Skip to content

Commit

Permalink
more fix
Browse files Browse the repository at this point in the history
  • Loading branch information
v-thepet committed Sep 12, 2023
1 parent d40b5d2 commit fda172d
Show file tree
Hide file tree
Showing 17 changed files with 48 additions and 48 deletions.
2 changes: 1 addition & 1 deletion azps-10.2.0/Az.ApiManagement/Restore-AzApiManagement.md
Original file line number Diff line number Diff line change
Expand Up @@ -92,7 +92,7 @@ PrivateEndpointConnections :
ResourceGroupName : ContosoGroup02
```

This command restores the API Management service using the Managed Identity credentials of APIM which are whitelisted as StorageBlobContributor on the Azure Storage Account `apimbackupmsi`
This command restores the API Management service using the Managed Identity credentials of APIM which are allowlisted as StorageBlobContributor on the Azure Storage Account `apimbackupmsi`

## PARAMETERS

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -24,8 +24,8 @@ Get-AzDataLakeStoreDeletedItem [-Account] <String> [-Filter] <String> [-Count <I
The **Get-AzDataLakeStoreDeletedItem** cmdlet searches the deleted files or folders in Data Lake Store which match the given filter.
It displays the following attributes of the deleted items - OriginalPath, TrashDirPath, Type, CreationTime.
This could be a long running operation as it may have to search through millions of files in trash and could be run as a job.
Caution: Undeleting files is a best effort operation. There are no guarantees that a file can be restored once it is deleted. The use of this API is enabled via whitelisting.
If your ADL account is not whitelisted, then using this api will throw Not implemented exception. For further information and assistance please contact Microsoft support.
Caution: Undeleting files is a best effort operation. There are no guarantees that a file can be restored once it is deleted. The use of this API is enabled via allowlisting.
If your ADL account is not allowlisted, then using this api will throw Not implemented exception. For further information and assistance please contact Microsoft support.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,8 +31,8 @@ Restore-AzDataLakeStoreDeletedItem [-Account] <String> [-DeletedItem] <DataLakeS

## DESCRIPTION
The **Restore-AzDataLakeStoreDeletedItem** cmdlet restores a deleted file or folder in Data Lake Store. Requires the path of deleted item in trash returned by Get-AzDataLakeStoreDeletedItem.
Caution: Undeleting files is a best effort operation. There are no guarantees that a file can be restored once it is deleted. The use of this API is enabled via whitelisting.
If your ADL account is not whitelisted, then using this api will throw Not implemented exception. For further information and assistance please contact Microsoft support.
Caution: Undeleting files is a best effort operation. There are no guarantees that a file can be restored once it is deleted. The use of this API is enabled via allowlisting.
If your ADL account is not allowlisted, then using this api will throw Not implemented exception. For further information and assistance please contact Microsoft support.

## EXAMPLES

Expand Down
4 changes: 2 additions & 2 deletions azps-10.2.0/Az.Network/Az.Network.md
Original file line number Diff line number Diff line change
Expand Up @@ -1073,13 +1073,13 @@ Creates SNAT configuration of PrivateRange and AutoLearnPrivateRanges for the fi
Creates a new SQL Setting for Azure Firewall Policy

### [New-AzFirewallPolicyThreatIntelWhitelist](New-AzFirewallPolicyThreatIntelWhitelist.md)
Create a new threat intelligence whitelist for Azure Firewall Policy
Create a new threat intelligence allowlist for Azure Firewall Policy

### [New-AzFirewallPublicIpAddress](New-AzFirewallPublicIpAddress.md)
This is the placeholder for the Ip Address that can be used for multi pip on azure firewall.

### [New-AzFirewallThreatIntelWhitelist](New-AzFirewallThreatIntelWhitelist.md)
Create a new threat intelligence whitelist for Azure Firewall
Create a new threat intelligence allowlist for Azure Firewall

### [New-AzGatewayCustomBgpIpConfigurationObject](New-AzGatewayCustomBgpIpConfigurationObject.md)
creates a new GatewayCustomBgpIpConfigurationObject.
Expand Down
6 changes: 3 additions & 3 deletions azps-10.2.0/Az.Network/New-AzFirewall.md
Original file line number Diff line number Diff line change
Expand Up @@ -168,7 +168,7 @@ New-AzFirewall -Name "azFw" -ResourceGroupName $rgName -Location centralus -SkuN

This example creates a Firewall attached to virtual hub "vHub". A firewall policy $fp will be attached to the firewall. This firewall allows/denies the traffic based on the rules mentioned in the firewall policy $fp. The virtual hub and the firewall should be in the same regions.

### Example 10: Create a Firewall with threat intelligence whitelist setup
### Example 10: Create a Firewall with threat intelligence allowlist setup
```powershell
$rgName = "resourceGroupName"
$vnet = Get-AzVirtualNetwork -ResourceGroupName $rgName -Name "vnet"
Expand All @@ -178,7 +178,7 @@ $tiWhitelist = New-AzFirewallThreatIntelWhitelist -FQDN @("www.microsoft.com") -
New-AzFirewall -Name "azFw" -ResourceGroupName $rgName -Location centralus -VirtualNetwork $vnet -PublicIpAddress $pip -ThreatIntelWhitelist $tiWhitelist
```

This example creates a Firewall that whitelist "www.microsoft.com" and "8.8.8.8" from threat intelligence
This example creates a Firewall that allowlist "www.microsoft.com" and "8.8.8.8" from threat intelligence

### Example 11: Create a Firewall with customized private range setup
```powershell
Expand Down Expand Up @@ -651,7 +651,7 @@ Accept wildcard characters: False
```
### -ThreatIntelWhitelist
The whitelist for Threat Intelligence
The allowlist for Threat Intelligence
```yaml
Type: Microsoft.Azure.Commands.Network.Models.PSAzureFirewallThreatIntelWhitelist
Expand Down
6 changes: 3 additions & 3 deletions azps-10.2.0/Az.Network/New-AzFirewallPolicy.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,13 +44,13 @@ New-AzFirewallPolicy -Name fp1 -ResourceGroupName TestRg -ThreatIntelMode "Deny"

This example creates an azure firewall policy with a threat intel mode

### Example 3: Create an empty policy with ThreatIntel Whitelist
### Example 3: Create an empty policy with ThreatIntelWhitelist
```powershell
$threatIntelWhitelist = New-AzFirewallPolicyThreatIntelWhitelist -IpAddress 23.46.72.91,192.79.236.79 -FQDN microsoft.com
New-AzFirewallPolicy -Name fp1 -ResourceGroupName TestRg -ThreatIntelWhitelist $threatIntelWhitelist
```

This example creates an azure firewall policy with a threat intel whitelist
This example creates an azure firewall policy with a threat intel allowlist

### Example 4: Create policy with intrusion detection, identity and transport security
```powershell
Expand Down Expand Up @@ -374,7 +374,7 @@ Accept wildcard characters: False
```
### -ThreatIntelWhitelist
The whitelist for Threat Intelligence
The allowlist for Threat Intelligence
```yaml
Type: Microsoft.Azure.Commands.Network.Models.PSAzureFirewallPolicyThreatIntelWhitelist
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ original_content_git_url: https://github.com/Azure/azure-powershell/blob/main/sr
# New-AzFirewallPolicyThreatIntelWhitelist

## SYNOPSIS
Create a new threat intelligence whitelist for Azure Firewall Policy
Create a new threat intelligence allowlist for Azure Firewall Policy

## SYNTAX

Expand All @@ -20,7 +20,7 @@ New-AzFirewallPolicyThreatIntelWhitelist [-FQDN <String[]>] [-IpAddress <String[
```

## DESCRIPTION
The **New-AzFirewallPolicyThreatIntelWhitelist** cmdlet creates a threat intel whitelist object, which can be used when creating or setting an Azure Firewall Policy.
The **New-AzFirewallPolicyThreatIntelWhitelist** cmdlet creates a threat intel allowlist object, which can be used when creating or setting an Azure Firewall Policy.

## EXAMPLES

Expand All @@ -29,7 +29,7 @@ The **New-AzFirewallPolicyThreatIntelWhitelist** cmdlet creates a threat intel w
New-AzFirewallPolicyThreatIntelWhitelist -IpAddress 23.46.72.91,192.79.236.79 -FQDN microsoft.com
```

This example creates a threat intel whitelist containing a FQDN whitelist of one entry and an Ip address whitelist of two entries
This example creates a threat intel allowlist containing a FQDN allowlist of one entry and an Ip address allowlist of two entries

## PARAMETERS

Expand All @@ -49,7 +49,7 @@ Accept wildcard characters: False
```
### -FQDN
The FQDNs of the Threat Intel Whitelist
The FQDNs of the Threat Intel allowlist
```yaml
Type: System.String[]
Expand All @@ -64,7 +64,7 @@ Accept wildcard characters: False
```
### -IpAddress
The IP Addresses of the Threat Intel Whitelist
The IP Addresses of the Threat Intel allowlist
```yaml
Type: System.String[]
Expand Down
10 changes: 5 additions & 5 deletions azps-10.2.0/Az.Network/New-AzFirewallThreatIntelWhitelist.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ original_content_git_url: https://github.com/Azure/azure-powershell/blob/main/sr
# New-AzFirewallThreatIntelWhitelist

## SYNOPSIS
Create a new threat intelligence whitelist for Azure Firewall
Create a new threat intelligence allowlist for Azure Firewall

## SYNTAX

Expand All @@ -20,7 +20,7 @@ New-AzFirewallThreatIntelWhitelist [-FQDN <String[]>] [-IpAddress <String[]>]
```

## DESCRIPTION
The **New-AzFirewallThreatIntelWhitelist** cmdlet creates a threat intel whitelist object, which can be used when creating or setting an Azure Firewall.
The **New-AzFirewallThreatIntelWhitelist** cmdlet creates a threat intel allowlist object, which can be used when creating or setting an Azure Firewall.

## EXAMPLES

Expand All @@ -29,7 +29,7 @@ The **New-AzFirewallThreatIntelWhitelist** cmdlet creates a threat intel whiteli
New-AzFirewallThreatIntelWhitelist -IpAddress @("2.2.2.2", "3.3.3.3") -FQDN @("bing.com", "yammer.com")
```

This example creates a threat intel whitelist containing a FQDN whitelist of two entries and an Ip address whitelist of two entries
This example creates a threat intel allowlist containing a FQDN allowlist of two entries and an Ip address allowlist of two entries

## PARAMETERS

Expand All @@ -49,7 +49,7 @@ Accept wildcard characters: False
```
### -FQDN
The FQDNs of the Threat Intel Whitelist
The FQDNs of the Threat Intel allowlist
```yaml
Type: System.String[]
Expand All @@ -64,7 +64,7 @@ Accept wildcard characters: False
```
### -IpAddress
The IP Addresses of the Threat Intel Whitelist
The IP Addresses of the Threat Intel allowlist
```yaml
Type: System.String[]
Expand Down
4 changes: 2 additions & 2 deletions azps-10.2.0/Az.Network/Set-AzFirewallPolicy.md
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ $threatIntelWhitelist = New-AzFirewallPolicyThreatIntelWhitelist -IpAddress 23.4
Set-AzFirewallPolicy -Name firewallPolicy1 -ResourceGroupName TestRg -Location westcentralus -ThreatIntelWhitelist $threatIntelWhitelist
```

This example sets the firewall policy with the new threat intel whitelist
This example sets the firewall policy with the new threat intel allowlist

### Example 4
```powershell
Expand Down Expand Up @@ -432,7 +432,7 @@ Accept wildcard characters: False
```
### -ThreatIntelWhitelist
The whitelist for Threat Intelligence
The allowlist for Threat Intelligence
```yaml
Type: Microsoft.Azure.Commands.Network.Models.PSAzureFirewallPolicyThreatIntelWhitelist
Expand Down
2 changes: 1 addition & 1 deletion azps-10.3.0/Az.ApiManagement/Restore-AzApiManagement.md
Original file line number Diff line number Diff line change
Expand Up @@ -92,7 +92,7 @@ PrivateEndpointConnections :
ResourceGroupName : ContosoGroup02
```

This command restores the API Management service using the Managed Identity credentials of APIM which are whitelisted as StorageBlobContributor on the Azure Storage Account `apimbackupmsi`
This command restores the API Management service using the Managed Identity credentials of APIM which are allowlisted as StorageBlobContributor on the Azure Storage Account `apimbackupmsi`

## PARAMETERS

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -24,8 +24,8 @@ Get-AzDataLakeStoreDeletedItem [-Account] <String> [-Filter] <String> [-Count <I
The **Get-AzDataLakeStoreDeletedItem** cmdlet searches the deleted files or folders in Data Lake Store which match the given filter.
It displays the following attributes of the deleted items - OriginalPath, TrashDirPath, Type, CreationTime.
This could be a long running operation as it may have to search through millions of files in trash and could be run as a job.
Caution: Undeleting files is a best effort operation. There are no guarantees that a file can be restored once it is deleted. The use of this API is enabled via whitelisting.
If your ADL account is not whitelisted, then using this api will throw Not implemented exception. For further information and assistance please contact Microsoft support.
Caution: Undeleting files is a best effort operation. There are no guarantees that a file can be restored once it is deleted. The use of this API is enabled via allowlisting.
If your ADL account is not allowlisted, then using this api will throw Not implemented exception. For further information and assistance please contact Microsoft support.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,8 +31,8 @@ Restore-AzDataLakeStoreDeletedItem [-Account] <String> [-DeletedItem] <DataLakeS

## DESCRIPTION
The **Restore-AzDataLakeStoreDeletedItem** cmdlet restores a deleted file or folder in Data Lake Store. Requires the path of deleted item in trash returned by Get-AzDataLakeStoreDeletedItem.
Caution: Undeleting files is a best effort operation. There are no guarantees that a file can be restored once it is deleted. The use of this API is enabled via whitelisting.
If your ADL account is not whitelisted, then using this api will throw Not implemented exception. For further information and assistance please contact Microsoft support.
Caution: Undeleting files is a best effort operation. There are no guarantees that a file can be restored once it is deleted. The use of this API is enabled via allowlisting.
If your ADL account is not allowlisted, then using this api will throw Not implemented exception. For further information and assistance please contact Microsoft support.

## EXAMPLES

Expand Down
4 changes: 2 additions & 2 deletions azps-10.3.0/Az.Network/Az.Network.md
Original file line number Diff line number Diff line change
Expand Up @@ -1073,13 +1073,13 @@ Creates SNAT configuration of PrivateRange and AutoLearnPrivateRanges for the fi
Creates a new SQL Setting for Azure Firewall Policy

### [New-AzFirewallPolicyThreatIntelWhitelist](New-AzFirewallPolicyThreatIntelWhitelist.md)
Create a new threat intelligence whitelist for Azure Firewall Policy
Create a new threat intelligence allowlist for Azure Firewall Policy

### [New-AzFirewallPublicIpAddress](New-AzFirewallPublicIpAddress.md)
This is the placeholder for the Ip Address that can be used for multi pip on azure firewall.

### [New-AzFirewallThreatIntelWhitelist](New-AzFirewallThreatIntelWhitelist.md)
Create a new threat intelligence whitelist for Azure Firewall
Create a new threat intelligence allowlist for Azure Firewall

### [New-AzGatewayCustomBgpIpConfigurationObject](New-AzGatewayCustomBgpIpConfigurationObject.md)
creates a new GatewayCustomBgpIpConfigurationObject.
Expand Down
6 changes: 3 additions & 3 deletions azps-10.3.0/Az.Network/New-AzFirewall.md
Original file line number Diff line number Diff line change
Expand Up @@ -168,7 +168,7 @@ New-AzFirewall -Name "azFw" -ResourceGroupName $rgName -Location centralus -SkuN

This example creates a Firewall attached to virtual hub "vHub". A firewall policy $fp will be attached to the firewall. This firewall allows/denies the traffic based on the rules mentioned in the firewall policy $fp. The virtual hub and the firewall should be in the same regions.

### Example 10: Create a Firewall with threat intelligence whitelist setup
### Example 10: Create a Firewall with threat intelligence allowlist setup
```powershell
$rgName = "resourceGroupName"
$vnet = Get-AzVirtualNetwork -ResourceGroupName $rgName -Name "vnet"
Expand All @@ -178,7 +178,7 @@ $tiWhitelist = New-AzFirewallThreatIntelWhitelist -FQDN @("www.microsoft.com") -
New-AzFirewall -Name "azFw" -ResourceGroupName $rgName -Location centralus -VirtualNetwork $vnet -PublicIpAddress $pip -ThreatIntelWhitelist $tiWhitelist
```

This example creates a Firewall that whitelist "www.microsoft.com" and "8.8.8.8" from threat intelligence
This example creates a Firewall that allowlist "www.microsoft.com" and "8.8.8.8" from threat intelligence

### Example 11: Create a Firewall with customized private range setup
```powershell
Expand Down Expand Up @@ -651,7 +651,7 @@ Accept wildcard characters: False
```
### -ThreatIntelWhitelist
The whitelist for Threat Intelligence
The allowlist for Threat Intelligence
```yaml
Type: Microsoft.Azure.Commands.Network.Models.PSAzureFirewallThreatIntelWhitelist
Expand Down
6 changes: 3 additions & 3 deletions azps-10.3.0/Az.Network/New-AzFirewallPolicy.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,13 +44,13 @@ New-AzFirewallPolicy -Name fp1 -ResourceGroupName TestRg -ThreatIntelMode "Deny"

This example creates an azure firewall policy with a threat intel mode

### Example 3: Create an empty policy with ThreatIntel Whitelist
### Example 3: Create an empty policy with ThreatIntelWhitelist
```powershell
$threatIntelWhitelist = New-AzFirewallPolicyThreatIntelWhitelist -IpAddress 23.46.72.91,192.79.236.79 -FQDN microsoft.com
New-AzFirewallPolicy -Name fp1 -ResourceGroupName TestRg -ThreatIntelWhitelist $threatIntelWhitelist
```

This example creates an azure firewall policy with a threat intel whitelist
This example creates an azure firewall policy with a threat intel allowlist

### Example 4: Create policy with intrusion detection, identity and transport security
```powershell
Expand Down Expand Up @@ -374,7 +374,7 @@ Accept wildcard characters: False
```
### -ThreatIntelWhitelist
The whitelist for Threat Intelligence
The allowlist for Threat Intelligence
```yaml
Type: Microsoft.Azure.Commands.Network.Models.PSAzureFirewallPolicyThreatIntelWhitelist
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ original_content_git_url: https://github.com/Azure/azure-powershell/blob/main/sr
# New-AzFirewallPolicyThreatIntelWhitelist

## SYNOPSIS
Create a new threat intelligence whitelist for Azure Firewall Policy
Create a new threat intelligence allowlist for Azure Firewall Policy

## SYNTAX

Expand All @@ -20,7 +20,7 @@ New-AzFirewallPolicyThreatIntelWhitelist [-FQDN <String[]>] [-IpAddress <String[
```

## DESCRIPTION
The **New-AzFirewallPolicyThreatIntelWhitelist** cmdlet creates a threat intel whitelist object, which can be used when creating or setting an Azure Firewall Policy.
The **New-AzFirewallPolicyThreatIntelWhitelist** cmdlet creates a threat intel allowlist object, which can be used when creating or setting an Azure Firewall Policy.

## EXAMPLES

Expand All @@ -29,7 +29,7 @@ The **New-AzFirewallPolicyThreatIntelWhitelist** cmdlet creates a threat intel w
New-AzFirewallPolicyThreatIntelWhitelist -IpAddress 23.46.72.91,192.79.236.79 -FQDN microsoft.com
```

This example creates a threat intel whitelist containing a FQDN whitelist of one entry and an Ip address whitelist of two entries
This example creates a threat intel allowlist containing a FQDN allowlist of one entry and an Ip address allowlist of two entries

## PARAMETERS

Expand All @@ -49,7 +49,7 @@ Accept wildcard characters: False
```
### -FQDN
The FQDNs of the Threat Intel Whitelist
The FQDNs of the Threat Intel allowlist
```yaml
Type: System.String[]
Expand All @@ -64,7 +64,7 @@ Accept wildcard characters: False
```
### -IpAddress
The IP Addresses of the Threat Intel Whitelist
The IP Addresses of the Threat Intel allowlist
```yaml
Type: System.String[]
Expand Down
10 changes: 5 additions & 5 deletions azps-10.3.0/Az.Network/New-AzFirewallThreatIntelWhitelist.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ original_content_git_url: https://github.com/Azure/azure-powershell/blob/main/sr
# New-AzFirewallThreatIntelWhitelist

## SYNOPSIS
Create a new threat intelligence whitelist for Azure Firewall
Create a new threat intelligence allowlist for Azure Firewall

## SYNTAX

Expand All @@ -20,7 +20,7 @@ New-AzFirewallThreatIntelWhitelist [-FQDN <String[]>] [-IpAddress <String[]>]
```

## DESCRIPTION
The **New-AzFirewallThreatIntelWhitelist** cmdlet creates a threat intel whitelist object, which can be used when creating or setting an Azure Firewall.
The **New-AzFirewallThreatIntelWhitelist** cmdlet creates a threat intel allowlist object, which can be used when creating or setting an Azure Firewall.

## EXAMPLES

Expand All @@ -29,7 +29,7 @@ The **New-AzFirewallThreatIntelWhitelist** cmdlet creates a threat intel whiteli
New-AzFirewallThreatIntelWhitelist -IpAddress @("2.2.2.2", "3.3.3.3") -FQDN @("bing.com", "yammer.com")
```

This example creates a threat intel whitelist containing a FQDN whitelist of two entries and an Ip address whitelist of two entries
This example creates a threat intel allowlist containing a FQDN allowlist of two entries and an Ip address allowlist of two entries

## PARAMETERS

Expand All @@ -49,7 +49,7 @@ Accept wildcard characters: False
```
### -FQDN
The FQDNs of the Threat Intel Whitelist
The FQDNs of the Threat Intel allowlist
```yaml
Type: System.String[]
Expand All @@ -64,7 +64,7 @@ Accept wildcard characters: False
```
### -IpAddress
The IP Addresses of the Threat Intel Whitelist
The IP Addresses of the Threat Intel allowlist
```yaml
Type: System.String[]
Expand Down

0 comments on commit fda172d

Please sign in to comment.