Skip to content

Commit 023502a

Browse files
author
David Curwin
committed
Fix formatting
1 parent 4e06105 commit 023502a

File tree

4 files changed

+54
-54
lines changed

4 files changed

+54
-54
lines changed

articles/defender-for-cloud/adaptive-network-hardening.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -57,9 +57,9 @@ For example, let's say the existing NSG rule is to allow traffic from 140.20.30.
5757

5858
1. Optionally, edit the rules:
5959

60-
- [Modify a rule](#modify-rule)
61-
- [Delete a rule](#delete-rule)
62-
- [Add a rule](#add-rule)
60+
- [Modify a rule](#modify-a-rule)
61+
- [Delete a rule](#delete-a-rule)
62+
- [Add a rule](#add-a-new-rule)
6363

6464
1. Select the rules that you want to apply on the NSG, and select **Enforce**.
6565

@@ -71,7 +71,7 @@ For example, let's say the existing NSG rule is to allow traffic from 140.20.30.
7171
> [!NOTE]
7272
> The enforced rules are added to the NSG(s) protecting the VM. (A VM could be protected by an NSG that is associated to its NIC, or the subnet in which the VM resides, or both)
7373
74-
## Modify a rule <a name ="modify-rule"> </a>
74+
## Modify a rule
7575

7676
You might want to modify the parameters of a rule that has been recommended. For example, you might want to change the recommended IP ranges.
7777

@@ -83,7 +83,7 @@ Some important guidelines for modifying an adaptive network hardening rule:
8383

8484
Creating and modifying "deny" rules is done directly on the NSG. For more information, see [Create, change, or delete a network security group](../virtual-network/manage-network-security-group.md).
8585

86-
- A **Deny all traffic** rule is the only type of "deny" rule that would be listed here, and it cannot be modified. You can, however, delete it (see [Delete a rule](#delete-rule)). To learn about this type of rule, see the common questions entry [When should I use a "Deny all traffic" rule?](faq-defender-for-servers.yml).
86+
- A **Deny all traffic** rule is the only type of "deny" rule that would be listed here, and it cannot be modified. You can, however, delete it (see [Delete a rule](#delete-a-rule)). To learn about this type of rule, see the common questions entry [When should I use a "Deny all traffic" rule?](faq-defender-for-servers.yml).
8787

8888
To modify an adaptive network hardening rule:
8989

@@ -102,7 +102,7 @@ To modify an adaptive network hardening rule:
102102

103103
![enforce rule.](./media/adaptive-network-hardening/enforce-hard-rule.png)
104104

105-
## Add a new rule <a name ="add-rule"> </a>
105+
## Add a new rule
106106

107107
You can add an "allow" rule that was not recommended by Defender for Cloud.
108108

@@ -124,7 +124,7 @@ To add an adaptive network hardening rule:
124124

125125
![enforce rule.](./media/adaptive-network-hardening/enforce-hard-rule.png)
126126

127-
## Delete a rule <a name ="delete-rule"> </a>
127+
## Delete a rule
128128

129129
When necessary, you can delete a recommended rule for the current session. For example, you might determine that applying a suggested rule could block legitimate traffic.
130130

articles/defender-for-cloud/ai-security-posture.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,13 @@ The Defender Cloud Security Posture Management (CSPM) plan in Microsoft Defender
2020

2121
> [!IMPORTANT]
2222
> To enable AI security posture management's capabilities on an AWS account that already:
23+
>
2324
> - Is connected to your Azure account.
24-
> - Has Defender CSPM enabled.
25+
> - Has Defender CSPM enabled.
2526
> - Has permissions type set as **Least privilege access**.
2627
>
2728
> You must reconfigure the permissions on that connector to enable the relevant permissions using these steps:
29+
>
2830
> 1. In the Azure Portal navigate to Environment Settings page and select the appropriate AWS connector.
2931
> 1. Select **Configure access**.
3032
> 1. Ensure the permissions type is set to **Least privilege access**.
@@ -34,7 +36,7 @@ The Defender Cloud Security Posture Management (CSPM) plan in Microsoft Defender
3436

3537
Defender for Cloud discovers AI workloads and identifies details of your organization's AI BOM. This visibility allows you to identify and address vulnerabilities and protect generative AI applications from potential threats.
3638

37-
Defenders for Cloud automatically and continuously discover deployed AI workloads across the following services:
39+
Defenders for Cloud automatically and continuously discover deployed AI workloads across the following services:
3840

3941
- Azure OpenAI Service
4042
- Azure Machine Learning
@@ -56,9 +58,9 @@ Defender for Cloud assesses AI workloads and issues recommendations around ident
5658

5759
DevOps security detects IaC misconfigurations, which can expose generative AI applications to security vulnerabilities, such as over-exposed access controls or inadvertent publicly exposed services. These misconfigurations could lead to data breaches, unauthorized access, and compliance issues, especially when handling strict data privacy regulations.
5860

59-
Defender for Cloud assesses your generative AI apps configuration and provides security recommendations to improve AI security posture.
61+
Defender for Cloud assesses your generative AI apps configuration and provides security recommendations to improve AI security posture.
6062

61-
Detected misconfigurations should be remediated early in the development cycle to prevent more complex problems later on.
63+
Detected misconfigurations should be remediated early in the development cycle to prevent more complex problems later on.
6264

6365
Current IaC AI security checks include:
6466

@@ -69,7 +71,7 @@ Current IaC AI security checks include:
6971

7072
### Exploring risks with attack path analysis
7173

72-
Attack paths analysis detects and mitigates risks to AI workloads, particularly during grounding (linking AI models to specific data) and fine-tuning (adjusting a pretrained model on a specific dataset to improve its performance on a related task) stages, where data might be exposed.
74+
Attack paths analysis detects and mitigates risks to AI workloads, particularly during grounding (linking AI models to specific data) and fine-tuning (adjusting a pretrained model on a specific dataset to improve its performance on a related task) stages, where data might be exposed.
7375

7476
By monitoring AI workloads continuously, attack path analysis can identify weaknesses and potential vulnerabilities and follow up with recommendations. Additionally, it extends to cases where the data and compute resources are distributed across Azure, AWS, and GCP.
7577

articles/defender-for-cloud/assign-access-to-workload.md

Lines changed: 37 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,6 @@ ms.date: 07/01/2024
1212

1313
When you onboard your AWS or GCP environments, Defender for Cloud automatically creates a security connector as an Azure resource inside the connected subscription and resource group. Defender for cloud also creates the identity provider as an IAM role it requires during the onboarding process.
1414

15-
1615
Assign permission to users, on specific security connectors, below the parent connector? Yes, you can. You need to determine to which AWS accounts or GCP projects you want users to have access to. Meaning, you need to identify the security connectors that correspond to the AWS account or GCP project to which you want to assign users access.
1716

1817
## Prerequisites
@@ -23,7 +22,7 @@ Assign permission to users, on specific security connectors, below the parent co
2322

2423
## Configure permissions on the security connector
2524

26-
Permissions for security connectors are managed through Azure role-based access control (RBAC). You can assign roles to users, groups, and applications at a subscription, resource group, or resource level.
25+
Permissions for security connectors are managed through Azure role-based access control (RBAC). You can assign roles to users, groups, and applications at a subscription, resource group, or resource level.
2726

2827
1. Sign in to the [Azure portal](https://portal.azure.com/).
2928

@@ -33,87 +32,86 @@ Permissions for security connectors are managed through Azure role-based access
3332

3433
1. Assign permissions to the workload owners with All resources or the Azure Resource Graph option in the Azure portal.
3534

36-
### [All resources](#tab/all-resources)
37-
35+
### [All resources](#tab/all-resources)
36+
3837
1. Search for and select **All resources**.
39-
38+
4039
:::image type="content" source="media/assign-access-to-workload/all-resources.png" alt-text="Screenshot that shows you how to search for and select all resources." lightbox="media/assign-access-to-workload/all-resources.png":::
41-
40+
4241
1. Select **Manage view** > **Show hidden types**.
43-
42+
4443
:::image type="content" source="media/assign-access-to-workload/show-hidden-types.png" alt-text="Screenshot that shows you where on the screen to find the show hidden types option." lightbox="media/assign-access-to-workload/show-hidden-types.png":::
45-
44+
4645
1. Select the **Types equals all** filter.
47-
46+
4847
1. Enter `securityconnector` in the value field and add a check to the `microsoft.security/securityconnectors`.
49-
48+
5049
:::image type="content" source="media/assign-access-to-workload/security-connector.png" alt-text="Screenshot that shows where the field is located and where to enter the value on the screen." lightbox="media/assign-access-to-workload/security-connector.png":::
51-
50+
5251
1. Select **Apply**.
53-
54-
1. Select the relevant resource connector.
5552

53+
1. Select the relevant resource connector.
5654

57-
### [Azure Resource Graph](#tab/azure-resource-graph)
55+
### [Azure Resource Graph](#tab/azure-resource-graph)
5856

5957
1. Search for and select **Resource Graph Explorer**.
60-
58+
6159
:::image type="content" source="media/assign-access-to-workload/resource-graph-explorer.png" alt-text="Screenshot that shows you how to search for and select resource graph explorer." lightbox="media/assign-access-to-workload/resource-graph-explorer.png":::
62-
60+
6361
1. Copy and paste the following query to locate the security connector:
64-
65-
### [AWS](#tab/aws)
66-
62+
63+
### [AWS](#tab/aws)
64+
6765
```bash
6866
resources
6967
| where type == "microsoft.security/securityconnectors"
7068
| extend source = tostring(properties.environmentName) 
7169
| where source == "AWS"
7270
| project name, subscriptionId, resourceGroup, accountId = properties.hierarchyIdentifier, cloud = properties.environmentName 
7371
```
74-
75-
### [GCP](#tab/gcp)
76-
72+
73+
### [GCP](#tab/gcp)
74+
7775
```bash
7876
resources
7977
| where type == "microsoft.security/securityconnectors"
8078
| extend source = tostring(properties.environmentName) 
8179
| where source == "GCP"
8280
| project name, subscriptionId, resourceGroup, projectId = properties.hierarchyIdentifier, cloud = properties.environmentName 
8381
```
84-
82+
8583
---
86-
84+
8785
1. Select **Run query**.
88-
86+
8987
1. Toggle formatted results to **On**.
90-
88+
9189
:::image type="content" source="media/assign-access-to-workload/formatted-results.png" alt-text="Screenshot that shows where the formatted results toggle is located on the screen." lightbox="media/assign-access-to-workload/formatted-results.png":::
92-
90+
9391
1. Select the relevant subscription and resource group to locate the relevant security connector.
94-
92+
9593
---
96-
94+
9795
1. Select **Access control (IAM)**.
98-
96+
9997
:::image type="content" source="media/assign-access-to-workload/control-i-am.png" alt-text="Screenshot that shows where to select Access control IAM in the resource you selected." lightbox="media/assign-access-to-workload/control-i-am.png":::
100-
98+
10199
1. Select **+Add** > **Add role assignment**.
102-
100+
103101
1. Select the desired role.
104-
102+
105103
1. Select **Next**.
106-
104+
107105
1. Select **+ Select members**.
108-
106+
109107
:::image type="content" source="media/assign-access-to-workload/select-members.png" alt-text="Screenshot that shows where the button is on the screen to select the + select members button.":::
110-
108+
111109
1. Search for and select the relevant user or group.
112-
110+
113111
1. Select the **Select** button.
114-
112+
115113
1. Select **Next**.
116-
114+
117115
1. Select **Review + assign**.
118116

119117
1. Review the information.

articles/defender-for-cloud/benefits-of-continuous-export.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,10 @@ When you set up continuous export, you can fully customize what information to e
2424
You can use continuous export to export the following data types whenever they change:
2525

2626
- Security recommendations.
27-
- Recommendation severity.
28-
- Security findings.
27+
- Recommendation severity.
28+
- Security findings.
2929
- Secure score.
30-
- Controls.
30+
- Controls.
3131
- Security alerts.
3232
- Regulatory compliance.
3333
- Attack paths

0 commit comments

Comments
 (0)