Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit ec5f864

Browse files
committedJul 30, 2020
Edited descriptions for length.
1 parent 531a19e commit ec5f864

25 files changed

+26
-26
lines changed
 

‎articles/azure-government/compliance/compliance-tic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Trusted Internet Connections guidance for Azure
3-
description: Trusted Internet Connections guidance for Azure and SaaS services
3+
description: Learn about Trusted Internet Connections (TIC) guidance for Azure and software-as-a-service (SaaS) services.
44
services: azure-government
55
author: femila
66

‎articles/azure-government/compliance/secure-azure-computing-architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33

44
# Mandatory fields.
55
title: Secure Azure Computing Architecture
6-
description: This reference architecture for an enterprise-level DMZ architecture uses network virtual appliances and other tools. This architecture was designed to meet the Department of Defense's Secure Cloud Computing Architecture Functional Requirements. It also can be used for any organization. This reference includes two automated options that use Citrix or F5 appliances.
6+
description: Learn about the Secure Azure Computing Architecture (SACA). Using SACA allows U.S. DoD and civilian customers to comply with the SCCA FRD.
77
author: jahender
88
ms.author: jahender
99
ms.date: 4/9/2019

‎articles/azure-sql/database/security-best-practice.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Playbook for addressing common security requirements
33
titleSuffix: Azure SQL Database & Azure SQL Managed Instance
4-
description: This article provides common security requirements and best practices in Azure SQL Database and Azure SQL Managed Instance
4+
description: This article provides common security requirements and best practices in Azure SQL Database and Azure SQL Managed Instance.
55
ms.service: sql-db-mi
66
ms.subservice: security
77
ms.custom: sqldbrb=2

‎articles/security/develop/security-code-analysis-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Microsoft Security Code Analysis documentation FAQ
3-
description: This article contains an FAQ about the Microsoft Security Code Analysis extension
3+
description: Learn about the Microsoft Security Code Analysis extension by reviewing frequently asked questions (FAQs).
44
author: sukhans
55
manager: sukhans
66
ms.author: terrylan

‎articles/security/develop/threat-modeling-tool-auditing-and-logging.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Auditing and Logging - Microsoft Threat Modeling Tool - Azure | Microsoft Docs
3-
description: mitigations for threats exposed in the Threat Modeling Tool
3+
description: Learn about auditing and logging mitigation in the Threat Modeling Tool. See a list of potential threats and mitigation instructions.
44
services: security
55
documentationcenter: na
66
author: jegeib

‎articles/security/develop/threat-modeling-tool-authorization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Authorization - Microsoft Threat Modeling Tool - Azure | Microsoft Docs
3-
description: mitigations for threats exposed in the Threat Modeling Tool
3+
description: Learn about authorization mitigation in the Threat Modeling Tool. See a list of potential threats and mitigation instructions.
44
services: security
55
documentationcenter: na
66
author: jegeib

‎articles/security/develop/threat-modeling-tool-communication-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Communication security for the Microsoft Threat Modeling Tool
33
titleSuffix: Azure
4-
description: mitigations for threats exposed in the Threat Modeling Tool
4+
description: Learn about mitigation for communication security threats exposed in the Threat Modeling Tool. See specific mitigation details and code examples.
55
services: security
66
documentationcenter: na
77
author: jegeib

‎articles/security/develop/threat-modeling-tool-cryptography.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Cryptography - Microsoft Threat Modeling Tool - Azure | Microsoft Docs
3-
description: mitigations for threats exposed in the Threat Modeling Tool
3+
description: Learn about cryptography mitigation for threats exposed in the Threat Modeling Tool. See a list of potential threats and mitigation instructions.
44
services: security
55
documentationcenter: na
66
author: jegeib

‎articles/security/develop/threat-modeling-tool-getting-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Getting Started - Microsoft Threat Modeling Tool - Azure | Microsoft Docs
3-
description: This is a deeper overview highlighting the Threat Modeling Tool in action.
3+
description: Learn how to get started using the Threat Modeling Tool. Create a diagram, identify threats, mitigate threats, and validate each mitigation.
44
services: security
55
documentationcenter: na
66
author: jegeib

‎articles/security/develop/threat-modeling-tool-releases-71509112.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Threat Modeling Tool release 9/12/2018
33
titleSuffix: Azure
4-
description: Documenting the release notes for the threat modeling tool
4+
description: Read the release notes for the Microsoft Threat Modeling Tool released on 9/12/2018. The notes include feature changes and bug fixes.
55
author: jegeib
66
ms.author: jegeib
77
ms.service: security

‎articles/security/develop/threat-modeling-tool-releases-71510231.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Threat Modeling Tool release 11/1/2018
33
titleSuffix: Azure
4-
description: Documenting the release notes for the threat modeling tool
4+
description: Read the release notes for the threat modeling tool update released on 11/1/2018. This release does not contain any new functionality or fixes.
55
author: jegeib
66
ms.author: jegeib
77
ms.service: security

‎articles/security/develop/threat-modeling-tool-releases-71607021.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Threat Modeling Tool release 7/2/2019
33
titleSuffix: Azure
4-
description: Documenting the release notes for the threat modeling tool
4+
description: Read the release notes for the threat modeling tool update released on 7/2/2019. The notes include accessibility improvements and bug fixes.
55
author: jegeib
66
ms.author: jegeib
77
ms.service: security

‎articles/security/develop/threat-modeling-tool-releases.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Threat Modeling Tool release notes
33
titleSuffix: Azure
4-
description: Documenting the release notes for the threat modeling tool
4+
description: Read the release notes for every update of the Microsoft Threat Modeling Tool. See a download link and system requirements.
55
services: security
66
documentationcenter: na
77
author: jegeib

‎articles/security/develop/threat-modeling-tool-session-management.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Session Management - Microsoft Threat Modeling Tool - Azure | Microsoft Docs
3-
description: mitigations for threats exposed in the Threat Modeling Tool
3+
description: Learn about session management mitigation for threats exposed in the Threat Modeling Tool. See specific mitigation details and code examples.
44
services: security
55
documentationcenter: na
66
author: jegeib
@@ -23,7 +23,7 @@ ms.custom: has-adal-ref, devx-track-javascript
2323
| Product/Service | Article |
2424
| --------------- | ------- |
2525
| **Azure AD** | <ul><li>[Implement proper logout using ADAL methods when using Azure AD](#logout-adal)</li></ul> |
26-
| IoT Device | <ul><li>[Use finite lifetimes for generated SaS tokens](#finite-tokens)</li></ul> |
26+
| **IoT Device** | <ul><li>[Use finite lifetimes for generated SaS tokens](#finite-tokens)</li></ul> |
2727
| **Azure Document DB** | <ul><li>[Use minimum token lifetimes for generated Resource tokens](#resource-tokens)</li></ul> |
2828
| **ADFS** | <ul><li>[Implement proper logout using WsFederation methods when using ADFS](#wsfederation-logout)</li></ul> |
2929
| **Identity Server** | <ul><li>[Implement proper logout when using Identity Server](#proper-logout)</li></ul> |

‎articles/security/fundamentals/antimalware.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Microsoft Antimalware for Azure | Microsoft Docs
3-
description: This article provides an architectural overview of Microsoft Antimalware for Azure, including supported scenarios and configurations for enabling, configuring, and deploying protection for Azure Cloud Services and Virtual Machines. We will cover basic configuration, management, and monitoring functionality accessible through Microsoft Azure service management API’s, PowerShell scripts, the Azure portal and Visual Studio.
3+
description: Learn about Microsoft Antimalware for Azure Cloud Services and Virtual Machines. See information about topics like architecture and deployment scenarios.
44
services: security
55
documentationcenter: na
66
author: terrylanfear

‎articles/security/fundamentals/azure-disk-encryption-vms-vmss.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Azure Disk Encryption for virtual machines and virtual machine scale sets
3-
description: This article provides an overview of Azure Disk Encryption
3+
description: Learn about Azure Disk encryption for virtual machines (VMs) and VM scale sets. Azure Disk encryption works for both Linux an Windows VMs.
44
author: msmbaldwin
55
ms.service: security
66
ms.topic: article

‎articles/security/fundamentals/encryption-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Azure encryption overview | Microsoft Docs
3-
description: Learn about various encryption options in Azure
3+
description: Learn about encryption options in Azure. See information for encryption at rest, encryption in flight, and key management with Azure Key Vault.
44
services: security
55
author: msmbaldwin
66

‎articles/security/fundamentals/identity-management-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Azure security features that help with identity management | Microsoft Docs
3-
description: " This article provides an overview of the core Azure security features that help with identity management. Microsoft identity and access management solutions help IT protect access to applications and resources across the corporate datacenter and into the cloud, enabling additional levels of validation, such as Multi-Factor Authentication and Conditional Access policies. "
3+
description: Learn about the core Azure security features that help with identity management. See information about topics like single sign-on and reverse proxy.
44
services: security
55
documentationcenter: na
66
author: TerryLanfear

‎articles/security/fundamentals/infrastructure-monitoring.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Azure infrastructure monitoring
3-
description: This article discusses monitoring of the Azure production network.
3+
description: Learn about infrastructure monitoring aspects of the Azure production network, such as vulnerability scanning.
44
services: security
55
documentationcenter: na
66
author: TerryLanfear

‎articles/security/fundamentals/operational-checklist.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22

33
title: Azure operational security checklist| Microsoft Docs
4-
description: This article provides a set of checklist for Azure operational security.
4+
description: Review this checklist to help your enterprise think through Azure operational security considerations.
55
services: security
66
documentationcenter: na
77
author: unifycloud

‎articles/security/fundamentals/operational-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22

33
title: Azure operational security overview| Microsoft Docs
4-
description: This article provides an overview of Azure operational security.
4+
description: Learn about Azure operational security in this overview. Operational security refers to asset protection services, controls, and features.
55
services: security
66
documentationcenter: na
77
author: unifycloud

‎articles/security/fundamentals/operational-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Azure Operational Security | Microsoft Docs
3-
description: Learn about Microsoft Azure Monitor logs, its services, and how it works.
3+
description: Introduce yourself to Microsoft Azure Monitor logs, its services, and how it works by reading this overview.
44
services: security
55
documentationcenter: na
66
author: UnifyCloud

‎articles/security/fundamentals/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Introduction to Azure security | Microsoft Docs
3-
description: Learn about Azure Security, its services, and how it works.
3+
description: Introduce yourself to Azure Security, its various services, and how it works by reading this overview.
44
services: security
55
documentationcenter: na
66
author: UnifyCloud

‎articles/security/fundamentals/threat-detection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Azure advanced threat detection | Microsoft Docs
3-
description: Learn about Azure AD Identity Protection and its capabilities.
3+
description: Learn about built-in advanced threat detection functionality for Azure, such as the Azure AD Identity Protection service.
44
services: security
55
documentationcenter: na
66
author: UnifyCloud

‎articles/security/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ brand: azure
66

77
metadata:
88
title: Azure security documentation
9-
description: Security is integrated into every aspect of Azure. Azure offers you unique security advantages derived from global security intelligence, sophisticated customer-facing controls, and a secure hardened infrastructure. This powerful combination helps protect your applications and data, support your compliance efforts, and provide cost-effective security for organizations of all sizes.
9+
description: Learn about security in Azure. See information about security fundamentals, best practices and patterns, and the Azure Security Center.
1010
services: security
1111
ms.service: security
1212
ms.subservice: na

0 commit comments

Comments
 (0)
Please sign in to comment.