Skip to content

Commit 9419dbc

Browse files
Merge pull request #2713 from MicrosoftDocs/main
Auto Publish – main to live - 2026-04-09 22:06 UTC
2 parents 4d24d43 + f6e20e9 commit 9419dbc

19 files changed

Lines changed: 42 additions & 47 deletions

articles/defender-for-cloud/introduction-malware-scanning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ These resources are required for malware scanning to function. If any of them ar
163163

164164
* **Unsupported protocols:** Blobs uploaded using the Network File System (NFS) 3.0 protocol aren’t scanned.
165165

166-
* **Blob index tags:** Index tags for storage accounts with hierarchical namespaces enabled (Azure Data Lake Storage Gen2) are supported in public preview. You can opt in to this pre-release feature - "Blob Tags for Hierarchical Namespace".
166+
* **Blob index tags:** Index tags for storage accounts with hierarchical namespaces enabled (Azure Data Lake Storage Gen2) are available in public preview. To use this feature, opt in to "Blob Tags for Hierarchical Namespace".
167167

168168
* **Unsupported regions:** Not all regions currently support malware scanning. For the latest list, see [Defender for Cloud availability](https://azure.microsoft.com/pricing/details/defender-for-cloud/).
169169

articles/defender-for-cloud/recommendations-reference-data.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,6 @@ To learn about actions that you can take in response to these recommendations, s
2525
> For example, the recommendation *Endpoint protection health failures should be remediated* relies on the recommendation that checks whether an endpoint protection solution is installed (*Endpoint protection solution should be installed*). The underlying recommendation *does* have a policy.
2626
> Limiting policies to only foundational recommendations simplifies policy management.
2727
28-
29-
30-
3128
## Azure data recommendations
3229

3330
### Azure Cosmos DB should disable public network access
@@ -1936,7 +1933,7 @@ __How could attackers exploit it or how could it lead to data breaches?__ While
19361933

19371934
**Severity**: Low
19381935

1939-
### require_secure_transport should be set to “on” for Azure Database for PostgreSQL Servers
1936+
### require_secure_transport should be set to **on** for Azure Database for PostgreSQL servers
19401937

19411938
**Description**:
19421939
__What is require_secure_transport?__ require_secure_transport is a server-level parameter that enforces the use of SSL/TLS for all client connections to PostgreSQL. When set to on, clients must connect using encrypted channels.

articles/defender-for-cloud/release-notes.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ To simplify onboarding and improve protection coverage, we're releasing an enhan
6464

6565
| Date | Category | Update |
6666
| -------- | -------- | -------- |
67-
| March 31, 2026 | GA | [Malware automated remediation in Defender for Storage](#malware-automated-remediation-in-defender-for-storage)|
67+
| March 31, 2026 | GA | [Malware automated remediation in Defender for Storage](#automated-malware-remediation-in-defender-for-storage)|
6868
| March 31, 2026| Update | [Support for additional Azure regions for Defender for APIs and API security posture management with Defender CSPM](#support-for-additional-azure-regions-for-defender-for-apis-and-api-security-posture-management-with-defender-cspm) |
6969
| March 30, 2026 | Preview | [AI model security for Azure Machine Learning (Preview)](#ai-model-security-for-azure-machine-learning-preview) |
7070
| March 29, 2026 | Preview | [Expanded multicloud coverage for AWS and GCP (Preview)](#expanded-multicloud-coverage-for-aws-and-gcp-preview) |
@@ -77,20 +77,21 @@ To simplify onboarding and improve protection coverage, we're releasing an enhan
7777
| March 04, 2026 | Preview |[New individual recommendations format in Azure portal (Preview)](#new-individual-recommendations-format-in-azure-portal-preview)|
7878

7979

80-
### Malware automated remediation in Defender for Storage
80+
### Automated malware remediation in Defender for Storage
8181

8282
March 31, 2026
8383

84-
Malware automated remediation in Defender for Storage malware scanning is now generally available.
84+
Automated malware remediation in Defender for Storage is now generally available.
8585

86-
Defender for Cloud now lets you configure automatic soft deletion of detected malicious blobs during on-upload or on-demand scanning. Auto-deletion keeps harmful content in quarantine and makes it recoverable for further investigation.
86+
Defender for Cloud now lets you automatically soft-delete malicious blobs detected during on-upload or on-demand malware scanning. Soft-deleted blobs are quarantined and can be recovered for further investigation.
8787

88-
You can enable or disable automated malware remediation at the subscription level or the storage account level in Microsoft Defender for Cloud in the Azure portal or with an application programming interface (API).
88+
You can enable or disable automated malware remediation at the subscription or storage account level in Microsoft Defender for Cloud in the Azure portal or through the API.
8989

90-
Learn how to use [built-in automated malware remediation for malicious blobs](/azure/defender-for-cloud/defender-for-storage-configure-malware-scan#built-in-automated-malware-remediation-for-malicious-blobs).
90+
Learn how to use [built-in automated malware remediation for malicious blobs](defender-for-storage-configure-malware-scan.md#built-in-automated-malware-remediation-for-malicious-blobs).
9191

9292
### Support for additional Azure regions for Defender for APIs and API security posture management with Defender CSPM
9393

94+
March 31, 2026
9495

9596
Microsoft Defender for APIs and API security posture management with Defender CSPM has expanded to provide its capabilities in the following Azure regions:
9697
- Sweden Central
@@ -116,6 +117,7 @@ Learn more about [Microsoft Defender for APIs](defender-for-apis-introduction.md
116117

117118
### AI model security for Azure Machine Learning (Preview)
118119

120+
March 30, 2026
119121

120122
Microsoft Defender for Cloud now offers AI model security in preview for Azure Machine Learning registries and workspaces. AI model security helps security teams discover and scan custom AI models for risks before deployment, and review findings in Defender for Cloud.
121123

articles/key-vault/certificates/how-to-integrate-certificate-authority.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ DigiCertCA is now in the certificate authority list.
8787
3. Select the **Certificate Authorities** tab:
8888
:::image type="content" source="../media/certificates/how-to-integrate-certificate-authority/select-certificate-authorities.png" alt-text="Screenshot that shows selecting the Certificate Authorities tab.":::
8989
4. Select **Add**:
90-
:::image type="content" source="../media/certificates/how-to-integrate-certificate-authority/add-global-sign-certificate-authority.jpg" alt-text="Screenshot that shows the Add button on the Global Sign Certificate Authorities tab.":::
90+
:::image type="content" source="../media/certificates/how-to-integrate-certificate-authority/add-globalsign-ca.jpg" alt-text="Screenshot that shows the Add button on the Global Sign Certificate Authorities tab.":::
9191
5. Under **Create a certificate authority**, enter these values:
9292
- **Name**: An identifiable issuer name. For example, **GlobalSignCA**.
9393
- **Provider**: **GlobalSign**.

articles/key-vault/general/assign-access-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.author: mbaldwin
1717

1818
[!INCLUDE [contributor-role-warning.md](~/reusable-content/ce-skilling/azure/includes/key-vault/key-vault-contributor-role-warning.md)]
1919

20-
A Key Vault access policy determines whether a given security principal, namely a user, application or user group, can perform different operations on Key Vault [secrets](../secrets/index.yml), [keys](../keys/index.yml), and [certificates](../certificates/index.yml). You can assign access policies using the [Azure portal](assign-access-policy-portal.md), the Azure CLI, or [Azure PowerShell](assign-access-policy-powershell.md).
20+
A Key Vault access policy determines whether a given security principal, namely a user, application or user group, can perform different operations on Key Vault [secrets](../secrets/index.yml), [keys](../keys/index.yml), and [certificates](../certificates/index.yml). You can assign access policies using the Azure portal, the Azure CLI, or Azure PowerShell.
2121

2222
Key vault supports up to 1024 access policy entries, with each entry granting a distinct set of permissions to a particular security principal. Because of this limitation, we recommend assigning access policies to groups of users, where possible, rather than individual users. Using groups makes it much easier to manage permissions for multiple people in your organization. For more information, see [Manage app and resource access using Microsoft Entra groups](/entra/fundamentals/how-to-manage-groups).
2323

articles/key-vault/general/authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ More information about best practices and developer examples, see [Authenticate
102102
## Next Steps
103103

104104
- [Key Vault developer's guide](developers-guide.md)
105-
- [Assign a Key Vault access policy using the Azure portal](assign-access-policy-portal.md)
105+
- [Assign a Key Vault access policy](assign-access-policy.md)
106106
- [Assign Azure RBAC role to Key Vault](rbac-guide.md)
107107
- [Key Vault access policy troubleshooting](troubleshooting-access-issues.md)
108108
- [Key Vault REST API error codes](rest-error-codes.md)

articles/key-vault/general/move-subscription.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -101,9 +101,7 @@ az keyvault update -n myvault --set Properties.tenantId=$tenantId # Upd
101101
Now that your vault is associated with the correct tenant ID and old access policy entries or role assignments are removed, set new access policy entries or role assignments.
102102

103103
For assigning policies, see:
104-
- [Assign an access policy using Portal](assign-access-policy-portal.md)
105-
- [Assign an access policy using Azure CLI](assign-access-policy-cli.md)
106-
- [Assign an access policy using PowerShell](assign-access-policy-powershell.md)
104+
- [Assign a Key Vault access policy](assign-access-policy.md)
107105

108106
For adding role assignments, see:
109107
- [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal)

articles/key-vault/general/rbac-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ The **control plane** is where you manage Key Vault itself. Operations in this p
3232

3333
The **data plane** is where you work with the data stored in a key vault. You can add, delete, and modify keys, secrets, and certificates.
3434

35-
Both planes use [Microsoft Entra ID](/entra/fundamentals/whatis) for authentication. For authorization, the control plane uses [Azure role-based access control (Azure RBAC)](/azure/role-based-access-control/overview) and the data plane uses a [Key Vault access policy](./assign-access-policy-portal.md) (legacy) or [Azure RBAC for Key Vault data plane operations](./rbac-guide.md).
35+
Both planes use [Microsoft Entra ID](/entra/fundamentals/whatis) for authentication. For authorization, the control plane uses [Azure role-based access control (Azure RBAC)](/azure/role-based-access-control/overview) and the data plane uses a [Key Vault access policy](./assign-access-policy.md) (legacy) or [Azure RBAC for Key Vault data plane operations](./rbac-guide.md).
3636

3737
To access a key vault in either plane, all callers (users or applications) must have proper authentication and authorization. Authentication establishes the identity of the caller. Authorization determines which operations the caller can execute.
3838

articles/key-vault/general/troubleshooting-access-issues.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.topic: how-to
1515

1616
### I'm not able to list or get secrets/keys/certificate. I'm seeing a "something went wrong" error
1717

18-
If you're having problem with listing/getting/creating or accessing secret, make sure that you have the appropriate Azure RBAC role assigned. See [Azure RBAC for Key Vault](./rbac-guide.md). If you're using the legacy access policy model, see [Key Vault Access Policies](./assign-access-policy-cli.md).
18+
If you're having problem with listing/getting/creating or accessing secret, make sure that you have the appropriate Azure RBAC role assigned. See [Azure RBAC for Key Vault](./rbac-guide.md). If you're using the legacy access policy model, see [Assign a Key Vault access policy](./assign-access-policy.md).
1919

2020
### How can I identify how and when key vaults are accessed?
2121

@@ -52,7 +52,7 @@ If you're creating an on-premises application, doing local development, or other
5252
Give the AD group permissions to your key vault using Azure RBAC with the Azure CLI `az role assignment create` command, or the Azure PowerShell `New-AzRoleAssignment` cmdlet. See [Azure RBAC for Key Vault data plane operations](rbac-guide.md).
5353

5454
> [!NOTE]
55-
> If you are using legacy access policies, you can use the Azure CLI `az keyvault set-policy` command or the Azure PowerShell `Set-AzKeyVaultAccessPolicy` cmdlet. However, Azure RBAC is the recommended authorization model. See [Assign an access policy - CLI](assign-access-policy-cli.md) and [Assign an access policy - PowerShell](assign-access-policy-powershell.md).
55+
> If you are using legacy access policies, you can use the Azure CLI `az keyvault set-policy` command or the Azure PowerShell `Set-AzKeyVaultAccessPolicy` cmdlet. However, Azure RBAC is the recommended authorization model. See [Assign a Key Vault access policy](assign-access-policy.md).
5656
5757
The application also needs at least one Identity and Access Management (IAM) role assigned to the key vault. Otherwise it will not be able to log in and will fail with insufficient rights to access the subscription. Microsoft Entra groups with Managed Identities may require many hours to refresh tokens and become effective. See [Limitation of using managed identities for authorization](/entra/identity/managed-identities-azure-resources/managed-identity-best-practice-recommendations#limitation-of-using-managed-identities-for-authorization)
5858

@@ -67,7 +67,7 @@ Another option that can help for this scenario is using Azure RBAC and roles as
6767
* HTTP 401: Unauthenticated Request - [Troubleshooting steps](rest-error-codes.md#http-401-unauthenticated-request)
6868
* HTTP 403: Insufficient Permissions - [Troubleshooting steps](rest-error-codes.md#http-403-insufficient-permissions)
6969
* HTTP 429: Too Many Requests - [Troubleshooting steps](rest-error-codes.md#http-429-too-many-requests)
70-
* Check if you've delete access permission to key vault: See [Azure RBAC for Key Vault](./rbac-guide.md). If using legacy access policies, see [Assign an access policy - CLI](assign-access-policy-cli.md), [Assign an access policy - PowerShell](assign-access-policy-powershell.md), or [Assign an access policy - Portal](assign-access-policy-portal.md).
70+
* Check if you've delete access permission to key vault: See [Azure RBAC for Key Vault](./rbac-guide.md). If using legacy access policies, see [Assign a Key Vault access policy](assign-access-policy.md).
7171
* If you have problem with authenticate to key vault in code, use [Authentication SDK](https://azure.github.io/azure-sdk/posts/2020-02-25/defaultazurecredentials.html)
7272

7373
### What are the best practices I should implement when key vault is getting throttled?

articles/key-vault/key-vault-insights-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,7 @@ There's a limit of 200 key vaults that can be selected and viewed. Regardless of
148148

149149
We only show subscriptions that contain key vaults, chosen from the selected subscription filter, which are selected in the "Directory + Subscription" in the Azure portal header.
150150

151-
![Screenshot of subscription filter](./media/key-vaults-insights-overview/Subscriptions.png)
151+
![Screenshot of subscription filter](./media/key-vaults-insights-overview/subscription-filter.png)
152152

153153
### I want to make changes or add more visualizations to Key Vault Insights, how do I do so
154154

0 commit comments

Comments
 (0)