You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/confidential-ledger/data-organization.md
+12Lines changed: 12 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -103,6 +103,18 @@ for entry in list_result:
103
103
print(f"Contents: {entry['contents']}")
104
104
```
105
105
106
+
## Sample Scenarios
107
+
108
+
The following scenarios can help you decide when to use collection IDs versus Tags.
109
+
110
+
| Scenario | Recommended approach | Why |
111
+
|--|--|--|
112
+
| You write general records and mostly read by transaction ID or latest entry. | Use the default collection ID (`subledger-0`). | This approach keeps data organization simple and avoids managing many collection IDs. |
113
+
| You need strict logical separation of data sets, such as tenant-specific or workload-specific isolation. | Use dedicated collection IDs for each logical group. | Group-level collection IDs make it easier to isolate and list records by boundary. |
114
+
| You need query-oriented lookups at a finer granularity, including per-entry categorization. | Prefer tags within a shared collection before creating a unique collection ID per entry. | You can achieve similar query outcomes without creating and managing a unique collection ID for every entry. |
115
+
116
+
If your main goal is query flexibility, start with tags and add more collection IDs only when clear isolation boundaries are required.
Copy file name to clipboardExpand all lines: articles/confidential-ledger/overview.md
+15Lines changed: 15 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,6 +82,21 @@ Confidential ledger nodes are deployed across Azure availability zones to provid
82
82
83
83
Data is automatically replicated to Azure regional pairs for disaster recovery. For information about data residency considerations, see [Data residency for Azure confidential ledger](data-residency.md).
84
84
85
+
### Limitations
86
+
87
+
| Resource | Limit |
88
+
|--|--|
89
+
| Number of ledgers per subscription | 2 standard SKU ledgers |
90
+
| Number of collection IDs per ledger | 50,000 |
91
+
| Create entry | 1800 requests per second, 1800 transactions per second |
92
+
| Get current entry | 3600 requests per second |
93
+
| Get entry | 2500 requests per second |
94
+
| Get receipt | 2400 requests per second |
95
+
| List entries | 3300 requests per second |
96
+
97
+
> [!NOTE]
98
+
> To request higher limits or discuss limitations, reach out to the Azure Confidential Ledger team.
99
+
85
100
## Constraints
86
101
87
102
- After a confidential ledger instance is created, you can't change the ledger type (private or public).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-storage-configure-malware-scan.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,7 +62,7 @@ If you haven't enabled soft delete for blobs on the storage account, Defender fo
62
62
63
63
- If you turn on Versioning for Blobs on your storage account, see [Manage and restore soft delete for blobs](/azure/storage/blobs/soft-delete-blob-manage) to learn how to restore a soft deleted blob.
64
64
65
-
-For the *Soft Delete Malicious Blobs* feature to work on a Storage Account with Versioning turned on, you also need to enable the use of blob index tags for storing scan results. Ensure the parameter *Store scan results as blob index tags* is checked.
65
+
-Blobs that are detected as malicious and soft deleted will always be marked with index tags. If you have selected to not store scan results in index tags, these tags will be removed upon restoring of the soft deleted blob.
66
66
67
67
- The retention period defaults to seven days if you turn on the soft delete malicious blobs feature, but you can change it (range: 1–365 days). You can change the default retention period in your storage account settings.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-sensor-change-log.md
+15-12Lines changed: 15 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,11 +17,25 @@ To see the version of the sensor run:
17
17
18
18
`kubectl get -n kube-system daemonsets/microsoft-defender-collector-ds -o jsonpath='{.metadata.labels.app\.kubernetes\.io/version}'`
19
19
20
+
21
+
## Defender for Containers – Sensor Support Policy
22
+
23
+
The support policy here applies to all Helm-based and multicloud installations. For scenarios where the sensor is deployed as part of AKS, please refer to: [Supported Kubernetes versions in Azure Kubernetes Service (AKS) - Azure Kubernetes Service | Microsoft Learn](/azure/aks/supported-kubernetes-versions?tabs=azure-cli)
24
+
25
+
|Version|Preview Date|GA Date|End of support|
26
+
| -------- | -------- | -------- | -------- |
27
+
|0.8||Feb 2025|Feb 2027|
28
+
|0.9|July 2025|Apr 2026|Apr 2027|
29
+
|0.10|Feb 2026|Apr 2026|Apr 2027|
30
+
|0.11|Apr 2026|Jul 2026|Jul 2027|
31
+
32
+
Each stable (GA) version is supported for 12 months from its GA release date. After the 12-month window ends, the version is no longer supported. Customers should upgrade to the latest stable or Public release to maintain support and access new capabilities.
33
+
20
34
## Sensor versions available per release
21
35
22
36
### Sensor v0.10 (deployed by Helm or Arc for K8s in Preview mode)
23
37
24
-
**Sensor v0.10.28 — Preview**
38
+
**Sensor v0.10.3 — Preview**
25
39
26
40
-**Released:** March 2026
27
41
@@ -195,18 +209,7 @@ To see the version of the sensor run:
195
209
- Better memory efficiency and reduced CPU consumption
196
210
- Bug fixes and security enhancements
197
211
198
-
## Defender for Containers – Sensor Support Policy
199
-
200
-
The support policy here applies to all Helm-based and multicloud installations. For scenarios where the sensor is deployed as part of AKS, please refer to: [Supported Kubernetes versions in Azure Kubernetes Service (AKS) - Azure Kubernetes Service | Microsoft Learn](/azure/aks/supported-kubernetes-versions?tabs=azure-cli)
201
-
202
-
|Version|Preview Date|GA Date|End of support|
203
-
| -------- | -------- | -------- | -------- |
204
-
|0.8||Feb 2025|Feb 2027|
205
-
|0.9|July 2025|Apr 2026|Apr 2027|
206
-
|0.10|Feb 2026|Apr 2026|Apr 2027|
207
-
|0.11|Apr 2026|Jul 2026|Jul 2027|
208
212
209
-
Each stable (GA) version is supported for 12 months from its GA release date. After the 12-month window ends, the version is no longer supported. Customers should upgrade to the latest stable or Public release to maintain support and access new capabilities.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/file-integrity-monitoring-enable-defender-endpoint.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to enable File Integrity Monitoring when you collect data
4
4
author: Elazark
5
5
ms.author: elkrieger
6
6
ms.topic: how-to
7
-
ms.date: 06/25/2025
7
+
ms.date: 03/22/2026
8
8
ms.custom: sfi-image-nochange
9
9
#customer intent: As a security administrator, I want to enable File Integrity Monitoring so that I can detect unauthorized changes to critical files.
10
10
---
@@ -18,9 +18,9 @@ After you enable Defender for Servers Plan 2, follow the instructions in this ar
18
18
> [!NOTE]
19
19
>
20
20
> - If you use a previous version of File Integrity Monitoring with the Log Analytics agent (Microsoft Monitoring agent (MMA)) or the Azure Monitor agent (AMA), you can [migrate to the new File Integrity Monitoring experience](migrate-file-integrity-monitoring.md).
21
-
> -From June 2025 onwards, File Integrity Monitoring powered by Microsoft Defender for Endpoint requires a minimum version. [Update the agent](#verify-defender-for-endpoint-client-version) as needed.
22
-
> - Windows: 10.8760 or later.
23
-
> - Linux: 30.124082 or later.
21
+
> - File Integrity Monitoring powered by Microsoft Defender for Endpoint requires a minimum agent version. [Update the agent](#verify-defender-for-endpoint-client-version) as needed.
22
+
> -**Windows (legacy machines/downlevel clients)**: Defender for Servers Windows client (MDE agent) version 10.8799 or later.
0 commit comments