallPolicy.id` with your policy ID.
112
112
113
113
1. [Create a new firewall policy](/azure/firewall-manager/create-policy-powershell) using the configuration of the source region and reflect changes introduced by the new target region (IP Address Ranges, Public IP, Rule Collections).
114
-
1. If you're using Premium SKU and you want to enable TLS Inspection, update the newly created firewall policy and enable TLS inspection by following [the instructions here](https://techcommunity.microsoft.com/t5/azure-network-security-blog/building-a-poc-for-tls-inspection-in-azure-firewall/ba-p/3676723).
114
+
1. If you're using Premium SKU and you want to enable TLS Inspection, update the newly created firewall policy and enable TLS inspection by following [the instructions here](https://techcommunity.microsoft.com/blog/azurenetworksecurityblog/building-a-poc-for-tls-inspection-in-azure-firewall/3676723).
115
115
1. Review and update the following settings to reflect the changes required for the target region.
116
116
117
117
- **IP Groups.** To include IP addresses from the target region, if different from the source, *IP Groups* should be reviewed. The IP addresses included in the groups must be modified.
Copy file name to clipboardExpand all lines: articles/container-apps/authentication-openid.md
+7-9Lines changed: 7 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: container-apps
5
5
author: craigshoemaker
6
6
ms.service: azure-container-apps
7
7
ms.topic: how-to
8
-
ms.date: 10/14/2024
8
+
ms.date: 03/30/2026
9
9
ms.author: cshoe
10
10
---
11
11
@@ -15,19 +15,17 @@ This article shows you how to configure Azure Container Apps to use a custom aut
15
15
16
16
You can configure your app to use one or more OIDC providers. Each must be given a unique alphanumeric name in the configuration, and only one can serve as the default redirect target.
17
17
18
-
## <aname="openid-register"> </a>Register your application with the identity provider
18
+
## Register your application with the identity provider
19
19
20
20
Your provider requires you to register the details of your application with it. One of these steps involves specifying a redirect URI. This redirect URI is of the form `<app-url>/.auth/login/<provider-name>/callback`. Each identity provider should provide more instructions on how to complete these steps.
21
21
22
22
> [!NOTE]
23
-
> Some providers may require additional steps for their configuration and how to use the values they provide. For example, Apple provides a private key which is not itself used as the OIDC client secret, and you instead must use it craft a JWT which is treated as the secret you provide in your app config (see the "Creating the Client Secret" section of the [Sign in with Apple documentation](https://developer.apple.com/documentation/sign_in_with_apple/generate_and_validate_tokens))
24
-
>
23
+
> Some providers require further steps for their configuration and different guidance on how to use the values they provide. For example, Apple provides a private key, which isn't used as the OIDC client secret. Instead, you must use it to craft a JSON Web Token (JWT), which is treated as the secret you provide in your app config. For more information, see the "Creating the Client Secret" section of the [Sign in with Apple documentation](https://developer.apple.com/documentation/sign_in_with_apple/generate_and_validate_tokens).
25
24
26
25
You need to collect a **client ID** and **client secret** for your application.
27
26
28
27
> [!IMPORTANT]
29
-
> The client secret is a critical security credential. Do not share this secret with anyone or distribute it within a client application.
30
-
>
28
+
> The client secret is a critical security credential. Don't share this secret with anyone or distribute it within a client application.
31
29
32
30
Additionally, you need the OpenID Connect metadata for the provider. This information is often exposed via a [configuration metadata document](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig), which is the provider's Issuer URL suffixed with `/.well-known/openid-configuration`. Make sure to gather this configuration URL.
33
31
@@ -38,7 +36,7 @@ If you're unable to use a configuration metadata document, you need to gather th
38
36
- The [OAuth 2.0 Token endpoint](https://tools.ietf.org/html/rfc6749#section-3.2) (sometimes shown as `token_endpoint`)
39
37
- The URL of the [OAuth 2.0 JSON Web Key Set](https://tools.ietf.org/html/rfc8414#section-2) document (sometimes shown as `jwks_uri`)
40
38
41
-
## <aname="openid-configure"> </a>Add provider information to your application
39
+
## Add provider information to your application
42
40
43
41
1. Sign in to the [Azure portal] and navigate to your app.
44
42
@@ -60,8 +58,8 @@ If you're unable to use a configuration metadata document, you need to gather th
60
58
61
59
Use the following guides for details on working with authenticated users.
62
60
63
-
*[Customize sign-in and sign-out](authentication.md#customize-sign-in-and-sign-out)
64
-
*[Access user claims in application code](authentication.md#access-user-claims-in-application-code)
61
+
-[Customize sign-in and signout](authentication.md#customize-sign-in-and-sign-out)
62
+
-[Access user claims in application code](authentication.md#access-user-claims-in-application-code)
0 commit comments