Skip to content

Commit 05efc78

Browse files
authored
Merge pull request #224648 from MicrosoftDocs/main
Publish to live, Sunday 4PM PST, 1/22
2 parents 46aa66d + 5510485 commit 05efc78

File tree

10 files changed

+55
-139
lines changed

10 files changed

+55
-139
lines changed

.openpublishing.redirection.defender-for-iot.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -654,6 +654,11 @@
654654
"redirect_url": "/azure/defender-for-iot/device-builders/tutorial-standalone-agent-binary-installation",
655655
"redirect_document_id": false
656656
},
657+
{
658+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-connect-sensor-by-proxy.md",
659+
"redirect_url": "/azure/defender-for-iot/organizations/connect-sensors",
660+
"redirect_document_id": false
661+
},
657662
{
658663
"source_path_from_root": "/articles/defender-for-iot/organizations/references-defender-for-iot-glossary.md",
659664
"redirect_url": "/azure/defender-for-iot/organizations/overview",

articles/cost-management-billing/costs/enable-preview-features-cost-management-labs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ Cost analysis is your tool for interactive analytics and insights. You've seen t
7171

7272
The first time you open the cost analysis preview, you'll see a list of all views. When you return, you'll see a list of the recently used views to help you get back to where you left off quicker than ever. You can pin any view or even rename or subscribe to alerts for your saved views.
7373

74-
The recent and pinned views can be enabled from the [Try preview](https://aka.ms/costmgmt/trypreview) page in the Azure portal. Use the **How would you rate the cost analysis preview?** option at the bottom of the page to share feedback about the preview.
74+
**Recent and pinned views are available by default in the cost analysis preview.** Use the **How would you rate the cost analysis preview?** option at the bottom of the page to share feedback.
7575

7676

7777
<a name="aksnestedtable"></a>

articles/defender-for-cloud/custom-security-policies.md

Lines changed: 23 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Create custom Azure security policies in Microsoft Defender for Cloud
33
description: Azure custom policy definitions monitored by Microsoft Defender for Cloud.
44
ms.topic: how-to
55
ms.custom: ignite-2022
6-
ms.date: 07/20/2022
6+
ms.date: 01/22/2023
77
zone_pivot_groups: manage-asc-initiatives
88
---
99

@@ -35,26 +35,36 @@ You can view your custom initiatives organized by controls, similar to the contr
3535

3636
:::image type="content" source="media/custom-security-policies/accessing-security-policy-page.png" alt-text="Screenshot of accessing the security policy page in Microsoft Defender for Cloud." lightbox="media/custom-security-policies/accessing-security-policy-page.png":::
3737

38-
1. In the Add custom initiatives page, review the list of custom policies already created in your organization.
38+
1. Review the list of custom policies already created in your organization, and select **Add** to assign a policy to your subscription.
3939

40-
- If you see one you want to assign to your subscription, select **Add**.
41-
- If there isn't an initiative in the list that meets your needs, create a new custom initiative:
40+
If there isn't an initiative in the list that meets your needs, you can create one.
4241

43-
1. Select **Create new**.
44-
1. Enter the definition's location and name.
45-
1. Select the policies to include and select **Add**.
46-
1. Enter any desired parameters.
47-
1. Select **Save**.
48-
1. In the Add custom initiatives page, select refresh. Your new initiative will be available.
49-
1. Select **Add** and assign it to your subscription.
42+
**To create a new custom initiative**:
43+
44+
1. Select **Create new**.
45+
46+
1. Enter the definition's location and custom name.
47+
48+
> [!NOTE]
49+
> Custom initiatives shouldn't have the same name as other initiatives (custom or built-in). If you create a custom initiative with the the same name, it will cause a conflict in the information displayed in the dashboard.
50+
51+
1. Select the policies to include and select **Add**.
52+
53+
1. Enter any desired parameters.
54+
55+
1. Select **Save**.
56+
57+
1. In the Add custom initiatives page, select refresh. Your new initiative will be available.
58+
59+
1. Select **Add** and assign it to your subscription.
5060

5161
![Create or add a policy.](media/custom-security-policies/create-or-add-custom-policy.png)
5262

5363

5464
> [!NOTE]
5565
> Creating new initiatives requires subscription owner credentials. For more information about Azure roles, see [Permissions in Microsoft Defender for Cloud](permissions.md).
5666
57-
Your new initiative takes effect and you can see the impact in the following two ways:
67+
Your new initiative takes effect and you can see the results in the following two ways:
5868

5969
* From the Defender for Cloud menu, select **Regulatory compliance**. The compliance dashboard opens to show your new custom initiative alongside the built-in initiatives.
6070

@@ -250,7 +260,7 @@ The metadata should be added to the policy definition for a policy that is part
250260
},
251261
```
252262

253-
Below is an example of a custom policy including the metadata/securityCenter property:
263+
Here's another example of a custom policy including the metadata/securityCenter property:
254264

255265
```json
256266
{

articles/defender-for-cloud/governance-rules.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -90,6 +90,10 @@ If there are existing recommendations that match the definition of the governanc
9090
> - Create and apply rules on multiple scopes at once using management scopes cross cloud.
9191
> - Check effective rules on selected scope using the scope filter.
9292
93+
To view the effect rules on specific scope, use the “scope” filter and select a desired scope.
94+
95+
Conflicting rules are applied in priority order. For example, rules on a management scope, (Azure management groups, AWS master accents and GCP organizations) take effect before rules on scopes (for example, Azure subscriptions, AWS accounts, or GCP projects).
96+
9397
## Manually assigning owners and due dates for recommendation remediation
9498

9599
For every resource affected by a recommendation, you can assign an owner and a due date so that you know who needs to implement the security changes to improve your security posture and when they're expected to do it by. You can also apply a grace period so that the resources that are given a due date don't impact your secure score unless they become overdue.
-1.67 KB
Loading

articles/defender-for-iot/organizations/TOC.yml

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -217,9 +217,6 @@
217217
items:
218218
- name: Connect OT sensors to Defender for IoT
219219
href: connect-sensors.md
220-
displayName: proxy
221-
- name: Connect OT sensors with a proxy (legacy)
222-
href: how-to-connect-sensor-by-proxy.md
223220
- name: Activate and set up your on-premises management console
224221
href: how-to-activate-and-set-up-your-on-premises-management-console.md
225222
displayName: sites, zones

articles/defender-for-iot/organizations/how-to-connect-sensor-by-proxy.md

Lines changed: 0 additions & 97 deletions
This file was deleted.

articles/defender-for-iot/organizations/overview.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -95,8 +95,6 @@ For more information, see the [Microsoft Defender for IoT for device builders do
9595

9696
Defender for IoT routes all traffic from all European regions to the *West Europe* regional datacenter. It routes traffic from all remaining regions to the *East US* regional datacenter.
9797

98-
If you're using Defender for IoT OT monitoring software earlier than [22.1](release-notes.md#versions-222x) and are connecting through your own IoT Hub, the IoT Hub supported regions are also relevant for your organization. For more information, see [IoT Hub supported regions](https://azure.microsoft.com/global-infrastructure/services/?products=iot-hub).
99-
10098
## Next steps
10199

102100
> [!div class="nextstepaction"]

articles/security/develop/secure-develop.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
title: Develop secure applications on Microsoft Azure
33
description: This article discusses best practices to consider during the implementation and verification phases of your web application project.
44
author: TerryLanfear
5-
manager: barbkess
5+
manager: rkarlin
66
ms.author: terrylan
7-
ms.date: 03/21/2021
7+
ms.date: 01/22/2023
88
ms.topic: article
99
ms.service: security
1010
ms.subservice: security-develop
@@ -96,7 +96,7 @@ If the application must autogenerate passwords, ensure that the generated passwo
9696

9797
If your application allows [file uploads](https://owasp.org/www-community/vulnerabilities/Unrestricted_File_Upload), consider precautions that you can take for this risky activity. The first step in many attacks is to get some malicious code into a system that is under attack. Using a file upload helps the attacker accomplish this. OWASP offers solutions for validating a file to ensure that the file you're uploading is safe.
9898

99-
Antimalware protection helps identify and remove viruses, spyware, and other malicious software. You can install [Microsoft Antimalware](../fundamentals/antimalware.md) or a Microsoft partner's endpoint protection solution ([Trend Micro](https://www.trendmicro.com/azure/), [Broadcom](https://www.broadcom.com/products), [McAfee](https://www.mcafee.com/us/products.aspx), [Windows Defender](/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10), and [Endpoint Protection](/configmgr/protect/deploy-use/endpoint-protection)).
99+
Antimalware protection helps identify and remove viruses, spyware, and other malicious software. You can install [Microsoft Antimalware](../fundamentals/antimalware.md) or a Microsoft partner's endpoint protection solution ([Trend Micro](https://www.trendmicro.com/azure/), [Broadcom](https://www.broadcom.com/products), [McAfee](https://www.mcafee.com/us/products.aspx), [Microsoft Defender Antivirus in Windows](/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10), and [Endpoint Protection](/configmgr/protect/deploy-use/endpoint-protection)).
100100

101101
[Microsoft Antimalware](../fundamentals/antimalware.md) includes features like real-time protection, scheduled scanning, malware remediation, signature updates, engine updates, samples reporting, and exclusion event collection. You can integrate Microsoft Antimalware and partner solutions with [Microsoft Defender for Cloud](../../security-center/security-center-partner-integration.md) for ease of deployment and built-in detections (alerts and incidents).
102102

@@ -130,15 +130,15 @@ In [fuzz testing](https://www.microsoft.com/security/blog/2007/09/20/fuzz-testin
130130

131131
Reviewing the attack surface after code completion helps ensure that any design or implementation changes to an application or system has been considered. It helps ensure that any new attack vectors that were created as a result of the changes, including threat models, has been reviewed and mitigated.
132132

133-
You can build a picture of the attack surface by scanning the application. Microsoft offers an attack surface analysis tool called [Attack Surface Analyzer](https://www.microsoft.com/download/details.aspx?id=58105). You can choose from many commercial dynamic testing and vulnerability scanning tools or services, including [OWASP Zed Attack Proxy Project](https://owasp.org/www-project-zap/), [Arachni](http://arachni-scanner.com/), [Skipfish](https://code.google.com/p/skipfish/), and [w3af](http://w3af.sourceforge.net/). These scanning tools crawl your app and map the parts of the application that are accessible over the web. You can also search the Azure Marketplace for similar [developer tools](https://azuremarketplace.microsoft.com/marketplace/apps/category/developer-tools?page=1).
133+
You can build a picture of the attack surface by scanning the application. Microsoft offers an attack surface analysis tool called [Attack Surface Analyzer](https://www.microsoft.com/download/details.aspx?id=58105). You can choose from many commercial dynamic testing and vulnerability scanning tools or services, including [OWASP Zed Attack Proxy Project](https://owasp.org/www-project-zap/), [Arachni](http://arachni-scanner.com/), and [w3af](http://w3af.sourceforge.net/). These scanning tools crawl your app and map the parts of the application that are accessible over the web. You can also search the Azure Marketplace for similar [developer tools](https://azuremarketplace.microsoft.com/marketplace/apps/category/developer-tools?page=1).
134134

135135
### Perform security penetration testing
136136

137137
Ensuring that your application is secure is as important as testing any other functionality. Make [penetration testing](../fundamentals/pen-testing.md) a standard part of the build and deployment process. Schedule regular security tests and vulnerability scanning on deployed applications, and monitor for open ports, endpoints, and attacks.
138138

139139
### Run security verification tests
140140

141-
[Secure DevOps Kit for Azure](https://github.com/azsk/AzTS-docs/#readme) (AzSK) contains SVTs for multiple services of the Azure platform. You run these SVTs periodically to ensure that your Azure subscription and the different resources that comprise your application are in a secure state. You can also automate these tests by using the continuous integration/continuous deployment (CI/CD) extensions feature of AzSK, which makes SVTs available as a Visual Studio extension.
141+
[Azure Tenant Security Solution (AzTS)](https://github.com/azsk/AzTS-docs/#readme) from the Secure DevOps Kit for Azure (AzSK) contains SVTs for multiple services of the Azure platform. You run these SVTs periodically to ensure that your Azure subscription and the different resources that comprise your application are in a secure state. You can also automate these tests by using the continuous integration/continuous deployment (CI/CD) extensions feature of AzSK, which makes SVTs available as a Visual Studio extension.
142142

143143
## Next steps
144144

0 commit comments

Comments
 (0)