You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/how-to-manage-cloud-security-explorer.md
+48-36Lines changed: 48 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,77 +4,89 @@ titleSuffix: Defender for Cloud
4
4
description: Learn how to build queries in cloud security explorer to find vulnerabilities that exist on your multicloud environment.
5
5
ms.topic: how-to
6
6
ms.custom: ignite-2022
7
-
ms.date: 01/24/2023
7
+
ms.date: 02/07/2023
8
8
---
9
9
10
10
# Cloud security explorer
11
11
12
-
Defender for Cloud's contextual security capabilities assists security teams in the reduction of the risk of impactful breaches. Defender for Cloud uses environmental context to perform a risk assessment of your security issues, and identifies the biggest security risks and distinguishes them from less risky issues.
12
+
Defender for Cloud's contextual security capabilities assist security teams in reducing the risk of impactful breaches. Defender for Cloud uses environmental context to perform a risk assessment of your security issues, identifies the biggest security risks, and distinguishes them from less risky issues.
13
13
14
-
By using the cloud security explorer, you can proactively identify security risks in your cloud environment by running graph-based queries on the cloud security graph, which is Defender for Cloud's context engine. You can prioritize your security team's concerns, while taking your organization's specific context and conventions into account.
14
+
Use the cloud security explorer, to proactively identify security risks in your cloud environment by running graph-based queries on the cloud security graph, which is Defender for Cloud's context engine. You can prioritize your security team's concerns, while taking your organization's specific context and conventions into account.
15
15
16
-
With the cloud security explorer, you can query all of your security issues and environment context such as assets inventory, exposure to internet, permissions, lateral movement between resources and more.
16
+
With the cloud security explorer, you can query all of your security issues and environment context such as assets inventory, exposure to internet, permissions, and lateral movement between resources and across multiple clouds (Azure and AWS).
17
17
18
-
Learn more about [the cloud security graph, attack path analysis, and the cloud security explorer?](concept-attack-path.md).
18
+
Learn more about [the cloud security graph, attack path analysis, and the cloud security explorer](concept-attack-path.md).
19
19
20
-
## Availability
20
+
## Prerequisites
21
21
22
-
| Aspect | Details |
23
-
|--|--|
24
-
| Release state | Preview |
25
-
| Prerequisite | - [Enable agentless scanning](enable-vulnerability-assessment-agentless.md) <br> - [Enable Defender for CSPM](enable-enhanced-security.md) <br> - [Enable Defender for Containers](defender-for-containers-enable.md), and install the relevant agents in order to view attack paths that are related to containers. This will also give you the ability to [query](how-to-manage-cloud-security-explorer.md#build-a-query-with-the-cloud-security-explorer) containers data plane workloads in security explorer. |
- You must [enable agentless scanning](enable-vulnerability-assessment-agentless.md).
23
+
24
+
- You must [enable Defender for CSPM](enable-enhanced-security.md).
25
+
26
+
- You must [enable Defender for Containers](defender-for-containers-enable.md), and install the relevant agents in order to view attack paths that are related to containers.
27
+
28
+
When you enable Defender for Containers, you also gain the ability to [query](how-to-manage-cloud-security-explorer.md#build-a-query-with-the-cloud-security-explorer) containers data plane workloads in the security explorer.
29
+
30
+
- Required roles and permissions:
31
+
- Security Reader
32
+
- Security Admin
33
+
- Reader
34
+
- Contributor
35
+
- Owner
36
+
37
+
Check the [cloud availability tables](supported-machines-endpoint-solutions-clouds-servers.md) to see which government and cloud environments are supported.
29
38
30
39
## Build a query with the cloud security explorer
31
40
32
-
You can use the cloud security explorer to build queries that can proactively hunt for security risks in your environments.
41
+
The cloud security explorer allows you to build queries that can proactively hunt for security risks in your environments with dynamic and efficient features such as:
42
+
43
+
-**Multi-cloud and multi-resource queries** - The entity selection control filters are grouped and combined into logical control categories to assist you in building queries across cloud environments and across resources simultaneously.
44
+
45
+
-**Custom Search** - Use the dropdown menus to apply filters to build your query.
46
+
47
+
-**Query templates** - Use any of the available pre-built query templates to more efficiently build your query.
48
+
49
+
-**Share query link** - Copy and share a link of your query with other people.
33
50
34
51
**To build a query**:
35
52
36
53
1. Sign in to the [Azure portal](https://portal.azure.com).
37
54
38
55
1. Navigate to **Microsoft Defender for Cloud** > **Cloud Security Explorer**.
39
56
40
-
:::image type="content" source="media/concept-cloud-map/cloud-security-explorer.png" alt-text="Screenshot of the cloud security explorer page." lightbox="media/concept-cloud-map/cloud-security-explorer.png":::
57
+
:::image type="content" source="media/concept-cloud-map/cloud-security-explorer-main-page.png" alt-text="Screenshot of the cloud security explorer page." lightbox="media/concept-cloud-map/cloud-security-explorer-main-page.png":::
41
58
42
-
1.Select a resource from the drop-down menu.
59
+
1.Search for and select a resource from the drop-down menu.
43
60
44
-
:::image type="content" source="media/how-to-manage-cloud-security/select-resource.png" alt-text="Screenshot of the resource drop-down menu.":::
61
+
:::image type="content" source="media/how-to-manage-cloud-security/cloud-security-explorer-select-resource.png" alt-text="Screenshot of the resource drop-down menu." lightbox="media/how-to-manage-cloud-security/cloud-security-explorer-select-resource.png":::
45
62
46
-
1. Select **+** to add other filters to your query. For each filter selected you can add more subfilters as needed.
63
+
1. Select **+** to add other filters to your query.
64
+
65
+
:::image type="content" source="media/how-to-manage-cloud-security/cloud-security-explorer-query-search.png" alt-text="Screenshot that shows a full query and where to select on the screen to perform the search." lightbox="media/how-to-manage-cloud-security/cloud-security-explorer-query-search.png":::
47
66
48
-
1.Select **Search**.
67
+
1.Add subfilters as needed.
49
68
50
-
:::image type="content" source="media/how-to-manage-cloud-security/search-query.png" alt-text="Screenshot that shows a full query and where to select on the screen to perform the search.":::
69
+
1. After building your query, select **Search**to run the query.
51
70
52
-
The results will populate on the bottom of the page.
71
+
:::image type="content" source="media/how-to-manage-cloud-security/cloud-security-explorer-query-search-populated.png" alt-text="Screenshot that shows where to select search to run the query and results populated." lightbox="media/how-to-manage-cloud-security/cloud-security-explorer-query-search-populated.png":::
53
72
54
73
## Query templates
55
74
56
-
You can select an existing query template from the bottom of the page by selecting **Open query**.
57
-
58
-
:::image type="content" source="media/how-to-manage-cloud-security/query-template.png" alt-text="Screenshot that shows you where the query templates are located.":::
59
-
60
-
You can alter any template to search for specific results by changing the query and selecting search.
75
+
Query templates are pre-formatted searches using commonly used filters. Use one of the existing query templates from the bottom of the page by selecting **Open query**.
61
76
62
-
## Query options
77
+
:::image type="content" source="media/how-to-manage-cloud-security/cloud-security-explorer-query-templates.png" alt-text="Screenshot that shows you the location of the query templates." lightbox="media/how-to-manage-cloud-security/cloud-security-explorer-query-templates.png":::
63
78
64
-
The following information can be queried in the cloud security explorer:
79
+
You can modify any template to search for specific results by changing the query and selecting **Search**.
65
80
66
-
-**Recommendations** - All Defender for Cloud security recommendations.
67
81
68
-
-**Vulnerabilities** - All vulnerabilities found by Defender for Cloud.
82
+
## Share a query
69
83
70
-
-**Insights** - Contextual data about your cloud resources.
71
-
72
-
-**Connections** - Connections that are identified between cloud resources in your environment.
84
+
Use the query link to share a query with other people. After creating a query, select **Share query link**. The link is copied to your clipboard.
73
85
74
-
You can review the [full list of recommendations, insights and connections](attack-path-reference.md).
86
+
:::image type="content" source="media/how-to-manage-cloud-security/cloud-security-explorer-share-query.png" alt-text="Screenshot showing the Share Query Link icon." lightbox="media/how-to-manage-cloud-security/cloud-security-explorer-share-query.png":::
75
87
76
88
## Next steps
77
89
78
-
View the [reference list of attack paths and cloud security graph components](attack-path-reference.md)
90
+
View the [reference list of attack paths and cloud security graph components](attack-path-reference.md).
79
91
80
-
Learn about the [Defender CSPM plan options](concept-cloud-security-posture-management.md#defender-cspm-plan-options)
92
+
Learn about the [Defender CSPM plan options](concept-cloud-security-posture-management.md#defender-cspm-plan-options).
-[Recommendation to find vulnerabilities in running container images for Linux released for General Availability (GA)](#recommendation-to-find-vulnerabilities-in-running-container-images-released-for-general-availability-ga)
24
25
-[Announcing support for the AWS CIS 1.5.0 compliance standard](#announcing-support-for-the-aws-cis-150-compliance-standard)
25
26
-[Microsoft Defender for DevOps (preview) is now available in other regions](#microsoft-defender-for-devops-preview-is-now-available-in-other-regions)
26
27
28
+
### Enhanced Cloud Security Explorer
29
+
30
+
An improved version of the cloud security explorer includes a refreshed user experience that removes query friction dramatically, added the ability to run multicloud and multi-resource queries, and embedded documentation for each query option.
31
+
32
+
The Cloud Security Explorer now allows you to run cloud-abstract queries across resources. You can use either the pre-built query templates or use the custom search to apply filters to build your query. Learn [how to manage Cloud Security Explorer](how-to-manage-cloud-security-explorer.md).
33
+
27
34
### Recommendation to find vulnerabilities in running container images released for General Availability (GA)
28
35
29
36
The [Running container images should have vulnerability findings resolved](defender-for-containers-vulnerability-assessment-azure.md#view-vulnerabilities-for-images-running-on-your-aks-clusters) recommendation for Linux is now GA. The recommendation is used to identify unhealthy resources and is included in the calculations of your secure score.
0 commit comments