You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[Defender for APIs](/azure/defender-for-cloud/defender-for-apis-introduction), a capability of [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction), offers full lifecycle protection, detection, and response coverage for APIs that are managed in Azure API Management. The service empowers security practitioners to gain visibility into their business-critical APIs, understand their security posture, prioritize vulnerability fixes, and detect active runtime threats within minutes.
18
+
[Defender for APIs](/azure/defender-for-cloud/defender-for-apis-introduction), a capability of [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction), provides full lifecycle protection, detection, and response coverage for APIs that are managed in Azure API Management. The service enables security practitioners to gain visibility into their business-critical APIs, understand their security posture, prioritize vulnerability fixes, and detect active runtime threats within minutes.
* Identify external, unused, or unauthenticated APIs
24
25
* Classify APIs that receive or respond with sensitive data
25
-
* Apply configuration recommendations to strengthen the security posture of APIs and API Management services
26
-
* Detect anomalous and suspicious API traffic patterns and exploits of OWASP API top 10 vulnerabilities
26
+
* Apply configuration recommendations to strengthen the security posture of APIs and API Management instances
27
+
* Detect anomalous and suspicious API traffic patterns and exploits of OWASP API Top 10 vulnerabilities
27
28
* Prioritize threat remediation
28
29
* Integrate with SIEM systems and Defender Cloud Security Posture Management
29
30
@@ -32,14 +33,13 @@ This article shows how to use the Azure portal to enable Defender for APIs from
32
33
## Plan limitations
33
34
34
35
* Currently, Defender for APIs discovers and analyzes REST APIs only.
35
-
* Defender for APIs currently doesn't onboard APIs that are exposed using the API Management [self-hosted gateway](self-hosted-gateway-overview.md) or managed using API Management [workspaces](workspaces-overview.md).
36
-
* Some ML-based detections and security insights (data classification, authentication check, unused and external APIs) aren't supported in secondary regions in [multi-region](api-management-howto-deploy-multi-region.md) deployments. Defender for APIs relies on local data pipelines to ensure regional data residency and improved performance in such deployments.
36
+
* Defender for APIs currently doesn't onboard APIs that are exposed via the API Management [self-hosted gateway](self-hosted-gateway-overview.md) or managed via API Management [workspaces](workspaces-overview.md).
37
+
* Some machine-learning-based detections and security insights (data classification, authentication check, unused and external APIs) aren't supported in secondary regions in [multi-region](api-management-howto-deploy-multi-region.md) deployments. Defender for APIs relies on local data pipelines to ensure regional data residency and improved performance in such deployments.
37
38
38
-
39
39
## Prerequisites
40
40
41
41
* At least one API Management instance in an Azure subscription. Defender for APIs is enabled at the level of an Azure subscription.
42
-
* One or more supported APIs must be imported to the API Management instance.
42
+
* One or more supported APIs imported to the API Management instance.
43
43
* Role assignment to [enable the Defender for APIs plan](/azure/defender-for-cloud/permissions).
44
44
* Contributor or Owner role assignment on relevant Azure subscriptions, resource groups, or API Management instances that you want to secure.
45
45
@@ -50,68 +50,71 @@ Onboarding APIs to Defender for APIs is a two-step process: enabling the Defende
50
50
> [!TIP]
51
51
> You can also onboard to Defender for APIs directly in the [Defender for Cloud interface](/azure/defender-for-cloud/defender-for-apis-deploy), where more API security insights and inventory experiences are available.
52
52
53
-
54
53
### Enable the Defender for APIs plan for a subscription
55
54
56
55
1. Sign in to the [portal](https://portal.azure.com), and go to your API Management instance.
57
56
58
-
1. In the left menu, select**Microsoft Defender for Cloud**.
57
+
1. In the left pane, under**Security**, select **Defender for Cloud**.
59
58
60
-
1. Select **Enable Defender on the subscription**.
59
+
1. Select **Enable Defender on the subscription (recommended)**.
61
60
62
61
:::image type="content" source="media/protect-with-defender-for-apis/enable-defender-for-apis.png" alt-text="Screenshot showing how to enable Defender for APIs in the portal." lightbox="media/protect-with-defender-for-apis/enable-defender-for-apis.png":::
63
62
64
63
1. On the **Defender plan** page, select **On** for the **APIs** plan.
65
64
66
-
1.Select **Save**.
65
+
1.Choose a plan, select **Save**, and then select **Save** again at the top of the page.
67
66
68
67
### Onboard unprotected APIs to Defender for APIs
69
68
70
69
> [!CAUTION]
71
-
> Onboarding APIs to Defender for APIs may increase compute, memory, and network utilization of your API Management instance, which in extreme cases may cause an outage of the API Management instance. Do not onboard all APIs at one time if your API Management instance is running at high utilization. Use caution by gradually onboarding APIs, while monitoring the utilization of your instance (for example, using [the capacity metric](api-management-capacity.md)) and scaling out as needed.
70
+
> Onboarding APIs to Defender for APIs can increase compute, memory, and network utilization of your API Management instance, which in extreme cases can cause an outage of the API Management instance. Don't onboard all APIs at one time if your API Management instance is running at high utilization. Use caution by gradually onboarding APIs while monitoring the utilization of your instance (for example, by using [the capacity metric](api-management-capacity.md)) and scaling out as needed.
72
71
73
72
1. In the portal, go back to your API Management instance.
74
-
1. In the left menu, select**Microsoft Defender for Cloud**.
73
+
1. In the left pane, under**Security**, select **Defender for Cloud**.
75
74
1. Under **Recommendations**, select **Azure API Management APIs should be onboarded to Defender for APIs**.
75
+
76
76
:::image type="content" source="media/protect-with-defender-for-apis/defender-for-apis-recommendations.png" alt-text="Screenshot of Defender for APIs recommendations in the portal." lightbox="media/protect-with-defender-for-apis/defender-for-apis-recommendations.png":::
77
-
1. On the next screen, review details about the recommendation:
77
+
1. On the **Azure API Management APIs should be onboarded to Defender for APIs** page, in the **View recommendations** column, select the **View** button for one of the listed APIs.
78
+
1. On the resulting page, review the details of the recommendation:
78
79
* Severity
79
-
*Refresh interval for security findings
80
+
*Freshness interval for security findings
80
81
* Description and remediation steps
81
82
* Affected resources, classified as **Healthy** (onboarded to Defender for APIs), **Unhealthy** (not onboarded), or **Not applicable**, along with associated metadata from API Management
82
83
83
84
> [!NOTE]
84
85
> Affected resources include API collections (APIs) from all API Management instances under the subscription.
85
86
86
-
1. From the list of **Unhealthy** resources, select the API(s) that you wish to onboard to Defender for APIs.
87
-
1. Select **Fix**, and then select **Fix resources**.
88
-
:::image type="content" source="media/protect-with-defender-for-apis/fix-unhealthy-resources.png" alt-text="Screenshot of onboarding unhealthy APIs in the portal." lightbox="media/protect-with-defender-for-apis/fix-unhealthy-resources.png":::
89
-
1. Track the status of onboarded resources under **Notifications**.
87
+
1. Select the APIs that you want to onboard to Defender for APIs.
88
+
1. Select **Fix**, and then select **Fix *x* resources**.
89
+
90
+
:::image type="content" source="media/protect-with-defender-for-apis/fix-unhealthy-resources.png" alt-text="Screenshot that shows how to onboard unhealthy APIs in the portal." lightbox="media/protect-with-defender-for-apis/fix-unhealthy-resources.png":::
91
+
1. Track the status of onboarded resources in the **Notifications** pane.
90
92
91
93
> [!NOTE]
92
-
> Defender for APIs takes 30 minutes to generate its first security insights after onboarding an API. Thereafter, security insights are refreshed every 30 minutes.
94
+
> Defender for APIs takes 30 minutes to generate its first security insights after you onboard an API. Thereafter, security insights are refreshed every 30 minutes.
93
95
>
94
96
95
97
## View security coverage
96
98
97
-
After you onboard the APIs from API Management, Defender for APIs receives API traffic that will be used to build security insights and monitor for threats. Defender for APIs generates security recommendations for risky and vulnerable APIs.
99
+
After you onboard the APIs from API Management, Defender for APIs receives API traffic that's used to build security insights and monitor for threats. Defender for APIs generates security recommendations for risky and vulnerable APIs.
98
100
99
-
You can view a summary of all security recommendations and alerts for onboarded APIs by selecting **Microsoft Defender for Cloud** in the menu for your API Management instance:
101
+
You can view a summary of all security recommendations and alerts for onboarded APIs by selecting **Defender for Cloud** in the navigation menu for your API Management instance:
100
102
101
-
1. In the portal, go to your API Management instance and select **Microsoft Defender for Cloud** from the left menu.
102
-
1. Review **Recommendations** and **Security insights and alerts**.
103
+
1. In the portal, go to your API Management instance.
104
+
1. Under **Security**, select **Defender for Cloud** in the left pane.
105
+
1. Review **Recommendations** and **Security incidents and alerts**.
103
106
104
107
:::image type="content" source="media/protect-with-defender-for-apis/view-security-insights.png" alt-text="Screenshot of API security insights in the portal." lightbox="media/protect-with-defender-for-apis/view-security-insights.png":::
105
108
106
-
For the security alerts received, Defender for APIs suggests necessary steps to perform the required analysis and validate the potential exploit or anomaly associated with the APIs. Follow the steps in the security alert to fix and return the APIs to healthy status.
109
+
For the security alerts that you receive, Defender for APIs suggests necessary steps to perform the required analysis and validate the potential exploit or anomaly associated with the APIs. Follow the steps in the security alert to fix and return the APIs to healthy status.
107
110
108
111
## Offboard protected APIs from Defender for APIs
109
112
110
113
You can remove APIs from protection by Defender for APIs by using Defender for Cloud in the portal. For more information, see [Manage your Defender for APIs deployment](/azure/defender-for-cloud/defender-for-apis-manage).
111
114
112
115
## Related content
113
116
114
-
*Learn more about [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
115
-
*Learn more about [API findings, recommendations, and alerts](/azure/defender-for-cloud/defender-for-apis-posture)in Defender for APIs
116
-
Learn how to [build a comprehensive API security strategy](https://aka.ms/API-Security-EBook)
117
-
*Learn how to [upgrade and scale](upgrade-and-scale.md)an API Management instance
117
+
*[Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
118
+
*[API findings, recommendations, and alerts](/azure/defender-for-cloud/defender-for-apis-posture)
119
+
*[Build a comprehensive API security strategy](https://aka.ms/API-Security-EBook)
120
+
*[Upgrade and scale an API Management instance](upgrade-and-scale.md)
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/create-active-directory-connections.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
5
5
author: b-hchen
6
6
ms.service: azure-netapp-files
7
7
ms.topic: how-to
8
-
ms.date: 07/30/2025
8
+
ms.date: 10/01/2025
9
9
ms.author: anfdocs
10
10
ms.custom:
11
11
- devx-track-azurepowershell
@@ -248,7 +248,6 @@ For more information about the relationship between NetApp accounts and subscrip
248
248
> Using the Security privilege users feature relies on the [SMB Continuous Availability Shares feature](azure-netapp-files-create-volumes-smb.md#continuous-availability). SMB Continuous Availability is **not** supported on custom applications. It's only supported for workloads using Citrix App Layering, [FSLogix user profile containers](/azure/virtual-desktop/create-fslogix-profile-container), and Microsoft SQL Server (not Linux SQL Server).
249
249
250
250
> [!IMPORTANT]
251
-
> Using the **Security privilege users** feature requires that you submit a waitlist request through the **[Azure NetApp Files SMB Continuous Availability Shares Public Preview waitlist submission page](https://aka.ms/anfsmbcasharespreviewsignup)**. Wait for an official confirmation email from the Azure NetApp Files team before using this feature.
252
251
>This feature is optional and supported only with SQL server. The AD DS domain account used for installing SQL server must already exist before you add it to the **Security privilege users** option. When you add the SQL Server installer account to **Security privilege users** option, the Azure NetApp Files service might validate the account by contacting an AD DS domain controller. This action might fail if Azure NetApp Files can't contact the AD DS domain controller.
253
252
254
253
For more information about `SeSecurityPrivilege` and SQL Server, see [SQL Server installation fails if the Setup account doesn't have certain user rights](/troubleshoot/sql/install/installation-fails-if-remove-user-right).
Copy file name to clipboardExpand all lines: articles/backup/backup-support-matrix-mabs-dpm.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -162,6 +162,10 @@ BitLocker can only be enabled after you add the disk the storage pool. Don't ena
162
162
163
163
Network-attached storage (NAS) isn't supported for use in the DPM storage pool.
164
164
165
+
>[!NOTE]
166
+
>Microsoft Azure Backup Server (MABS)/DPM supports a maximum total replica (protected data) size of 75 TB per server. Exceeding this threshold can lead to missed backup SLAs and may render the server unresponsive.
167
+
>In case consider to add another MABS Server.
168
+
165
169
**Storage** | **Details**
166
170
--- | ---
167
171
**MBS** | Modern backup storage (MBS) is supported from DPM 2016/MABS v2 and later. It isn't available for MABS v1.
0 commit comments