You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|**[SingTel](https://www.singtel.com/about-us/news-releases/singtel-provide-secure-private-access-microsoft-azure-public-cloud)**|✓|✓| Hong Kong2<br/>Singapore<br/>Singapore2 |
209
209
|**[SK Telecom](http://b2b.tworld.co.kr/bizts/solution/solutionTemplate.bs?solutionId=0085)**|✓|✓| Seoul |
@@ -309,7 +309,7 @@ If your connectivity provider isn't listed in previous sections, you can still c
309
309
If you're remote and don't have fiber connectivity, or you want to explore other connectivity options you can check the following satellite operators.
Copy file name to clipboardExpand all lines: articles/networking/networking-partners-msp.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,7 @@ Use the links in this section for more information about managed cloud networkin
66
66
|[Zertia](https://zertia.es/)||[ExpressRoute – Intercloud connectivity](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/zertiatelecomunicacionessl1615311863650.zertia-inter-conect-of103?tab=Overview)|[Enterprise Connectivity Suite - Virtual WAN](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/zertiatelecomunicacionessl1615311863650.zertia-vw-suite-of101?tab=Overview); [Manage Virtual WAN – SD-WAN Fortinet](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/zertiatelecomunicacionessl1615311863650.zertia-mvw-fortinet-of101?tab=Overview); [Manage Virtual WAN – SD-WAN Cisco Meraki](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/zertiatelecomunicacionessl1615311863650.zertia-mvw-cisco-of101?tab=Overview)|||
67
67
68
68
Azure Marketplace offers for Managed ExpressRoute, Virtual WAN, Security Services and Private Edge Zone Services from the following Azure Networking MSP Partners are on our roadmap:
Copy file name to clipboardExpand all lines: articles/security/develop/secure-design.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -237,7 +237,7 @@ Use two-factor authentication. Two-factor authentication is the current standard
237
237
238
238
#### Use strong authentication and authorization platforms
239
239
240
-
Use platform-supplied authentication and authorization mechanisms instead of custom code. This is because developing custom authentication code can be prone to error. Commercial code (for example, from Microsoft) often is extensively reviewed for security. [Microsoft Entra ID](../../active-directory/fundamentals/active-directory-whatis.md) (Microsoft Entra ID) is the Azure solution for identity and access management. These Microsoft Entra tools and services help with secure development:
240
+
Use platform-supplied authentication and authorization mechanisms instead of custom code. This is because developing custom authentication code can be prone to error. Commercial code (for example, from Microsoft) often is extensively reviewed for security. [Microsoft Entra ID](../../active-directory/fundamentals/what-is-entra.md) (Microsoft Entra ID) is the Azure solution for identity and access management. These Microsoft Entra tools and services help with secure development:
241
241
242
242
*[Microsoft identity platform](../../active-directory/develop/index.yml) is a set of components that developers use to build apps that securely sign in users. The platform assists developers who are building single-tenant, line-of-business (LOB) apps and developers who are looking to develop multitenant apps. In addition to basic sign-in, apps built by using the Microsoft identity platform can call Microsoft APIs and custom APIs. The Microsoft identity platform supports industry-standard protocols like OAuth 2.0 and OpenID Connect.
Copy file name to clipboardExpand all lines: articles/security/fundamentals/backup-plan-to-protect-against-ransomware.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -94,7 +94,7 @@ Ransomware can attack while you're planning for an attack so your first priority
94
94
95
95
In our experience, the five most important applications to customers fall into the following categories in this priority order:
96
96
97
-
- Identity systems – required for users to access any systems (including all others described below) such as Active Directory, [Microsoft Entra Connect](/entra/identity/hybrid/whatis-azure-ad-connect), AD domain controllers
97
+
- Identity systems – required for users to access any systems (including all others described below) such as Active Directory, [Microsoft Entra Connect](/entra/identity/hybrid/connect/whatis-azure-ad-connect), AD domain controllers
98
98
- Human life – any system that supports human life or could put it at risk such as medical or life support systems, safety systems (ambulance, dispatch systems, traffic light control), large machinery, chemical/biological systems, production of food or personal products, and others
99
99
- Financial systems – systems that process monetary transactions and keep the business operating, such as payment systems and related databases, financial system for quarterly reporting
100
100
- Product or service enablement – any systems that are required to provide the business services or produce/deliver physical products that your customers pay you for, factory control systems, product delivery/dispatch systems, and similar
Copy file name to clipboardExpand all lines: articles/security/fundamentals/isolation-choices.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ Each Microsoft Entra directory is distinct and separate from other Microsoft Ent
27
27
28
28
### Azure tenancy
29
29
30
-
Azure tenancy (Azure Subscription) refers to a customer and billing relationship and a unique [tenant](/entra/identity-platform/quickstart-create-new-tenant) in [Microsoft Entra ID](/entra/fundamentals/active-directory-whatis.md). Microsoft Entra ID and its [Azure role-based access control](../../role-based-access-control/overview.md) provide tenant level isolation in Microsoft Azure. Each Azure subscription is associated with one Microsoft Entra directory.
30
+
Azure tenancy (Azure Subscription) refers to a customer and billing relationship and a unique [tenant](/entra/identity-platform/quickstart-create-new-tenant) in [Microsoft Entra ID](/entra/fundamentals/what-is-entra.md). Microsoft Entra ID and its [Azure role-based access control](../../role-based-access-control/overview.md) provide tenant level isolation in Microsoft Azure. Each Azure subscription is associated with one Microsoft Entra directory.
31
31
32
32
Users, groups, and applications from that directory can manage resources in the Azure subscription. You can assign these access rights by using the Azure portal, Azure command-line tools, and Azure Management APIs. Security boundaries logically isolate a Microsoft Entra tenant so that no customer can access or compromise co-tenants, either maliciously or accidentally. Microsoft Entra ID runs on "bare metal" servers isolated on a segregated network segment, where host-level packet filtering and Windows Firewall block unwanted connections and traffic.
|[Activity logs](/azure/azure-monitor/essentials/platform-logs-overview)|Control-plane events on Azure Resource Manager resources| Provides insight into the operations that were performed on resources in your subscription.| REST API, [Azure Monitor](/azure/azure-monitor/essentials/platform-logs-overview)|
41
41
|[Azure Resource logs](/azure/azure-monitor/essentials/platform-logs-overview)|Frequent data about the operation of Azure Resource Manager resources in subscription| Provides insight into operations that your resource itself performed.| Azure Monitor|
42
-
|[Microsoft Entra ID reporting](/entra/identity/monitoring-health/overview-reports.md)|Logs and reports | Reports user sign-in activities and system activity information about users and group management.|[Microsoft Graph](/graph/overview)|
42
+
|[Microsoft Entra ID reporting](/entra/identity/monitoring-health/overview-monitoring-health.md)|Logs and reports | Reports user sign-in activities and system activity information about users and group management.|[Microsoft Graph](/graph/overview)|
43
43
|[Virtual machines and cloud services](/azure/azure-monitor/vm/monitor-virtual-machine)|Windows Event Log service and Linux Syslog| Captures system data and logging data on the virtual machines and transfers that data into a storage account of your choice.| Windows (using [Azure Diagnostics](/azure/azure-monitor/agents/diagnostics-extension-overview) storage) and Linux in Azure Monitor|
44
44
|[Azure Storage Analytics](/rest/api/storageservices/fileservices/storage-analytics)|Storage logging, provides metrics data for a storage account|Provides insight into trace requests, analyzes usage trends, and diagnoses issues with your storage account.| REST API or the [client library](/dotnet/api/overview/azure/storage)|
45
45
|[Network security group (NSG) flow logs](../../network-watcher/network-watcher-nsg-flow-logging-overview.md)|JSON format, shows outbound and inbound flows on a per-rule basis|Displays information about ingress and egress IP traffic through a Network Security Group.|[Azure Network Watcher](../../network-watcher/network-watcher-monitoring-overview.md)|
Copy file name to clipboardExpand all lines: articles/security/fundamentals/overview.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -509,14 +509,14 @@ Microsoft uses multiple security practices and technologies across its products
509
509
510
510
-[Azure role-based access control (Azure RBAC)](../../role-based-access-control/built-in-roles.md) enables you to grant access based on the user’s assigned role. It's easy to give users only the amount of access they need to perform their job duties. You can customize Azure RBAC per your organization’s business model and risk tolerance.
511
511
512
-
-[Integrated identity management (hybrid identity)](/entra/identity/hybrid/plan-hybrid-identity-design-considerations-overview.md) enables you to maintain control of users’ access across internal datacenters and cloud platforms. It creates a single user identity for authentication and authorization to all resources.
512
+
-[Integrated identity management (hybrid identity)](/entra/identity/hybrid/connect/plan-connect-design-concepts.md) enables you to maintain control of users’ access across internal datacenters and cloud platforms. It creates a single user identity for authentication and authorization to all resources.
513
513
514
514
### Secure apps and data
515
515
[Microsoft Entra ID](https://www.microsoft.com/security/business/identity-access/microsoft-entra-id), a comprehensive identity and access management cloud solution, helps secure access to data in applications on site and in the cloud, and simplifies the management of users and groups. It combines core directory services, advanced identity governance, security, and application access management, and makes it easy for developers to build policy-based identity management into their apps. To enhance your Microsoft Entra ID, you can add paid capabilities by using the Microsoft Entra Basic, Premium P1, and Premium P2 editions.
516
516
517
517
| Free or common features | Basic features |Premium P1 features |Premium P2 features | Microsoft Entra join – Windows 10 only related features|
| [Directory Objects](/entra/fundamentals/active-directory-whatis.md), [User/Group Management (add/update/delete)/ User-based provisioning, Device registration](/entra/fundamentals/active-directory-whatis.md), [single sign-on (SSO)](/entra/fundamentals/active-directory-whatis.md), [Self-Service Password Change for cloud users](/entra/fundamentals/active-directory-whatis.md), [Connect (Sync engine that extends on-premises directories to Microsoft Entra ID)](/entra/fundamentals/active-directory-whatis.md), [Security / Usage Reports](/entra/fundamentals/active-directory-whatis.md) | [Group-based access management / provisioning](/entra/fundamentals/active-directory-whatis.md), [Self-Service Password Reset for cloud users](/entra/fundamentals/active-directory-whatis.md), [Company Branding (sign in Pages/Access Panel customization)](/entra/fundamentals/active-directory-whatis.md), [Application Proxy](/entra/fundamentals/active-directory-whatis.md), [SLA 99.9%](/entra/fundamentals/active-directory-whatis.md) | [Self-Service Group and app Management/Self-Service application additions/Dynamic Groups](/entra/fundamentals/active-directory-whatis.md), [Self-Service Password Reset/Change/Unlock with on-premises write-back](/entra/fundamentals/active-directory-whatis.md), [multifactor authentication (Cloud and On-premises (MFA Server))](/entra/fundamentals/active-directory-whatis.md), [MIM CAL + MIM Server](/entra/fundamentals/active-directory-whatis.md), [Cloud App Discovery](/entra/fundamentals/active-directory-whatis.md), [Connect Health](/entra/fundamentals/active-directory-whatis.md), [Automatic password rollover for group accounts](/entra/fundamentals/active-directory-whatis.md)| [Identity Protection](/entra/id-protection/overview-identity-protection), [Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-configure)| [Join a device to Microsoft Entra ID, Desktop SSO, Microsoft Passport for Microsoft Entra ID, Administrator BitLocker recovery](/entra/fundamentals/active-directory-whatis.md), [MDM autoenrollment, Self-Service BitLocker recovery, extra local administrators to Windows 10 devices via Microsoft Entra join](/entra/fundamentals/active-directory-whatis.md)|
519
+
| [Directory Objects](/entra/fundamentals/what-is-entra.md), [User/Group Management (add/update/delete)/ User-based provisioning, Device registration](/entra/fundamentals/what-is-entra.md), [single sign-on (SSO)](/entra/fundamentals/what-is-entra.md), [Self-Service Password Change for cloud users](/entra/fundamentals/what-is-entra.md), [Connect (Sync engine that extends on-premises directories to Microsoft Entra ID)](/entra/fundamentals/what-is-entra.md), [Security / Usage Reports](/entra/fundamentals/what-is-entra.md) | [Group-based access management / provisioning](/entra/fundamentals/what-is-entra.md), [Self-Service Password Reset for cloud users](/entra/fundamentals/what-is-entra.md), [Company Branding (sign in Pages/Access Panel customization)](/entra/fundamentals/what-is-entra.md), [Application Proxy](/entra/fundamentals/what-is-entra.md), [SLA 99.9%](/entra/fundamentals/what-is-entra.md) | [Self-Service Group and app Management/Self-Service application additions/Dynamic Groups](/entra/fundamentals/what-is-entra.md), [Self-Service Password Reset/Change/Unlock with on-premises write-back](/entra/fundamentals/what-is-entra.md), [multifactor authentication (Cloud and On-premises (MFA Server))](/entra/fundamentals/what-is-entra.md), [MIM CAL + MIM Server](/entra/fundamentals/what-is-entra.md), [Cloud App Discovery](/entra/fundamentals/what-is-entra.md), [Connect Health](/entra/fundamentals/what-is-entra.md), [Automatic password rollover for group accounts](/entra/fundamentals/what-is-entra.md)| [Identity Protection](/entra/id-protection/overview-identity-protection), [Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-configure)| [Join a device to Microsoft Entra ID, Desktop SSO, Microsoft Passport for Microsoft Entra ID, Administrator BitLocker recovery](/entra/fundamentals/what-is-entra.md), [MDM autoenrollment, Self-Service BitLocker recovery, extra local administrators to Windows 10 devices via Microsoft Entra join](/entra/fundamentals/what-is-entra.md)|
520
520
521
521
-[Cloud App Discovery](/cloud-app-security/set-up-cloud-discovery) is a premium feature of Microsoft Entra ID that enables you to identify cloud applications that employees in your organization use.
522
522
@@ -530,7 +530,7 @@ Microsoft uses multiple security practices and technologies across its products
530
530
531
531
-[Microsoft Entra joined](/entra/identity/devices/overview) enables you to extend cloud capabilities to Windows 10 devices for centralized management. It makes it possible for users to connect to the corporate or organizational cloud through Microsoft Entra ID and simplifies access to apps and resources.
532
532
533
-
-[Microsoft Entra application proxy](/entra/identity/app-proxy/application-proxy.md) provides SSO and secure remote access for web applications hosted on-premises.
533
+
-[Microsoft Entra application proxy](/entra/identity/app-proxy/overview-what-is-app-proxy.md) provides SSO and secure remote access for web applications hosted on-premises.
0 commit comments