Skip to content

Commit fe1047e

Browse files
Merge pull request #311825 from MicrosoftDocs/autoheal-0-20260215055053
Merged by Learn.Build PR Management system
2 parents a0fe50a + f377366 commit fe1047e

7 files changed

Lines changed: 15 additions & 15 deletions

File tree

articles/cost-management-billing/costs/cost-allocation-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.reviewer: vikdesai
1313

1414
# Introduction to cost allocation
1515

16-
Cost allocation, as defined by the [FinOps Foundation](/cloud-computing/finops/capabilities-allocation), is the set of practices to divide up a consolidated invoice. Or, to bill the people responsible for its various component parts. It's the process of assigning costs to different groups within an organization based on their consumption of resources and application of benefits. By providing visibility into costs to groups who are responsible for it, cost allocation helps organizations track and optimize their spending, improve budgeting and forecasting, and increase accountability and transparency.
16+
Cost allocation, as defined by the [FinOps Foundation](/cloud-computing/finops/framework/understand/allocation), is the set of practices to divide up a consolidated invoice. Or, to bill the people responsible for its various component parts. It's the process of assigning costs to different groups within an organization based on their consumption of resources and application of benefits. By providing visibility into costs to groups who are responsible for it, cost allocation helps organizations track and optimize their spending, improve budgeting and forecasting, and increase accountability and transparency.
1717

1818
This article introduces you to different Azure tools and features to enable you to allocate costs effectively and efficiently.
1919

articles/cost-management-billing/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ highlightedContent:
4141
url: costs/understand-work-scopes.md
4242
- title: What is FinOps?
4343
itemType: concept
44-
url: /cloud-computing/finops/overview-finops
44+
url: /cloud-computing/finops/overview
4545

4646
productDirectory:
4747
title: Cost Management

articles/security/fundamentals/iaas.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ In most infrastructure as a service (IaaS) scenarios, [Azure virtual machines (V
2424
To protect your VMs, ensure that only authorized users can set up new VMs and access existing VMs.
2525

2626
> [!NOTE]
27-
> To improve the security of Linux VMs on Azure, you can integrate with Microsoft Entra authentication. When you use [Microsoft Entra authentication for Linux VMs](/entra/identity/devices/howto-vm-sign-in-azure-ad-linux.md), you centrally control and enforce policies that allow or deny access to the VMs.
27+
> To improve the security of Linux VMs on Azure, you can integrate with Microsoft Entra authentication. When you use [Microsoft Entra authentication for Linux VMs](/entra/identity/devices/howto-vm-sign-in-azure-ad-linux), you centrally control and enforce policies that allow or deny access to the VMs.
2828
2929
**Best practice**: Control VM access.
3030
**Detail**: Use [Azure policies](../../governance/policy/overview.md) to establish conventions for resources in your organization and create customized policies. Apply these policies to resources, such as [resource groups](../../azure-resource-manager/management/overview.md). VMs that belong to a resource group inherit its policies.

articles/security/fundamentals/isolation-choices.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Each Microsoft Entra directory is distinct and separate from other Microsoft Ent
2727

2828
### Azure tenancy
2929

30-
Azure tenancy (Azure Subscription) refers to a customer and billing relationship and a unique [tenant](/entra/identity-platform/quickstart-create-new-tenant.md) in [Microsoft Entra ID](/entra/fundamentals/active-directory-whatis.md). Microsoft Entra ID and its [Azure role-based access control](../../role-based-access-control/overview.md) provide tenant level isolation in Microsoft Azure. Each Azure subscription is associated with one Microsoft Entra directory.
30+
Azure tenancy (Azure Subscription) refers to a customer and billing relationship and a unique [tenant](/entra/identity-platform/quickstart-create-new-tenant) in [Microsoft Entra ID](/entra/fundamentals/active-directory-whatis.md). Microsoft Entra ID and its [Azure role-based access control](../../role-based-access-control/overview.md) provide tenant level isolation in Microsoft Azure. Each Azure subscription is associated with one Microsoft Entra directory.
3131

3232
Users, groups, and applications from that directory can manage resources in the Azure subscription. You can assign these access rights by using the Azure portal, Azure command-line tools, and Azure Management APIs. Security boundaries logically isolate a Microsoft Entra tenant so that no customer can access or compromise co-tenants, either maliciously or accidentally. Microsoft Entra ID runs on "bare metal" servers isolated on a segregated network segment, where host-level packet filtering and Windows Firewall block unwanted connections and traffic.
3333

@@ -43,7 +43,7 @@ Users, groups, and applications from that directory can manage resources in the
4343

4444
- Microsoft Entra users have no access to physical assets or locations, and therefore they can't bypass the logical Azure RBAC policy checks stated following.
4545

46-
For diagnostics and maintenance needs, use an operational model that employs a just-in-time privilege elevation system. Microsoft Entra Privileged Identity Management (PIM) introduces the concept of an eligible admin. [Eligible admins](/entra/id-governance/privileged-identity-management/pim-configure.md) are users that need privileged access now and then, but not every day. The role is inactive until the user needs access, then they complete an activation process and become an active admin for a predetermined amount of time.
46+
For diagnostics and maintenance needs, use an operational model that employs a just-in-time privilege elevation system. Microsoft Entra Privileged Identity Management (PIM) introduces the concept of an eligible admin. [Eligible admins](/entra/id-governance/privileged-identity-management/pim-configure) are users that need privileged access now and then, but not every day. The role is inactive until the user needs access, then they complete an activation process and become an active admin for a predetermined amount of time.
4747

4848
![Microsoft Entra Privileged Identity Management](./media/isolation-choices/azure-isolation-fig2.png)
4949

@@ -77,11 +77,11 @@ Some other capabilities for Microsoft Entra ID include:
7777

7878
- Microsoft Entra ID provides Identity as a Service through federation by using [Active Directory Federation Services](/windows-server/identity/ad-fs/deployment/how-to-connect-fed-azure-adfs), synchronization, and replication with on-premises directories.
7979

80-
- [Microsoft Entra multifactor authentication](/entra/identity/authentication/concept-mfa-howitworks.md) requires users to verify sign-ins by using a mobile app, phone call, or text message. It can be used with Microsoft Entra ID to help secure on-premises resources by using the Multi-Factor Authentication Server, and also with custom applications and directories by using the SDK.
80+
- [Microsoft Entra multifactor authentication](/entra/identity/authentication/concept-mfa-howitworks) requires users to verify sign-ins by using a mobile app, phone call, or text message. It can be used with Microsoft Entra ID to help secure on-premises resources by using the Multi-Factor Authentication Server, and also with custom applications and directories by using the SDK.
8181

8282
- [Microsoft Entra Domain Services](https://azure.microsoft.com/products/microsoft-entra-ds/) lets you join Azure virtual machines to an Active Directory domain without deploying domain controllers. You can sign in to these virtual machines with your corporate Active Directory credentials and administer domain-joined virtual machines by using Group Policy to enforce security baselines on all your Azure virtual machines.
8383

84-
- [Microsoft Entra External ID](/entra/external-id/external-identities-overview.md) provides a highly available global-identity management service for consumer-facing applications that scales to hundreds of millions of identities. It can be integrated across mobile and web platforms. Your consumers can sign in to all your applications through customizable experiences by using their existing social accounts or by creating credentials.
84+
- [Microsoft Entra External ID](/entra/external-id/external-identities-overview) provides a highly available global-identity management service for consumer-facing applications that scales to hundreds of millions of identities. It can be integrated across mobile and web platforms. Your consumers can sign in to all your applications through customizable experiences by using their existing social accounts or by creating credentials.
8585

8686
### Isolation from Microsoft administrators and data deletion
8787

articles/security/fundamentals/operational-checklist.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ This checklist is intended to help enterprises think through various operational
3030
| [<br>Security Roles & Access Controls](/azure/defender-for-cloud/defender-for-cloud-planning-and-operations-guide)|<ul><li>Use [Azure role-based access control (Azure RBAC)](/azure/role-based-access-control/role-assignments-portal) to provide user-specific that used to assign permissions to users, groups, and applications at a certain scope.</li></ul> |
3131
| [<br>Data Protection & Storage](../../storage/blobs/security-recommendations.md)|<ul><li>Use Management Plane Security to secure your Storage Account using [Azure role-based access control (Azure RBAC)](/azure/role-based-access-control/role-assignments-portal).</li><li>Data Plane Security to Securing Access to your Data using [Shared Access Signatures (SAS)](../../storage/common/storage-sas-overview.md) and Stored Access Policies.</li><li>Use Transport-Level Encryption – Using HTTPS and the encryption used by [SMB (Server message block protocols) 3.0](/windows/win32/fileio/microsoft-smb-protocol-and-cifs-protocol-overview) for [Azure File Shares](../../storage/files/storage-dotnet-how-to-use-files.md).</li><li>Use [Client-side encryption](../../storage/common/storage-client-side-encryption.md) to secure data that you send to storage accounts when you require sole control of encryption keys. </li><li>Use [Storage Service Encryption (SSE)](../../storage/common/storage-service-encryption.md) to automatically encrypt data in Azure Storage, and [Azure Disk Encryption for Linux VMs](/azure/virtual-machines/linux/disk-encryption-overview) and [Azure Disk Encryption for Windows VMs](/azure/virtual-machines/linux/disk-encryption-overview) to encrypt virtual machine disk files for the OS and data disks.</li><li>Use Azure [Storage Analytics](/rest/api/storageservices/storage-analytics) to monitor authorization type; like with Blob Storage, you can see if users have used a Shared Access Signature or the storage account keys.</li><li>Use [Cross-Origin Resource Sharing (CORS)](/rest/api/storageservices/cross-origin-resource-sharing--cors--support-for-the-azure-storage-services) to access storage resources from different domains.</li></ul> |
3232
|[<br>Security Policies & Recommendations](/azure/defender-for-cloud/defender-for-cloud-planning-and-operations-guide#security-policies-and-recommendations)|<ul><li>Use [Microsoft Defender for Cloud](/azure/defender-for-cloud/integration-defender-for-endpoint) to deploy endpoint solutions.</li><li>Add a [web application firewall (WAF)](../../web-application-firewall/overview.md) to secure web applications.</li><li>Use [Azure Firewall](../../firewall/overview.md) to increase your security protections. </li><li>Apply security contact details for your Azure subscription. The [Microsoft Security Response Center (MSRC)](https://technet.microsoft.com/security/dn528958.aspx) contacts you if it discovers that your customer data has been accessed by an unlawful or unauthorized party.</li></ul> |
33-
| [<br>Identity & Access Management](identity-management-best-practices.md)|<ul><li>[Synchronize your on-premises directory with your cloud directory using Microsoft Entra ID](/entra/identity/hybrid/whatis-hybrid-identity.md).</li><li>Use [single sign-on](/entra/identity/enterprise-apps/what-is-single-sign-on.md) to enable users to access their SaaS applications based on their organizational account in Azure AD.</li><li>Use the [Password Reset Registration Activity](/entra/identity/authentication/howto-sspr-reporting.md) report to monitor the users that are registering.</li><li>Enable [multi-factor authentication (MFA)](/entra/identity/authentication/concept-mfa-howitworks.md) for users.</li><li>Developers to use secure identity capabilities for apps like [Microsoft Security Development Lifecycle (SDL)](https://www.microsoft.com/download/details.aspx?id=12379).</li><li>Actively monitor for suspicious activities by using Microsoft Entra ID P1 or P2 anomaly reports and [Microsoft Entra ID Protection capability](/entra/id-protection/overview-identity-protection.md).</li></ul> |
33+
| [<br>Identity & Access Management](identity-management-best-practices.md)|<ul><li>[Synchronize your on-premises directory with your cloud directory using Microsoft Entra ID](/entra/identity/hybrid/whatis-hybrid-identity).</li><li>Use [single sign-on](/entra/identity/enterprise-apps/what-is-single-sign-on) to enable users to access their SaaS applications based on their organizational account in Azure AD.</li><li>Use the [Password Reset Registration Activity](/entra/identity/authentication/howto-sspr-reporting) report to monitor the users that are registering.</li><li>Enable [multi-factor authentication (MFA)](/entra/identity/authentication/concept-mfa-howitworks) for users.</li><li>Developers to use secure identity capabilities for apps like [Microsoft Security Development Lifecycle (SDL)](https://www.microsoft.com/download/details.aspx?id=12379).</li><li>Actively monitor for suspicious activities by using Microsoft Entra ID P1 or P2 anomaly reports and [Microsoft Entra ID Protection capability](/entra/id-protection/overview-identity-protection).</li></ul> |
3434
|[<br>Ongoing Security Monitoring](/azure/defender-for-cloud/defender-for-cloud-introduction)|<ul><li>Use Malware Assessment Solution [Azure Monitor logs](/azure/azure-monitor/logs/log-query-overview) to report on the status of antimalware protection in your infrastructure.</li><li>Use [Update Management](../../automation/update-management/overview.md) to determine the overall exposure to potential security problems, and whether or how critical these updates are for your environment.</li><li>The [Microsoft Entra admin center](https://entra.microsoft.com) provides visibility into the integrity and security of your organization's directory. |
3535
| [<br>Microsoft Defender for Cloud detection capabilities](../../security-center/security-center-alerts-overview.md#detect-threats)|<ul><li>Use [Cloud Security Posture Management (CSPM)](/azure/defender-for-cloud/concept-cloud-security-posture-management) for hardening guidance that helps you efficiently and effectively improve your security.</li><li>Use [alerts](/azure/defender-for-cloud/alerts-overview) to be notified when threats are identified in your cloud, hybrid, or on-premises environment. </li><li>Use [security policies, initiatives, and recommendations](/azure/defender-for-cloud/security-policy-concept) to improve your security posture.</li></ul> |
3636

articles/security/fundamentals/operational-overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -48,21 +48,21 @@ For more information, see the [Azure Backup components table](../../backup/backu
4848

4949
## Microsoft Entra ID
5050

51-
[Microsoft Entra ID](/entra/identity/enterprise-apps/what-is-application-management.md) is a comprehensive identity service that:
51+
[Microsoft Entra ID](/entra/identity/enterprise-apps/what-is-application-management) is a comprehensive identity service that:
5252

5353
- Enables identity and access management (IAM) as a cloud service.
5454
- Provides central access management, single sign-on (SSO), and reporting.
5555
- Supports integrated access management for [thousands of applications](https://azuremarketplace.microsoft.com/marketplace/apps/Microsoft.AzureActiveDirectory) in the Azure Marketplace, including Salesforce, Google Apps, Box, and Concur.
5656

5757
Microsoft Entra ID also includes a full suite of [identity management capabilities](./identity-management-overview.md), including these:
5858

59-
- [Multi-factor authentication](/entra/identity/authentication/concept-mfa-howitworks.md)
59+
- [Multi-factor authentication](/entra/identity/authentication/concept-mfa-howitworks)
6060
- [Self-service password management](/shows/azure/how-to-configure-self-service-password-reset-users-in-windows-azure-ad)
6161
- [Self-service group management](https://support.microsoft.com/account-billing/reset-your-work-or-school-password-using-security-info-23dde81f-08bb-4776-ba72-e6b72b9dda9e)
62-
- [Privileged account management](/entra/id-governance/privileged-identity-management/pim-configure.md)
62+
- [Privileged account management](/entra/id-governance/privileged-identity-management/pim-configure)
6363
- [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md)
64-
- [Application usage monitoring](/entra/identity/hybrid/whatis-hybrid-identity.md)
65-
- [Rich auditing](/entra/identity/monitoring-health/concept-audit-logs.md)
64+
- [Application usage monitoring](/entra/identity/hybrid/whatis-hybrid-identity)
65+
- [Rich auditing](/entra/identity/monitoring-health/concept-audit-logs)
6666
- [Security monitoring and alerting](../../security-center/security-center-managing-and-responding-alerts.md)
6767

6868
With Microsoft Entra ID, all applications that you publish for your partners and customers (business or consumer) have the same identity and access management capabilities. This enables you to significantly reduce your operational costs.

0 commit comments

Comments
 (0)