Existing Secrets can be used in Proxy Scanner configurations for Kubernetes Helm Chart deployments
Container Vulnerability Policies are now GA
Azure Resource Management
Audit Log Updates
Who, When, and What operations.
Any create, update, modify, or delete activity.
Any create, enable, disable, modify, delete activity to resource groups.
Filter the visible accounts on the Cloud Compliance page