Skip to content

Commit cdae242

Browse files
Merge pull request #308793 from MicrosoftDocs/main
Auto Publish – main to live - 2025-11-26 18:00 UTC
2 parents 9987bcf + 905edc7 commit cdae242

31 files changed

+94
-55
lines changed

articles/api-management/tutorials/link-api-center.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ In this tutorial, you:
3030

3131
Before you start, make sure you meet the following requirements.
3232

33-
- An Azure account with an active subscription is required. If you don't already have one, you can [create an account for free](https://azure.microsoft.com/pricing/purchase-options/azure-account).
33+
- An Azure account with an active subscription is required. If you don't already have one, you can [create an account for free](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn).
3434
- An existing API Management service in the subscription where you want to manage APIs
3535
- Contributor (or Owner) permissions on the API Management resource and permission to create resources in a resource group
3636

articles/app-service/environment/app-service-app-service-environment-custom-settings.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: seligj95
55

66
ms.assetid: 1d1d85f3-6cc6-4d57-ae1a-5b37c642d812
77
ms.topic: tutorial
8-
ms.date: 08/20/2025
8+
ms.date: 11/26/2025
99
ms.author: jordanselig
1010
ms.custom: mvc, devx-track-arm-template
1111
ms.service: azure-app-service
@@ -89,6 +89,9 @@ You can also disable TLS 1.0 and TLS 1.1 using the Azure portal by going to the
8989

9090
App Service Environment supports changing the cipher suite from the default. The default set of ciphers is the same set that is used in the multitenant App Service. Changing the cipher suite is only possible with App Service Environment, the single-tenant offering, not the multitenant offering, because changing it affects the entire App Service deployment. There are two cipher suites that are required for an App Service Environment: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 and TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256. Additionally, you should include the following cipher suites, which are required for TLS 1.3: TLS_AES_256_GCM_SHA384 and TLS_AES_128_GCM_SHA256.
9191

92+
> [!IMPORTANT]
93+
> The `FrontEndSSLCipherSuiteOrder` App Service Environment cluster setting isn't compatible with the app-level `minTlsCipherSuite` setting. If you configure the cipher suite order at the App Service Environment level using `FrontEndSSLCipherSuiteOrder`, don't also configure the minimum TLS cipher suite at the individual app level. You must use one or the other, not both. Configuring both settings can cause SSL errors and rejected requests.
94+
9295
To configure your App Service Environment to use just the ciphers that it requires, modify the **clusterSettings** as shown in the following sample. **Ensure that the TLS 1.3 ciphers are included at the beginning of the list**.
9396

9497
```json

articles/application-gateway/tcp-tls-proxy-overview.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: mbender-ms
66
ms.service: azure-application-gateway
77
ms.topic: concept-article
8-
ms.date: 11/17/2025
8+
ms.date: 11/26/2025
99
ms.author: mbender
1010
# Customer intent: As a network architect, I want to implement TCP/TLS proxy capabilities on an application gateway, so that I can efficiently manage both HTTP and non-HTTP workloads while ensuring secure connections to backend servers.
1111
---
@@ -63,7 +63,6 @@ Process flow:
6363
- A WAF v2 SKU gateway allows the creation of TLS or TCP listeners and backends to support HTTP and non-HTTP traffic through the same resource. However, it does not inspect traffic on TLS and TCP listeners for exploits and vulnerabilities.
6464
- The default [draining timeout](configuration-http-settings.md#connection-draining) value for backend servers is 30 seconds. At present, a user-defined draining value is not supported.
6565
- A configuration update (PUT) on Application Gateway ends the active connections after the default draining timeout period.
66-
- Client IP preservation is currently not supported.
6766
- Application Gateway Ingress Controller (AGIC) is not supported and works only with L7 proxy through HTTP(S) listeners.
6867

6968
## Next steps

articles/azure-maps/migrate-bing-maps-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ Developers can get migration support through the [Azure Maps Q&A] or through one
165165
[Authentication with Azure Maps]: azure-maps-authentication.md
166166
[Authentication best practices]: authentication-best-practices.md
167167
[Autosuggest]: /bingmaps/rest-services/autosuggest
168-
[Azure Licensing]: https://azure.microsoft.com/pricing/purchase-options/azure-account
168+
[Azure Licensing]: https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn
169169
[Azure Maps account]: how-to-manage-account-keys.md#create-a-new-account
170170
[Azure Maps blog]: https://aka.ms/AzureMapsTechBlog
171171
[Azure Maps code samples]: https://samples.azuremaps.com/

articles/backup/backup-azure-monitor-alerts-notification.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Configure and manage Azure Monitor based alert notifications for Azure Backup
33
description: Learn how to configure Azure Monitor alert notifications.
44
ms.topic: how-to
5-
ms.date: 12/30/2024
5+
ms.date: 11/26/2025
66
ms.service: azure-backup
77
author: AbhishekMallick-MS
88
ms.author: v-mallicka
@@ -18,7 +18,7 @@ This article describes how to configure and manage Azure Monitor based alert not
1818

1919
To configure notifications for Azure Monitor alerts, create an [alert processing rule](/azure/azure-monitor/alerts/alerts-action-rules). To create an alert processing rule (earlier called *action rule*) to send email notifications to a given email address, follow these steps. Also, follow these steps to route these alerts to other notification channels, such as ITSM, webhook, logic app, and so on.
2020

21-
1. In the [Azure portal](https://portal.azure.com/), go to **Business Continuity Center** > **Monitoring + Reporting** > **Alerts** to create or view alert processing rules. [Learn more](/azure/azure-monitor/alerts/alerts-processing-rules?tabs=portal&branch=main#configure-an-alert-processing-rule).
21+
1. In the [Azure portal](https://portal.azure.com/), go to **Resiliency** > **Monitoring + Reporting** > **Alerts** to create or view alert processing rules. [Learn more](/azure/azure-monitor/alerts/alerts-processing-rules?tabs=portal&branch=main#configure-an-alert-processing-rule).
2222

2323
1. Send alerts to the notification channel of your choice using action groups as part of the alert processing rules. Learn [how to create action groups](/azure/azure-monitor/alerts/action-groups#create-an-action-group-in-the-azure-portal).
2424

@@ -33,10 +33,10 @@ Learn more [about suppression of notifications during planned maintenance
3333

3434
To create a suppression alert processing rule, follow these steps:
3535

36-
1. Go to **Business Continuity Center** > **Monitoring + Reporting** > **Alerts**.
36+
1. Go to **Resiliency** > **Monitoring + Reporting** > **Alerts**.
3737
1. Select **Manage alerts** > **Manage alert processing rules**.
3838

39-
:::image type="content" source="./media/move-to-azure-monitor-alerts/alert-processing-rule-blade-inline.png" alt-text="Screenshot showing alert processing rules blade in portal." lightbox="./media/move-to-azure-monitor-alerts/alert-processing-rule-blade-expanded.png":::
39+
:::image type="content" source="./media/move-to-azure-monitor-alerts/alert-processing-rule-blade.png" alt-text="Screenshot showing alert processing rules blade in portal." lightbox="./media/move-to-azure-monitor-alerts/alert-processing-rule-blade.png":::
4040

4141
1. Select **Create**.
4242

Binary file not shown.
Binary file not shown.
93.6 KB
Loading
-10.1 KB
Loading
-10.6 KB
Loading

0 commit comments

Comments
 (0)