You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/upcoming-changes.md
+23-23Lines changed: 23 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Important changes coming to Microsoft Defender for Cloud
3
3
description: Upcoming changes to Microsoft Defender for Cloud that you might need to be aware of and for which you might need to plan
4
4
ms.topic: overview
5
-
ms.date: 06/28/2022
5
+
ms.date: 07/05/2022
6
6
---
7
7
8
8
# Important upcoming changes to Microsoft Defender for Cloud
@@ -18,18 +18,12 @@ If you're looking for the latest release notes, you'll find them in the [What's
18
18
19
19
| Planned change | Estimated date for change |
20
20
|--|--|
21
-
|[GA support for Arc-enabled Kubernetes clusters](#ga-support-for-arc-enabled-kubernetes-clusters)| July 2022 |
22
21
|[Changes to recommendations for managing endpoint protection solutions](#changes-to-recommendations-for-managing-endpoint-protection-solutions)| June 2022 |
23
22
|[Key Vault recommendations changed to "audit"](#key-vault-recommendations-changed-to-audit)| June 2022 |
24
-
|[Multiple changes to identity recommendations](#multiple-changes-to-identity-recommendations)| July 2022 |
25
23
|[Deprecating three VM alerts](#deprecating-three-vm-alerts)| June 2022|
24
+
|[Multiple changes to identity recommendations](#multiple-changes-to-identity-recommendations)| July 2022 |
26
25
|[Deprecate API App policies for App Service](#deprecate-api-app-policies-for-app-service)| July 2022 |
27
-
28
-
### GA support for Arc-enabled Kubernetes clusters
29
-
30
-
**Estimated date for change:** July 2022
31
-
32
-
Defender for Containers is currently a preview feature for Arc-enabled Kubernetes clusters. In July, Arc-enabled Kubernetes clusters will be charged according to the listing on the [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/). Customers that already have clusters onboarded to Arc (on the subscription level) will incur charges.
26
+
|[Change in pricing of Runtime protection for Arc-enabled Kubernetes clusters](#change-in-pricing-of-runtime-protection-for-arc-enabled-kubernetes-clusters)| August 2022 |
33
27
34
28
### Changes to recommendations for managing endpoint protection solutions
35
29
@@ -64,6 +58,20 @@ The Key Vault recommendations listed here are currently disabled so that they do
64
58
| Key Vault secrets should have an expiration date | 14257785-9437-97fa-11ae-898cfb24302b |
65
59
| Key Vault keys should have an expiration date | 1aabfa0d-7585-f9f5-1d92-ecb40291d9f2 |
66
60
61
+
### Deprecating three VM alerts
62
+
63
+
**Estimated date for change:** June 2022
64
+
65
+
The following table lists the alerts that will be deprecated during June 2022.
66
+
67
+
| Alert name | Description | Tactics | Severity |
68
+
|--|--|--|--|
69
+
|**Docker build operation detected on a Kubernetes node** <br>(VM_ImageBuildOnNode) | Machine logs indicate a build operation of a container image on a Kubernetes node. While this behavior might be legitimate, attackers might build their malicious images locally to avoid detection. | Defense Evasion | Low |
70
+
|**Suspicious request to Kubernetes API** <br>(VM_KubernetesAPI) | Machine logs indicate that a suspicious request was made to the Kubernetes API. The request was sent from a Kubernetes node, possibly from one of the containers running in the node. Although this behavior can be intentional, it might indicate that the node is running a compromised container. | LateralMovement | Medium |
71
+
|**SSH server is running inside a container** <br>(VM_ContainerSSH) | Machine logs indicate that an SSH server is running inside a Docker container. While this behavior can be intentional, it frequently indicates that a container is misconfigured or breached. | Execution | Medium |
72
+
73
+
These alerts are used to notify a user about suspicious activity connected to a Kubernetes cluster. The alerts will be replaced with matching alerts that are part of the Microsoft Defender for Cloud Container alerts (`K8S.NODE_ImageBuildOnNode`, `K8S.NODE_ KubernetesAPI` and `K8S.NODE_ ContainerSSH`) which will provide improved fidelity and comprehensive context to investigate and act on the alerts. Learn more about alerts for [Kubernetes Clusters](alerts-reference.md).
74
+
67
75
### Multiple changes to identity recommendations
68
76
69
77
**Estimated date for change:** July 2022
@@ -113,20 +121,6 @@ This update, will rename two recommendations, and revise their descriptions. The
113
121
|Description|User accounts that have been blocked from signing in, should be removed from your subscriptions. <br> These accounts can be targets for attackers looking to find ways to access your data without being noticed.|User accounts that have been blocked from signing into Active Directory, should be removed from your subscriptions.<br> Learn more about securing the identity perimeter in [Azure Identity Management and access control security best practices](../security/fundamentals/identity-management-best-practices.md).|
114
122
| Related policy |[Deprecated accounts should be removed from your subscription](https://ms.portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f6b1cbf55-e8b6-442f-ba4c-7246b6381474)| Subscriptions should be purged of accounts that are blocked in Active Directory and have read and write permissions. |
115
123
116
-
### Deprecating three VM alerts
117
-
118
-
**Estimated date for change:** June 2022
119
-
120
-
The following table lists the alerts that will be deprecated during June 2022.
121
-
122
-
| Alert name | Description | Tactocs | Severity |
123
-
|--|--|--|--|
124
-
|**Docker build operation detected on a Kubernetes node** <br>(VM_ImageBuildOnNode) | Machine logs indicate a build operation of a container image on a Kubernetes node. While this behavior might be legitimate, attackers might build their malicious images locally to avoid detection. | Defense Evasion | Low |
125
-
|**Suspicious request to Kubernetes API** <br>(VM_KubernetesAPI) | Machine logs indicate that a suspicious request was made to the Kubernetes API. The request was sent from a Kubernetes node, possibly from one of the containers running in the node. Although this behavior can be intentional, it might indicate that the node is running a compromised container. | LateralMovement | Medium |
126
-
|**SSH server is running inside a container** <br>(VM_ContainerSSH) | Machine logs indicate that an SSH server is running inside a Docker container. While this behavior can be intentional, it frequently indicates that a container is misconfigured or breached. | Execution | Medium |
127
-
128
-
These alerts are used to notify a user about suspicious activity connected to a Kubernetes cluster. The alerts will be replaced with matching alerts that are part of the Microsoft Defender for Cloud Container alerts (`K8S.NODE_ImageBuildOnNode`, `K8S.NODE_ KubernetesAPI` and `K8S.NODE_ ContainerSSH`) which will provide improved fidelity and comprehensive context to investigate and act on the alerts. Learn more about alerts for [Kubernetes Clusters](alerts-reference.md).
129
-
130
124
### Deprecate API App policies for App Service
131
125
132
126
**Estimated date for change:** July 2022
@@ -145,6 +139,12 @@ We will be deprecating the following policies to corresponding policies that alr
145
139
|`Ensure that 'Java version' is the latest, if used as a part of the API app`|`App Service apps that use Java should use the latest 'Java version`|
146
140
|`Latest TLS version should be used in your API App`|`App Service apps should use the latest TLS version`|
147
141
142
+
### Change in pricing of runtime protection for Arc-enabled Kubernetes clusters
143
+
144
+
**Estimated date for change:** August 2022
145
+
146
+
Runtime protection is currently a preview feature for Arc-enabled Kubernetes clusters. In August, Arc-enabled Kubernetes clusters will be charged for runtime protection. You can view pricing details on the [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/). Subscriptions with Kubernetes clusters already onboarded to Arc, will begin to incur charges in August.
147
+
148
148
## Next steps
149
149
150
150
For all recent changes to Defender for Cloud, see [What's new in Microsoft Defender for Cloud?](release-notes.md)
0 commit comments