Skip to content

Commit 9d20a1b

Browse files
Merge pull request #2565 from MicrosoftDocs/main
Auto Publish – main to live - 2026-02-26 18:06 UTC
2 parents f5c96f4 + ebd869f commit 9d20a1b

2 files changed

Lines changed: 11 additions & 11 deletions

File tree

articles/defender-for-cloud/anti-malware.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ Based on the alerts, you receive and review, you might need to adjust the rules
114114
115115
Effective anti-malware detection relies on your active role in configuring, monitoring, and adjusting policies for your environment.
116116
117-
You can arrange rules by priority by selecting the up or down arrow. The rule with the highest priority (the lowest number) runs first. If a rule matches, the rule action runs and the evaluation ends. If no rule matches, the system evaluates the next rule. If no rule matches, the system applies the default rules.
117+
You can arrange rules by priority by selecting the up or down arrow. The rule with the highest priority (the lowest number) runs first. If a rule matches, the rule action runs and the evaluation ends. If no match, the system evaluates the next rule. If no rule matches, the system applies the default rules.
118118
119119
You can manage each rule by using the toolbar controls.
120120

articles/key-vault/general/access-control-default.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -15,16 +15,16 @@ ms.custom: devx-track-azurepowershell, devx-track-azurecli, sfi-image-nochange
1515

1616
# Prepare for Key Vault API version 2026-02-01: Azure RBAC as default access control
1717

18-
> [!WARNING]
19-
> Starting February 2026, Azure Key Vault API version 2026-02-01 establishes Azure RBAC as the default access control model. All API versions before 2026-02-01 retire on February 27, 2027.
18+
> [!IMPORTANT]
19+
> Starting February 2026, Azure Key Vault API version 2026-02-01 changes the default for **new vaults** to Azure RBAC. Existing vaults are unaffected. All API versions before 2026-02-01 retire on February 27, 2027. **Access policies remain fully supported.**
2020
>
21-
> This change breaks compatibility. Before February 27, 2027, you **must either**:
22-
> - **Azure RBAC (recommended)**: [Set new and existing vaults to Azure RBAC](#step-4-migrate-to-azure-rbac-recommended) and adopt API version 2026-02-01 or later.
23-
> - **Access policies (legacy)**: [Set new vaults to use access policies](#step-5-continue-using-access-policies) and adopt API version 2026-02-01 or later.
21+
> Before February 27, 2027, adopt API version 2026-02-01 or later:
22+
> - **Azure RBAC (recommended)**: [Migrate to Azure RBAC](#step-4-migrate-to-azure-rbac-recommended) for improved security.
23+
> - **Access policies (legacy)**: [Continue using access policies](#step-5-use-access-policies-for-new-vaults) by setting `enableRbacAuthorization` to `false` when creating new vaults.
2424
>
2525
> **Azure Cloud Shell users**: Cloud Shell always uses the latest API version, so you'll automatically start using API version 2026-02-01 as soon as it releases. Follow the steps in this article before the release of API version 2026-02-01 to avoid disruption.
2626
27-
Azure Key Vault is implementing an important security enhancement in API version 2026-02-01, releasing in February 2026. To help protect your key vaults and reduce security risks, **the new Key Vault API version establishes Azure RBAC as the default access control model**, consistent with the Azure portal experience.
27+
Azure Key Vault API version 2026-02-01, releasing in February 2026, changes the default access control model for new vaults to Azure RBAC, consistent with the Azure portal experience. Both Azure RBAC and access policies remain fully supported options.
2828

2929
The ramifications of this change are as follows:
3030

@@ -175,18 +175,18 @@ If your key vaults already use Azure RBAC as their access control model, update
175175
If your key vaults use access policies (`enableRbacAuthorization` = `false`), decide if you want to migrate to role-based access (recommended) or continue using access policies. For more information on access control models, see [Use Azure RBAC for managing access to Key Vault](rbac-guide.md) and [Azure Key Vault best practices](secure-key-vault.md).
176176

177177
**Choose your path:**
178-
- **Recommended**: Go to [Step 4: Migrate to Azure RBAC](#step-4-migrate-to-azure-rbac-recommended)
179-
- **Legacy**: Go to [Step 5: Continue using access policies](#step-5-continue-using-access-policies)
178+
- **Azure RBAC (recommended)**: Go to [Step 4: Migrate to Azure RBAC](#step-4-migrate-to-azure-rbac-recommended)
179+
- **Access policies (legacy)**: Go to [Step 5: Use access policies for new vaults](#step-5-use-access-policies-for-new-vaults)
180180

181181
## Step 4: Migrate to Azure RBAC (recommended)
182182

183183
Use this opportunity to increase your security posture by migrating from vault access policy to Azure RBAC for managing access. For detailed migration guidance, see [Migrate from vault access policy to an Azure role-based access control permission model](rbac-migration.md).
184184

185185
Update all Key Vault ARM, BICEP, Terraform templates, and REST API calls to use API version 2026-02-01 or later.
186186

187-
## Step 5: Continue using access policies
187+
## Step 5: Use access policies for new vaults
188188

189-
To continue using access policies, follow the instructions in this section.
189+
Access policies remain a fully supported access control model. To continue using access policies for new vaults, follow the instructions in this section.
190190

191191
Choose one of the following methods based on your scenario:
192192
- [Using ARM, BICEP, Terraform templates](#using-arm-bicep-terraform-templates)

0 commit comments

Comments
 (0)