Skip to content

Commit 02480bf

Browse files
authored
Merge pull request #222673 from MicrosoftDocs/main
12/30 AM Publish
2 parents 2097f3d + bcccfb9 commit 02480bf

29 files changed

+455
-261
lines changed

articles/azure-video-indexer/animated-characters-recognition-how-to.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,8 @@ ms.author: juliako
1212

1313
# Use the animated character detection with portal and API
1414

15+
[!INCLUDE [announcement](./includes/deprecation-announcement.md)]
16+
1517
Azure Video Indexer supports detection, grouping, and recognition of characters in animated content, this functionality is available through the Azure portal and through API. Review [this overview](animated-characters-recognition.md) article.
1618

1719
This article demonstrates to how to use the animated character detection with the Azure portal and the Azure Video Indexer API.

articles/azure-video-indexer/animated-characters-recognition.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,8 @@ ms.author: juliako
77
---
88
# Animated character detection
99

10+
[!INCLUDE [announcement](./includes/deprecation-announcement.md)]
11+
1012
Azure Video Indexer supports detection, grouping, and recognition of characters in animated content via integration with [Cognitive Services custom vision](https://azure.microsoft.com/services/cognitive-services/custom-vision-service/). This functionality is available both through the portal and through the API.
1113

1214
After uploading an animated video with a specific animation model, Azure Video Indexer extracts keyframes, detects animated characters in these frames, groups similar character, and chooses the best sample. Then, it sends the grouped characters to Custom Vision that identifies characters based on the models it was trained on.
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
> [!IMPORTANT]
2+
> The [Animation character recognition](../animated-characters-recognition.md) model will be retired on March 1st, 2023. For any related issues, [open a support ticket](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/overview) via the Azure portal.
3+

articles/azure-video-indexer/release-notes.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,12 +13,16 @@ ms.author: juliako
1313
1414
To stay up-to-date with the most recent Azure Video Indexer developments, this article provides you with information about:
1515

16-
<!--* [Important notice](#upcoming-critical-changes) about planned changes-->
16+
* [Important notice](#important-notice) about planned changes
1717
* The latest releases
1818
* Known issues
1919
* Bug fixes
2020
* Deprecated functionality
2121

22+
## Important notice
23+
24+
[!INCLUDE [announcement](./includes/deprecation-announcement.md)]
25+
2226
## November 2022
2327

2428
### Speakers' names can now be edited from the Azure Video Indexer website

articles/azure-video-indexer/video-indexer-overview.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,6 @@ Unless specified otherwise, a model is generally available.
5252
* **Black frame detection**: Identifies black frames presented in the video.
5353
* **Keyframe extraction**: Detects stable keyframes in a video.
5454
* **Rolling credits**: Identifies the beginning and end of the rolling credits in the end of TV shows and movies.
55-
* **Animated characters detection** : Detects, groups, and recognizes characters in animated content via integration with [Cognitive Services custom vision](https://azure.microsoft.com/services/cognitive-services/custom-vision-service/). For more information, see [Animated character detection](animated-characters-recognition.md).
5655
* **Editorial shot type detection**: Tags shots based on their type (like wide shot, medium shot, close up, extreme close up, two shot, multiple people, outdoor and indoor, and so on). For more information, see [Editorial shot type detection](scenes-shots-keyframes.md#editorial-shot-type-detection).
5756
* **Observed people tracking** (preview): Detects observed people in videos and provides information such as the location of the person in the video frame (using bounding boxes) and the exact timestamp (start, end) and confidence when a person appears. For more information, see [Trace observed people in a video](observed-people-tracing.md).
5857
* **People's detected clothing** (preview): Detects the clothing types of people appearing in the video and provides information such as long or short sleeves, long or short pants and skirt or dress. The detected clothing is associated with the people wearing it and the exact timestamp (start, end) along with a confidence level for the detection are provided. For more information, see [detected clothing](detected-clothing.md).
Lines changed: 136 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,136 @@
1+
---
2+
title: Integrate Microsoft Defender's ransomware alerts to preserve Azure Backup recovery points
3+
description: Learn how to integrate Microsoft Defender for Cloud and Azure Backup using logic app.
4+
ms.topic: how-to
5+
ms.custom: references_regions
6+
ms.date: 12/30/2022
7+
author: v-amallick
8+
ms.service: backup
9+
ms.author: v-amallick
10+
---
11+
12+
# Solution sample to integrate Microsoft Defender's ransomware alerts to preserve Azure Backup recovery points
13+
14+
This article describes the sample solution that demonstrates how to integrate Microsoft Defender's ransomware alerts to preserve Azure Backup recovery points. Assume there has been a breach on the Virtual Machine that is protected by both Defender and Azure Backup. Defender detects the ransomware, raises an alert which includes details of the activity and suggested recommendations to remediate. As soon as a ransomware signal is detected from Defender, ensuring backups are preserved (i.e., paused from expiring) to minimize the data loss is top of our customers’ mind.
15+
16+
Azure Backup provides several security capabilities to help you protect your backup data. [Soft delete](backup-azure-security-feature-cloud.md), [Immutable vaults](backup-azure-immutable-vault-concept.md), [Multi-User Authorization (MUA)](multi-user-authorization-concept.md) are part of a comprehensive data protection strategy for backup data. Soft delete is enabled by default, with option to make it always-on (irreversible). Soft deleted backup data is retained at no additional cost for *14* days, with option to [extend the duration](backup-azure-enhanced-soft-delete-about.md). Enabling immutability on vaults can protect backup data by blocking any operations that could lead to loss of recovery points. You can configure Multi-user authorization (MUA) for Azure Backup as an additional layer of protection to critical operations on your Recovery Services vaults. By default, critical alert for destructive operation (such as stop protection with delete backup data) is raised and an email is sent to subscription owners, admins, and co-admins.
17+
18+
Microsoft Defender for Cloud (MDC) is a Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP) for all of your Azure, on-premises, and multicloud (Amazon AWS and Google GCP) resources. Defender for Cloud generates security alerts when threats are identified in your cloud, hybrid, or on-premises environment. It's available when you enable enhanced security features. Each alert provides details of affected resources along with the information you need to quickly investigate the issue and steps to take to remediate an attack. If a malware or a ransomware attacks on an Azure Virtual Machine, Microsoft Defender for Cloud detects suspicious activity and indicators associated with ransomware on an Azure VM and generates a Security Alert. Examples of the Defender for Cloud Alerts that trigger on a Ransomware detection: *Ransomware indicators detected*, *Behavior similar to ransomware detected*, and so on.
19+
20+
>[!Note]
21+
> This sample solution is scoped to Azure Virtual Machines. You can deployed the logic app only at a subscription level, which means all Azure VMs under the subscription can use the logic app to pause expiry of recovery points in the event of a security alert.
22+
23+
## Solution details
24+
25+
This sample solution demonstrates integration of Azure Backup with Microsoft Defender for Cloud (MDC) for detection and response to alerts to accelerate response. Sample illustrates the following three use cases:
26+
27+
- Ability to send email alerts to the Backup Admin.
28+
- Security Admin to triage and manually trigger logic app to secure backups.
29+
- Workflow to automatically respond to the alert by performing the *Disable Backup Policy (Stop backup and retain data)* operation.
30+
31+
:::image type="content" source="./media/backup-azure-integrate-microsoft-defender-using-logic-apps/logic-apps-flow-diagram.png" alt-text="Diagram shows how Microsoft Defender for Cloud and Azure Backup using Logic apps helps protecting the backup data.":::
32+
33+
## Prerequisites
34+
35+
- [Enable Azure Backup for Azure virtual machines](tutorial-backup-vm-at-scale.md).
36+
- [Enable Microsoft Defender for Servers Plan 2 for the Subscription](../defender-for-cloud/enable-enhanced-security.md#enable-enhanced-security-features-on-a-subscription).
37+
38+
## Deploy Azure Logic Apps
39+
40+
To deploy Azure Logic Apps, follow these steps:
41+
42+
1. Go to [GitHub](https://github.com/Azure/Microsoft-Defender-for-Cloud/tree/main/Workflow%20automation/Protect%20Azure%20VM%20Backup%20from%20Ransomware) and select **Deploy to Azure**.
43+
44+
:::image type="content" source="./media/backup-azure-integrate-microsoft-defender-using-logic-apps/start-azure-logic-apps-deployment.png" alt-text="Screenshot shows how to start Azure Logic Apps from GitHub.":::
45+
46+
2. On the **deployment** pane, enter the following details:
47+
48+
- **Subscription**: Select the subscription whose Azure VMs the logic app should govern.
49+
- **Name**: Enter a suitable name for the logic app.
50+
- **Region**: Choose the region with which the subscription is associated.
51+
- **Email**: Enter the email address of the Backup admin for them to receive alerts when policy is suspended.
52+
- **Resource group**: Select the resource group with which logic apps need to be associated for deployment.
53+
- **Managed Identity**: [Create and assign a Managed Identity](../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-azp#create-a-user-assigned-managed-identity) with the below minimum permissions for the service to perform the *Stop backup and retain data* operation on the backup item automatically during a malware alert.
54+
55+
- Virtual Machine Contributor on the subscription
56+
- The Backup Operator on the subscription
57+
- Security Reader
58+
59+
>[!Note]
60+
>To further tighten the security, we recommend you create a custom role and assign that to the Managed Identity instead of the above built-in roles. This ensures that all the calls run with least privileges. For more information on custom role, see the [Github article](https://github.com/Azure/Microsoft-Defender-for-Cloud/tree/main/Workflow%20automation/Protect%20Azure%20VM%20Backup%20from%20Ransomware).
61+
62+
- **Managed Identity Subscription**: Enter the name of a Subscription that the Managed Identity should reside in.
63+
- **Managed Identity Resource Group**: Enter the name of a resource group that the Managed Identity should reside in.
64+
65+
:::image type="content" source="./media/backup-azure-integrate-microsoft-defender-using-logic-apps/enter-details-for azure-logic-apps-deployment.png" alt-text="Screenshot shows how to enter details to deploy Azure Logic Apps.":::
66+
67+
>[!Note]
68+
>You need *Owner* access on the Subscription to deploy the logic app.
69+
70+
3. Select **Review + Create**.
71+
72+
## Authorize Office 365 for email alerts
73+
74+
To authorize the API connection to Office 365, follow these steps:
75+
76+
1. Go to the *resource group* you used to deploy the template resources.
77+
2. Select the *Office365 API connection* (which is one of the resources you deployed) and select the *error that appears at the API connection*.
78+
3. Select **Edit API connection**.
79+
4. Select **Authorize**.
80+
81+
>[!Note]
82+
>Ensure that you authenticate against Azure AD.
83+
84+
5. Select **Save**.
85+
86+
## Trigger the logic app
87+
88+
You can trigger the deployed logic app *manually* or *automatically* using [workflow automation](../defender-for-cloud/workflow-automation.md).
89+
90+
### Trigger manually
91+
92+
To trigger the logic app manually, follow these steps:
93+
94+
1. Go to **Microsoft Defender for Cloud**, and then select **Security Alerts** on the left pane.
95+
1. Select the required alert to expand details.
96+
1. Select **Take action**, choose **Trigger automated response**, and then select **Trigger logic app**.
97+
1. Search the deployed logic app by name, and then select **Trigger**.
98+
99+
>[!Note]
100+
>The minimum Azure RBAC permissions needed to trigger an action for the security alert are:
101+
>
102+
>- Logic app Operator
103+
>- Security Admin role
104+
105+
### Trigger using workflow automation via Azure portal
106+
107+
Workflow automation ensures that during a security alert, your backups corresponding to the VM facing this issue changes to **Stop backup and retain data** state, thus suspend policy and pause recovery point pruning. You can also use Azure Policy to deploy [workflow automation](../defender-for-cloud/workflow-automation.md).
108+
109+
>[!Note]
110+
>The minimum role required to deploy the workflow automation are:
111+
>
112+
>- Logic app Operator
113+
>- Security Admin
114+
115+
To trigger the logic app using automatic workflow, follow these steps:
116+
117+
1. Go to **Defender for Cloud**, and then select **Workflow automation** on the left pane.
118+
1. Select **Add workflow automation** to open the options pane for the new automation.
119+
1. Enter the following details:
120+
121+
- **Name and Description**: Enter a suitable name for the automation.
122+
- **Subscription**: Select the subscription same as the scope of the logic app.
123+
- **Resource group**: Select the resource group in which the automation will reside.
124+
- **Defender for Cloud Data Type**: Select *Security Alert*.
125+
- **Alert name contains**: Select *Malware* or *ransomware*.
126+
- **Alert severity**: Select *High*.
127+
- **Logic app**: Select the logic app you deployed.
128+
1. Select **Create**.
129+
130+
## Email alerts
131+
132+
When the backup policy on the backup item gets disabled, the logic app also sends an email to the ID you've entered during deployment. The email ID should ideally be of the *Backup Admin*. You can then investigate the alert and resume the backups when the issue is resolved or if it's a false alarm.
133+
134+
## Next steps
135+
136+
[About backup and restore plan to protect against ransomware](../security/fundamentals/backup-plan-to-protect-against-ransomware.md).
Loading
73.1 KB
Loading
Loading

articles/backup/toc.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@
6161
- name: Resiliency
6262
items:
6363
- name: Migrate to availability zone support
64-
href: ../availability-zones/migrate-recovery-services-vault.md
64+
href: ../availability-zones/migrate-recovery-services-vault.md?toc=/azure/backup/toc.json&bc=/azure/backup/breadcrumb/toc.json
6565
- name: Support matrices
6666
items:
6767
- name: Azure Backup support matrix
@@ -611,7 +611,9 @@
611611
- name: Ransomware protection
612612
items:
613613
- name: Overview
614-
href: ../security/fundamentals/backup-plan-to-protect-against-ransomware.md
614+
href: ../security/fundamentals/backup-plan-to-protect-against-ransomware.md?toc=/azure/backup/toc.json&bc=/azure/backup/breadcrumb/toc.json
615+
- name: Integrate with Microsoft Defender's ransomware alerts
616+
href: backup-azure-integrate-microsoft-defender-using-logic-apps.md
615617
- name: FAQ-Protection against Ransomware
616618
href: protect-backups-from-ransomware-faq.yml
617619
- name: Security for hybrid backups

0 commit comments

Comments
 (0)