Skip to content

Commit 88f2023

Browse files
Merge pull request #305086 from MicrosoftDocs/main
Auto Publish – main to live - 2025-09-04 22:00 UTC
2 parents dc2d9a2 + 47108c5 commit 88f2023

15 files changed

Lines changed: 179 additions & 48 deletions

File tree

articles/api-management/enable-availability-zone-support.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ When you create a new API Management instance in the **Premium** tier in a regio
3737
- **Manual:** API Management provides manual availability zone support when you explicitly specify which availability zones to use.
3838

3939
> [!IMPORTANT]
40-
> To ensure the reliability of your API Management instance, we recommend that you use the automatic availability zone support. To achieve maximum zone redundancy, we recommend that you deploy a minimum of three units in each region where you deploy your API Management instances. For more information, see [Reliability in API Management](../reliability/reliability-api-management.md).
40+
> To ensure the reliability of your API Management instance, we recommend that you use the automatic availability zone support. To achieve maximum zone redundancy, we recommend that you deploy a minimum of two units in each region where you deploy API Management to ensure that an availability zone outage doesn't affect your instance. For more information, see [Reliability in API Management](../reliability/reliability-api-management.md).
4141
4242
## Manual availability zone support
4343

articles/api-management/llm-content-safety-policy.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: azure-api-management
88
ms.collection: ce-skilling-ai-copilot
99
ms.custom:
1010
ms.topic: reference
11-
ms.date: 03/04/2025
11+
ms.date: 09/03/2025
1212
ms.update-cycle: 180-days
1313
ms.author: danlep
1414
---
@@ -36,7 +36,7 @@ Use the policy in scenarios such as the following:
3636
## Policy statement
3737

3838
```xml
39-
<llm-content-safety backend-id="name of backend entity" shield-prompt="true | false" >
39+
<llm-content-safety backend-id="name of backend entity" shield-prompt="true | false" enforce-on-completions="true | false">
4040
<categories output-type="FourSeverityLevels | EightSeverityLevels">
4141
<category name="Hate | SelfHarm | Sexual | Violence" threshold="integer" />
4242
<!-- If there are multiple categories, add more category elements -->
@@ -56,6 +56,7 @@ Use the policy in scenarios such as the following:
5656
| -------------- | ----------------------------------------------------------------------------------------------------- | -------- | ------- |
5757
| backend-id | Identifier (name) of the Azure AI Content Safety backend to route content-safety API calls to. Policy expressions are allowed. | Yes | N/A |
5858
| shield-prompt | If set to `true`, content is checked for user attacks. Otherwise, skip this check. Policy expressions are allowed. | No | `false` |
59+
| enforce-on-completions| If set to `true`, content safety checks are enforced on chat completions for response validation. Otherwise, skip this check. Policy expressions are allowed. | No | `false` |
5960

6061

6162
## Elements

articles/iot-edge/quickstart-linux.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,16 @@
11
---
22
title: "Quickstart: Create an Azure IoT Edge Device on Linux"
3-
description: Learn to configure an Azure IoT Edge device on Linux. This guide walks you through creating an IoT Hub, registering a device, and deploying a simulated sensor module.
4-
#customer intent: As a developer, I want to create an IoT Edge device on Linux so that I can deploy and test containerized modules.
3+
description: Learn how to configure an Azure IoT Edge device on Linux. This guide walks you through creating an IoT Hub, registering a device, and deploying a simulated sensor module.
54
author: sethmanheim
65
ms.author: sethm
7-
ms.date: 03/27/2025
6+
ms.date: 09/04/2025
87
ms.topic: quickstart
98
ms.service: azure-iot-edge
109
services: iot-edge
1110
ms.custom: mvc, devx-track-azurecli, mode-other, linux-related-content
11+
12+
#customer intent: As a developer, I want to create an IoT Edge device on Linux so that I can deploy and test containerized modules.
13+
1214
---
1315

1416
# Quickstart: Deploy your first IoT Edge module to a virtual Linux device
@@ -39,7 +41,7 @@ Set up your environment for the Azure CLI.
3941
A resource group to manage all the resources you use in this quickstart. This quickstart and the following tutorials use the example resource group name **IoTEdgeResources**.
4042

4143
```azurecli-interactive
42-
`az group create --name IoTEdgeResources --location westus2`
44+
az group create --name IoTEdgeResources --location westus2
4345
```
4446

4547
## Create an IoT Hub

articles/logic-apps/authenticate-with-managed-identity.md

Lines changed: 9 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1156,7 +1156,7 @@ This example shows the underlying connection resource definition for a connector
11561156
"properties": {
11571157
"alternativeParameterValues": {},
11581158
"api": {
1159-
"id": "[subscriptionResourceId('Microsoft.Web/locations/managedApis', parameters('location'), 'azureautomation')]"
1159+
"id": "[subscriptionResourceId('Microsoft.Web/locations/managedApis', parameters('location'), '<connector-name>')]"
11601160
},
11611161
"authenticatedUser": {},
11621162
"connectionState": "Enabled",
@@ -1184,19 +1184,18 @@ This example shows the underlying connection resource definition for a connector
11841184
"location": "[parameters('location')]",
11851185
"kind": "V1",
11861186
"properties": {
1187-
"alternativeParameterValues":{},
1187+
"alternativeParameterValues": {},
11881188
"api": {
1189-
"id": "[subscriptionResourceId('Microsoft.Web/locations/managedApis', parameters('location'), 'azureblob')]"
1189+
"id": "[subscriptionResourceId('Microsoft.Web/locations/managedApis', parameters('location'), '<connector-name>')]"
11901190
},
11911191
"authenticatedUser": {},
11921192
"connectionState": "Enabled",
11931193
"customParameterValues": {},
11941194
"displayName": "[variables('connections_<connector-name>_name')]",
1195-
"parameterValueSet":{
1195+
"parameterValueSet": {
11961196
"name": "managedIdentityAuth",
11971197
"values": {}
1198-
},
1199-
"parameterValueType": "Alternative"
1198+
}
12001199
}
12011200
}
12021201
```
@@ -1216,8 +1215,8 @@ This example shows the underlying connection resource definition for a connector
12161215
```json
12171216
{
12181217
"type": "Microsoft.Web/connections",
1219-
"name": "[variables('connections_<connector-name>_name')]",
12201218
"apiVersion": "[providers('Microsoft.Web','connections').apiVersions[0]]",
1219+
"name": "[variables('connections_<connector-name>_name')]",
12211220
"location": "[parameters('location')]",
12221221
"kind": "V2",
12231222
"properties": {
@@ -1251,19 +1250,18 @@ This example shows the underlying connection resource definition for a connector
12511250
"location": "[parameters('location')]",
12521251
"kind": "V2",
12531252
"properties": {
1254-
"alternativeParameterValues":{},
1253+
"alternativeParameterValues": {},
12551254
"api": {
12561255
"id": "[subscriptionResourceId('Microsoft.Web/locations/managedApis', parameters('location'), '<connector-name>')]"
12571256
},
12581257
"authenticatedUser": {},
12591258
"connectionState": "Enabled",
12601259
"customParameterValues": {},
12611260
"displayName": "[variables('connections_<connector-name>_name')]",
1262-
"parameterValueSet":{
1261+
"parameterValueSet": {
12631262
"name": "managedIdentityAuth",
12641263
"values": {}
1265-
},
1266-
"parameterValueType": "Alternative"
1264+
}
12671265
}
12681266
}
12691267
```

articles/oracle/oracle-db/oracle-database-network-plan.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,11 +35,13 @@ Advanced network features enhance the virtual networking experience, offering im
3535
* Germany West Central
3636
* Italy North
3737
* Japan East
38+
* Japan West
3839
* North Europe
3940
* South Central US
4041
* Southeast Asia
4142
* Spain Central
4243
* Sweden Central
44+
* UAE Central
4345
* UAE North
4446
* UK South
4547
* UK West

articles/oracle/oracle-db/oracle-database-regions.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,7 @@ The list below mentions the Azure and corresponding OCI regions with the regiona
5252
| Sweden Central | Sweden Central (Stockholm) || | | | | Dual |
5353
| UK South | UK South (London) ||||| Preview available | Dual|
5454
| UK West | UK West (Newport) ||| || | Single |
55+
| UAE Central | UAE Central (Abu Dhabi) || | | | | Single |
5556
| UAE North | UAE North (Dubai) || | | | | Single |
5657

5758

articles/partner-solutions/mongo-db/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ items:
1919
- name: Manage a resource
2020
href: manage.md
2121
- name: Troubleshoot a resource
22-
href: /troubleshoot/azure/partner-solutions/welcome-native-integrations
22+
href: /troubleshoot/azure/partner-solutions/marketplace-purchases-errors
2323
- name: Get support
2424
href: https://www.mongodb.com/company/contact
2525
- name: Reference

articles/partner-solutions/neon/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ items:
1919
- name: Get support
2020
href: https://neon.tech/docs/introduction/support
2121
- name: Troubleshoot
22-
href: /troubleshoot/azure/partner-solutions/welcome-native-integrations
22+
href: /troubleshoot/azure/partner-solutions/marketplace-purchases-errors
2323
- name: Connect to compute services
2424
href: create-service-connection.md
2525
- name: SDKs and tools

articles/partner-solutions/nginx/toc.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,5 +19,6 @@ items:
1919
- name: Get support
2020
href: https://my.f5.com/manage/s/
2121
- name: Troubleshoot
22-
href: /troubleshoot/azure/partner-solutions/welcome-native-integrations
22+
href: /troubleshoot/azure/partner-solutions/marketplace-purchases-errors
23+
2324

articles/partner-solutions/palo-alto/manage.md

Lines changed: 128 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Manage a Cloud Next-Generation Firewall (NGFW) by Palo Alto Networks Resource by Using the Azure portal
33
description: Manage your Cloud NGFW resource in the Azure portal, including networking, NAT, rulestack settings, logging, Domain Name System (DNS) proxy configuration, and billing plan changes.
44
ms.topic: how-to
5-
ms.date: 06/26/2025
5+
ms.date: 08/21/2025
66
ms.custom:
77
- ai-gen-docs-bap
88
- ai-gen-desc
@@ -29,9 +29,135 @@ You can view and change settings by selecting one of the following settings cate
2929
- Properties
3030
- Locks
3131

32+
## Networking & NAT
33+
34+
Select **Networking & NAT** under **Settings** in the left pane.
35+
- In the **Networking** section, you can view networking settings.
36+
- To add prefixes to the private traffic range, select **Edit**, select the **Additional Prefixes** checkbox, and then add the prefixes in the resulting text box.
37+
- In the **Source Network Address Translation (SNAT)** section, you can make changes by selecting the **Edit** button. You can then update the **Public IP Addresses**, select or clear the **Use the above Public IP addresses** checkbox, or update the **Source NAT Public IPs**.
38+
- In the **Destination Network Address Translation (DNAT)** section, you can make changes by selecting the **Edit** button. You can then add a frontend setting by selecting the **Add** button and providing a **Name**, **Protocol**, **Frontend IP**, **Frontend Port**, **Backend IP**, and **Backend Port**. You can also modify existing settings in this section.
39+
- In the **Private Source NAT** section, you can add a destination address by selecting the **Edit** button and then adding the address in the **Private Source NAT Destination Address** box. Private Source NAT replaces the source IP address with the trusted firewall IP address.
40+
41+
## Security Policies
42+
43+
To view these settings, select **Security Policies** under **Settings** in the left pane.
44+
45+
The settings that you see on this tab depend on how your security policies are managed.
46+
47+
### Azure Rulestack
48+
49+
If your security policies are managed by an Azure rulestack, you see the settings described in this section.
50+
51+
1. In **Local Rulestack**, select an existing rulestack from the dropdown list.
52+
1. To manage settings for a rulestack, select the rulestack name under **Local Rulestack**. This action takes you to the local rulestack page. In the left pane, you see the following settings categories under **Resources**:
53+
- Rules
54+
- Security Services
55+
- Prefix List
56+
- FDQN List
57+
- Certificates
58+
- Deployment
59+
- Managed Identity
60+
61+
#### Rules
62+
63+
Select **Rules** under **Resources** in the left pane of the local rulestack page. A page appears that shows local rules and allows you to add, delete, and configure them.
64+
- To edit a rule, select the checkbox next to it and then select **Edit**. A pane showing the configured parameters for the rule appears. You can edit the parameters.
65+
- To add a rule, select **Add**. A pane that allows you to configure and validate the parameters appears.
66+
- To delete a rule, select the checkbox next to it and then select **Delete**.
67+
68+
#### Security Services
69+
70+
Select **Security Services** under **Resources** in the left pane of the local rulestack page.
71+
- Under **Advanced Threat Prevention**, you can enable, disable, and configure vulnerability protection, anti-spyware, antivirus, and file blocking profiles.
72+
- Under **Advanced URL Filtering**, you can enable, disable, and configure URL access management profiles.
73+
- Under **DNS Security**, you can enable, disable, and configure DNS security profiles.
74+
- Under **Encrypted Threat Protection**, you can manage egress decryption settings.
75+
76+
#### Prefix List
77+
78+
Select **Prefix List** under **Resources** in the left pane of the local rulestack page. A page appears that shows prefixes and allows you to add, delete, and configure them.
79+
- To edit a prefix, select the checkbox next to it and then select **Edit**. A pane showing the name, description, and address of the prefix appears. You can edit and validate the configuration.
80+
- To add a prefix, select the **Add** button. A pane that allows you to enter a name, description, and address appears. You can also validate the parameters.
81+
- To delete a prefix, select the checkbox next to it and then select **Delete**.
82+
83+
#### FQDN List
84+
85+
Select **FQDN List** under **Resources** in the left pane of the local rulestack page. A page appears that slows FQDNs and allows you to add, delete, and configure them.
86+
- To edit an FQDN, select the checkbox next to it and then select **Edit**. A pane showing the configured name, description, and FQDN appears. You can edit and validate the configuration.
87+
- To add an FQDN, select the **Add** button. A pane that allows you to enter a name, description, and FQDN appears. You can also validate the parameters.
88+
- To delete an FQDN, select the checkbox next to it and then select **Delete**.
89+
90+
#### Certificates
91+
92+
Select **Certificates** under **Resources** in the left pane of the local rulestack page. A page appears that shows certificates and allows you to add, delete, and configure them.
93+
- To add a certificate, select the **Add** button. A pane that allows you to configure the certificate appears. You can select the certificate from a key vault or paste in a URL. You can also add self-signed certificates.
94+
- To edit a certificate, select the checkbox next to it and then select **Edit**. You can edit and validate the configuration.
95+
- To delete a certificate, select the checkbox next to it and then select **Delete**.
96+
97+
#### Deployment
98+
99+
Select **Deployment** under **Resources** in the left pane of the local rulestack page.
100+
- On the **Deployment** page, select **Deploy Configuration** to deploy changes that you made to the rulestack.
101+
- Select **Revert** to remove all changes made since the last deployed configuration.
102+
103+
#### Managed Identity
104+
105+
1. Select **Managed Identity** under **Resources** in the left pane of the local rulestack page.
106+
1. On the **Managed Identity** page, you can enable or disable managed identity.
107+
- To enable managed identity, select **Enable MI** and then select an identity in the **Identity** list.
108+
- To disable managed identity, clear the **Enable MI** checkbox.
109+
110+
### Strata Cloud Manager
111+
112+
If your security policies are managed by Strata Cloud Manager, you can view the **SCM Tenant ID** on the **Security Policies** tab.
113+
114+
### Panorama
115+
116+
If your security policies are managed by Panorama, you can change the **Panorama Registration String** on the **Security Policies** tab.
117+
118+
You can also view the following setting on this tab:
119+
120+
- Panorama IP 1
121+
- Panorama IP 2
122+
- Device Group
123+
- Template Name
124+
125+
## Log Settings
126+
127+
1. Select **Log Settings** under **Settings** in the left pane.
128+
1. Select **Edit** to enable **Log Settings**.
129+
1. Select the **Enable Log Settings** checkbox.
130+
1. In **Log Settings**, select the settings.
131+
132+
## DNS Proxy
133+
134+
1. Select **DNS Proxy** under **Settings** the left pane.
135+
1. You can enable or disable **DNS Proxy** by selecting the appropriate option.
136+
137+
## Rules
138+
139+
1. Select **Rules** under **Settings** in the left pane.
140+
1. You can view a list of existing rules on the **Rules** page. You can also search for rules.
141+
1. To view configured parameters for a rule, double-click the rule.
142+
143+
> [!NOTE]
144+
> If your security policies are managed by Panorama, your rules won't appear on this tab. You can view them in Panorama.
145+
146+
## Properties
147+
148+
1. Select **Properties** under **Settings** in the left pane.
149+
1. On the **Properties** page, you can view various properties of the firewall, including essentials like the ID, name, and location, the network profile, DNS settings, and plan data.
150+
151+
## Locks
152+
153+
1. Select **Locks** under **Settings** in the left pane.
154+
1. On the **Locks** page, you can view a list of locks.
155+
- To edit a lock, select the **Edit** button next to the lock. You can also delete a lock.
156+
- To add a lock, select **Add** and then enter a **Lock name**, **Lock type**, and, optionally, **Notes**.
157+
32158
## Change plan
33159

34-
To change the Cloud NGFW's billing plan, go to **Overview** and select **Change Plan**.
160+
To change the Cloud NGFW's billing plan, select **Overview** in the left pane and then select **Change Plan**.
35161

36162
## Delete a resource
37163

0 commit comments

Comments
 (0)