Skip to content

Commit 5afefd5

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-security-docs-pr into wi564984-update-to-SQL-plan
2 parents eb2b3f1 + 3c2dbef commit 5afefd5

20 files changed

Lines changed: 115 additions & 55 deletions

articles/defender-for-cloud/defender-for-apis-prepare.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: dlanger
55
ms.author: dlanger
66
ms.service: defender-for-cloud
77
ms.topic: checklist
8-
ms.date: 07/15/2025
8+
ms.date: 03/31/2026
99
ms.custom: references_regions
1010
---
1111
# Support and prerequisites for Defender for APIs deployment
@@ -21,8 +21,15 @@ Defender for APIs is available in the Azure commercial cloud, in these regions:
2121
- Brazil (Brazil South, Brazil Southeast)
2222
- Canada (Canada Central, Canada East)
2323
- Europe (West Europe, North Europe)
24+
- France (France Central, France South)
25+
- Germany (Germany West Central, Germany North)
2426
- India (Central India, South India, West India)
27+
- Italy (Italy North)
2528
- Japan (Japan East, Japan West)
29+
- Korea (Korea Central, Korea South)
30+
- Norway (Norway East, Norway West)
31+
- Sweden (Sweden Central, Sweden South)
32+
- Switzerland (Switzerland North, Switzerland West)
2633
- UK (UK South, UK West)
2734
- US (East US, East US 2, West US, West US 2, West US 3, Central US, North Central US, South Central US, West Central US, East US 2 EUAP, Central US EUAP)
2835

articles/defender-for-cloud/enable-api-security-posture.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to enable API security posture management in Microsoft De
44
ms.author: elkrieger
55
author: Elazark
66
ms.topic: how-to
7-
ms.date: 01/04/2026
7+
ms.date: 03/31/2026
88
ms.custom: sfi-image-nochange, references_regions
99
#customer intent: As a cloud administrator, I want to learn how to enable API security posture management to protect my APIs in Azure API Management, Function Apps, and Logic Apps.
1010
---
@@ -34,8 +34,15 @@ API Security Posture Management within Defender CSPM is available in the Azure c
3434
- Brazil (Brazil South, Brazil Southeast)
3535
- Canada (Canada Central, Canada East)
3636
- Europe (West Europe, North Europe)
37+
- France (France Central, France South)
38+
- Germany (Germany West Central, Germany North)
3739
- India (Central India, South India, West India)
40+
- Italy (Italy North)
3841
- Japan (Japan East, Japan West)
42+
- Korea (Korea Central, Korea South)
43+
- Norway (Norway East, Norway West)
44+
- Sweden (Sweden Central, Sweden South)
45+
- Switzerland (Switzerland North, Switzerland West)
3946
- UK (UK South, UK West)
4047
- US (East US, East US 2, West US, West US 2, West US 3, Central US, North Central US, South Central US, West Central US, East US 2 EUAP, Central US EUAP)
4148

articles/defender-for-cloud/recommendations-reference-data.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1925,6 +1925,28 @@ Even with key owner precautions, keys can be easily leaked by less than optimum
19251925

19261926
**Severity**: High
19271927

1928+
### Geo-redundant backups should be enabled for PostgreSQL Servers
1929+
1930+
**Description**:
1931+
__What is geo-redundant backup?__ Geo-redundant backup replicates server backups to a paired Azure region, providing resilience against regional failures.
1932+
1933+
__Why is it a security concern?__ If geo-redundant backups are disabled, a regional outage could result in data loss and extended downtime, impacting availability and compliance.
1934+
1935+
__How could attackers exploit it or how could it lead to data breaches?__ While not directly exploitable, lack of geo-redundancy increases the impact of disasters or targeted attacks on a single region.
1936+
1937+
**Severity**: Low
1938+
1939+
### require_secure_transport should be set to “on” for Azure Database for PostgreSQL Servers
1940+
1941+
**Description**:
1942+
__What is require_secure_transport?__ require_secure_transport is a server-level parameter that enforces the use of SSL/TLS for all client connections to PostgreSQL. When set to on, clients must connect using encrypted channels.
1943+
1944+
__Why is it a security concern?__ If this setting is disabled (off), clients may connect over unencrypted channels, exposing sensitive data such as credentials, queries, and results to interception or manipulation.
1945+
1946+
__How could attackers exploit it or how could it lead to data breaches?__ An attacker on the network could perform a man-in-the-middle attack, intercepting or altering data exchanged between the client and server if encryption is not enforced.
1947+
1948+
**Severity**: High
1949+
19281950
## Related content
19291951

19301952
- [Learn about security recommendations](security-policy-concept.md)

articles/defender-for-cloud/release-notes-recommendations-alerts.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@ New and updated recommendations, alerts, and incidents are added to the table in
4949
| **Date announced** | **Type** | **State** | **Name** |
5050
| ------------ | -------------- | -------------------- | ------------------------------------------------------------ |
5151
| March 30, 2026 | Alert | Preview | The following alert is now in Preview: <br> * Malicious content detected in uploaded AI model |
52+
| March 29, 2026 | Recommendation | Preview | The following recommendations are now available in preview for Azure Database for PostgreSQL Flexible Servers as part of Defender CSPM:<br/>* Geo-redundant backups should be enabled for PostgreSQL Servers <br/>* require_secure_transport should be set to "on" for Azure Database for PostgreSQL Servers |
5253
| March 29, 2026 | Recommendation | Deprecation | Following the announcement from December 3, 2025, The recommendation `Microsoft Defender for SQL status should be protected for Arc-enabled SQL Servers` for Defender for SQL Servers on Machines plan, is now deprecated. |
5354
| March 04, 2026 | Recommendation | Upcoming deprecation | The following grouped container vulnerability recommendations are set for deprecation on April 13, 2026:<br/>**Container recommendations:**<br/>\* [Preview] Containers running in Azure should have vulnerability findings resolved<br/>\* [Preview] Containers running in AWS should have vulnerability findings resolved<br/>\* [Preview] Containers running in GCP should have vulnerability findings resolved<br/>**Container image recommendations:**<br/>\* [Preview] Container images in Azure registry should have vulnerability findings resolved<br/>\* [Preview] Container images in AWS registry should have vulnerability findings resolved<br/>\* [Preview] Container images in GCP registry should have vulnerability findings resolved<br/><br/>These grouped recommendations are being replaced by individual recommendations that provide more granular visibility, better prioritization, and improved governance. Learn more in [Deprecation of preview of container and container images vulnerability recommendations](release-notes.md#deprecation-of-preview-of-container-and-container-images-vulnerability-recommendations). |
5455
| February 24, 2026 | Recommendation | GA | The following data recommendations are GA: <br><br> - [Storage accounts should restrict network access using virtual network rules](recommendations-reference-data.md#storage-accounts-should-restrict-network-access-using-virtual-network-rules). <br><br> - [Storage account should use a private link connection](recommendations-reference-data.md#storage-account-should-use-a-private-link-connection). <br><br> - [Storage accounts should prevent shared key access](recommendations-reference-data.md#storage-accounts-should-prevent-shared-key-access). |

articles/defender-for-cloud/release-notes.md

Lines changed: 26 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22
title: What's new in Microsoft Defender for Cloud features
33
description: What's new and updated in Microsoft Defender for Cloud features
44
ms.topic: overview
5-
ms.date: 03/30/2026
5+
ms.custom: references_regions
6+
ms.date: 03/31/2026
67
---
78

89
# What's new in Defender for Cloud features
@@ -31,6 +32,7 @@ This article summarizes what's new in Microsoft Defender for Cloud. It includes
3132

3233
| Date | Category | Update |
3334
| -------- | -------- | -------- |
35+
| March 31, 2026| Update | [Support for additional Azure regions for Defender for APIs and API security posture management with Defender CSPM](#support-for-additional-azure-regions-for-defender-for-apis-and-api-security-posture-management-with-defender-cspm) |
3436
| March 30, 2026 | Upcoming change | [Update to Defender for SQL servers on machines plan for Fairfax customers](#update-to-defender-for-sql-servers-on-machines-plan-for-fairfax-customers) |
3537
| March 30, 2026 | Preview | [AI model security for Azure Machine Learning (Preview)](#ai-model-security-for-azure-machine-learning-preview) |
3638
| March 29, 2026 | Preview | [Expanded multicloud coverage for AWS and GCP (Preview)](#expanded-multicloud-coverage-for-aws-and-gcp-preview) |
@@ -55,9 +57,31 @@ To simplify onboarding and improve protection coverage, we're releasing an enhan
5557
- [Update Defender for SQL Servers on Machines plan configuration](update-sql-machine-configuration.md): If you enabled the Defender for SQL Server on machines plan before April 2026, follow these instructions to update your configuration.
5658
- [Verify SQL Server instances protection status](verify-machine-protection.md): With an estimated starting date of May 2026, you must verify the protection status of your SQL Server instances across your environments. Learn how to [troubleshoot deployment issues for Defender for SQL on machines configuration](troubleshoot-sql-machines-guide.md).
5759

60+
### Support for additional Azure regions for Defender for APIs and API security posture management with Defender CSPM
61+
62+
63+
Microsoft Defender for APIs and API security posture management with Defender CSPM has expanded to provide its capabilities in the following Azure regions:
64+
- Sweden Central
65+
- Sweden South
66+
- Germany West Central
67+
- Germany North
68+
- Italy North
69+
- France Central
70+
- France South
71+
- Norway East
72+
- Norway West
73+
- Switzerland North
74+
- Switzerland West
75+
- Korea Central
76+
- Korea South
77+
78+
Customers who have Azure API Management services in these regions can now use the capabilities offered by Microsoft Defender for APIs and API security posture management with Defender CSPM.
79+
API discovery and security posture capabilities in Defender CSPM for Azure Function Apps and Azure Logic Apps have also been expanded to these regions. This feature is still in Preview.
80+
81+
Learn more about [Microsoft Defender for APIs](defender-for-apis-introduction.md) and [API security posture management with Defender CSPM](api-security-posture-overview.md).
82+
5883
### AI model security for Azure Machine Learning (Preview)
5984

60-
March 30, 2026
6185

6286
Microsoft Defender for Cloud now offers AI model security in preview for Azure Machine Learning registries and workspaces. AI model security helps security teams discover and scan custom AI models for risks before deployment, and review findings in Defender for Cloud.
6387

@@ -92,7 +116,6 @@ Learn more about [security recommendations](review-security-recommendations.md).
92116

93117
### File Integrity Monitoring requires MDE agent version 10.8799+ for legacy Windows machines
94118

95-
March 22, 2026
96119

97120
Due to a pipeline change in Microsoft Defender for Endpoint (MDE), File Integrity Monitoring now requires the **Defender for Servers Windows client (Microsoft Defender for Endpoint agent) version 10.8799 or above** for proper functionality on legacy Windows machines (downlevel clients).
98121

articles/key-vault/certificates/quick-create-go.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Quickstart – Azure Key Vault Go client library - Manage certificates
33
description: Learn how to create, retrieve, and delete certificates from an Azure key vault using the Go client library
44
author: Duffney
55
ms.author: jduffney
6-
ms.date: 03/26/2026
6+
ms.date: 03/30/2026
77
ms.service: azure-key-vault
88
ms.subservice: certificates
99
ms.topic: quickstart
@@ -217,7 +217,7 @@ For more examples, see the [module documentation](https://aka.ms/azsdk/go/keyvau
217217
Run the following command to delete the resource group and all its remaining resources:
218218

219219
```azurecli
220-
az group delete --resource-group <resource-group>
220+
az group delete --resource-group "myResourceGroup"
221221
```
222222

223223
## Next steps

articles/key-vault/certificates/quick-create-java.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about the Azure Key Vault Certificate client library for Java
44
author: msmbaldwin
55
ms.custom: devx-track-java, devx-track-azurecli, devx-track-azurepowershell, mode-api, passwordless-java, devx-track-extended-java
66
ms.author: mbaldwin
7-
ms.date: 03/26/2026
7+
ms.date: 03/30/2026
88

99
ms.service: azure-key-vault
1010
ms.subservice: certificates
@@ -229,11 +229,11 @@ deletionPoller.waitForCompletion();
229229
When no longer needed, you can use the Azure CLI or Azure PowerShell to remove your key vault and the corresponding resource group.
230230

231231
```azurecli
232-
az group delete -g "<resource-group>"
232+
az group delete -g "myResourceGroup"
233233
```
234234

235235
```azurepowershell
236-
Remove-AzResourceGroup -Name "<resource-group>"
236+
Remove-AzResourceGroup -Name "myResourceGroup"
237237
```
238238

239239
## Sample code

articles/key-vault/certificates/quick-create-python.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Quickstart – Azure Key Vault Python client library – manage certifica
33
description: Learn how to create, retrieve, and delete certificates from an Azure key vault using the Python client library
44
author: msmbaldwin
55
ms.author: mbaldwin
6-
ms.date: 03/26/2026
6+
ms.date: 03/30/2026
77

88
ms.service: azure-key-vault
99
ms.subservice: certificates
@@ -87,7 +87,7 @@ This quickstart uses the Azure Identity library with Azure CLI or Azure PowerShe
8787
8888
### Set the KEY_VAULT_NAME environmental variable
8989
90-
[!INCLUDE [Set the KEY_VAULT_NAME environmental variable](../includes/key-vault-set-environmental-variables.md)]
90+
[!INCLUDE [Set the KEY_VAULT_NAME environmental variable](~/reusable-content/ce-skilling/azure/includes/key-vault/set-environmental-variables.md)]
9191
9292
### Grant access to your key vault
9393
@@ -210,13 +210,13 @@ Otherwise, when you're finished with the resources created in this article, use
210210
### [Azure CLI](#tab/azure-cli)
211211

212212
```azurecli
213-
az group delete --resource-group <resource-group>
213+
az group delete --resource-group "myResourceGroup"
214214
```
215215

216216
### [Azure PowerShell](#tab/azure-powershell)
217217

218218
```azurepowershell
219-
Remove-AzResourceGroup -Name "<resource-group>"
219+
Remove-AzResourceGroup -Name "myResourceGroup"
220220
```
221221

222222
---

articles/key-vault/general/tutorial-javascript-virtual-machine.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: msmbaldwin
55
ms.service: azure-key-vault
66
ms.subservice: general
77
ms.topic: tutorial
8-
ms.date: 03/26/2026
8+
ms.date: 03/30/2026
99
ms.author: mbaldwin
1010
ms.devlang: javascript
1111
ms.custom: mvc, devx-track-js, devx-track-azurecli, devx-track-azurepowershell
@@ -197,7 +197,7 @@ The value of secret 'mySecret' in '<vault-name>' is: 'Success!'
197197
When they are no longer needed, delete the virtual machine and your key vault. You can do this quickly by simply deleting the resource group to which they belong:
198198
199199
```azurecli
200-
az group delete -g <resource-group>
200+
az group delete -g "myResourceGroup"
201201
```
202202
203203
## Next steps

articles/key-vault/general/tutorial-net-virtual-machine.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: msmbaldwin
66
ms.service: azure-key-vault
77
ms.subservice: general
88
ms.topic: tutorial
9-
ms.date: 03/26/2026
9+
ms.date: 03/30/2026
1010
ms.author: mbaldwin
1111
ms.devlang: csharp
1212
ms.custom: mvc, devx-track-csharp, devx-track-azurepowershell, devx-track-azurecli, devx-track-dotnet
@@ -65,7 +65,7 @@ Connect-AzAccount
6565

6666
## Populate your key vault with a secret
6767

68-
[!INCLUDE [Create a secret](../includes/key-vault-create-secret.md)]
68+
[!INCLUDE [Create a secret](~/reusable-content/ce-skilling/azure/includes/key-vault/create-secret.md)]
6969

7070
## Create a virtual machine
7171
Create a Windows or Linux virtual machine using one of the following methods:

0 commit comments

Comments
 (0)