Skip to content

Commit 071007f

Browse files
authored
Merge pull request #225481 from AlizaBernstein/WI-60886-MDC-security-explorer-new-experience
WI-60886 cloud security explorer new experience
2 parents 7f0f5cd + 36a7fd0 commit 071007f

8 files changed

+56
-37
lines changed

articles/defender-for-cloud/how-to-manage-cloud-security-explorer.md

Lines changed: 48 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -4,77 +4,89 @@ titleSuffix: Defender for Cloud
44
description: Learn how to build queries in cloud security explorer to find vulnerabilities that exist on your multicloud environment.
55
ms.topic: how-to
66
ms.custom: ignite-2022
7-
ms.date: 01/24/2023
7+
ms.date: 02/07/2023
88
---
99

1010
# Cloud security explorer
1111

12-
Defender for Cloud's contextual security capabilities assists security teams in the reduction of the risk of impactful breaches. Defender for Cloud uses environmental context to perform a risk assessment of your security issues, and identifies the biggest security risks and distinguishes them from less risky issues.
12+
Defender for Cloud's contextual security capabilities assist security teams in reducing the risk of impactful breaches. Defender for Cloud uses environmental context to perform a risk assessment of your security issues, identifies the biggest security risks, and distinguishes them from less risky issues.
1313

14-
By using the cloud security explorer, you can proactively identify security risks in your cloud environment by running graph-based queries on the cloud security graph, which is Defender for Cloud's context engine. You can prioritize your security team's concerns, while taking your organization's specific context and conventions into account.
14+
Use the cloud security explorer, to proactively identify security risks in your cloud environment by running graph-based queries on the cloud security graph, which is Defender for Cloud's context engine. You can prioritize your security team's concerns, while taking your organization's specific context and conventions into account.
1515

16-
With the cloud security explorer, you can query all of your security issues and environment context such as assets inventory, exposure to internet, permissions, lateral movement between resources and more.
16+
With the cloud security explorer, you can query all of your security issues and environment context such as assets inventory, exposure to internet, permissions, and lateral movement between resources and across multiple clouds (Azure and AWS).
1717

18-
Learn more about [the cloud security graph, attack path analysis, and the cloud security explorer?](concept-attack-path.md).
18+
Learn more about [the cloud security graph, attack path analysis, and the cloud security explorer](concept-attack-path.md).
1919

20-
## Availability
20+
## Prerequisites
2121

22-
| Aspect | Details |
23-
|--|--|
24-
| Release state | Preview |
25-
| Prerequisite | - [Enable agentless scanning](enable-vulnerability-assessment-agentless.md) <br> - [Enable Defender for CSPM](enable-enhanced-security.md) <br> - [Enable Defender for Containers](defender-for-containers-enable.md), and install the relevant agents in order to view attack paths that are related to containers. This will also give you the ability to [query](how-to-manage-cloud-security-explorer.md#build-a-query-with-the-cloud-security-explorer) containers data plane workloads in security explorer. |
26-
| Required plans | - Defender Cloud Security Posture Management (CSPM) enabled |
27-
| Required roles and permissions: | - **Security Reader** <br> - **Security Admin** <br> - **Reader** <br> - **Contributor** <br> - **Owner** |
28-
| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds (Azure, AWS) <br>:::image type="icon" source="./media/icons/no-icon.png"::: Commercial clouds (GCP) <br>:::image type="icon" source="./media/icons/no-icon.png"::: National (Azure Government, Azure China 21Vianet) |
22+
- You must [enable agentless scanning](enable-vulnerability-assessment-agentless.md).
23+
24+
- You must [enable Defender for CSPM](enable-enhanced-security.md).
25+
26+
- You must [enable Defender for Containers](defender-for-containers-enable.md), and install the relevant agents in order to view attack paths that are related to containers.
27+
28+
When you enable Defender for Containers, you also gain the ability to [query](how-to-manage-cloud-security-explorer.md#build-a-query-with-the-cloud-security-explorer) containers data plane workloads in the security explorer.
29+
30+
- Required roles and permissions:
31+
- Security Reader
32+
- Security Admin
33+
- Reader
34+
- Contributor
35+
- Owner
36+
37+
Check the [cloud availability tables](supported-machines-endpoint-solutions-clouds-servers.md) to see which government and cloud environments are supported.
2938

3039
## Build a query with the cloud security explorer
3140

32-
You can use the cloud security explorer to build queries that can proactively hunt for security risks in your environments.
41+
The cloud security explorer allows you to build queries that can proactively hunt for security risks in your environments with dynamic and efficient features such as:
42+
43+
- **Multi-cloud and multi-resource queries** - The entity selection control filters are grouped and combined into logical control categories to assist you in building queries across cloud environments and across resources simultaneously.
44+
45+
- **Custom Search** - Use the dropdown menus to apply filters to build your query.
46+
47+
- **Query templates** - Use any of the available pre-built query templates to more efficiently build your query.
48+
49+
- **Share query link** - Copy and share a link of your query with other people.
3350

3451
**To build a query**:
3552

3653
1. Sign in to the [Azure portal](https://portal.azure.com).
3754

3855
1. Navigate to **Microsoft Defender for Cloud** > **Cloud Security Explorer**.
3956

40-
:::image type="content" source="media/concept-cloud-map/cloud-security-explorer.png" alt-text="Screenshot of the cloud security explorer page." lightbox="media/concept-cloud-map/cloud-security-explorer.png":::
57+
:::image type="content" source="media/concept-cloud-map/cloud-security-explorer-main-page.png" alt-text="Screenshot of the cloud security explorer page." lightbox="media/concept-cloud-map/cloud-security-explorer-main-page.png":::
4158

42-
1. Select a resource from the drop-down menu.
59+
1. Search for and select a resource from the drop-down menu.
4360

44-
:::image type="content" source="media/how-to-manage-cloud-security/select-resource.png" alt-text="Screenshot of the resource drop-down menu.":::
61+
:::image type="content" source="media/how-to-manage-cloud-security/cloud-security-explorer-select-resource.png" alt-text="Screenshot of the resource drop-down menu." lightbox="media/how-to-manage-cloud-security/cloud-security-explorer-select-resource.png":::
4562

46-
1. Select **+** to add other filters to your query. For each filter selected you can add more subfilters as needed.
63+
1. Select **+** to add other filters to your query.
64+
65+
:::image type="content" source="media/how-to-manage-cloud-security/cloud-security-explorer-query-search.png" alt-text="Screenshot that shows a full query and where to select on the screen to perform the search." lightbox="media/how-to-manage-cloud-security/cloud-security-explorer-query-search.png":::
4766

48-
1. Select **Search**.
67+
1. Add subfilters as needed.
4968

50-
:::image type="content" source="media/how-to-manage-cloud-security/search-query.png" alt-text="Screenshot that shows a full query and where to select on the screen to perform the search.":::
69+
1. After building your query, select **Search** to run the query.
5170

52-
The results will populate on the bottom of the page.
71+
:::image type="content" source="media/how-to-manage-cloud-security/cloud-security-explorer-query-search-populated.png" alt-text="Screenshot that shows where to select search to run the query and results populated." lightbox="media/how-to-manage-cloud-security/cloud-security-explorer-query-search-populated.png":::
5372

5473
## Query templates
5574

56-
You can select an existing query template from the bottom of the page by selecting **Open query**.
57-
58-
:::image type="content" source="media/how-to-manage-cloud-security/query-template.png" alt-text="Screenshot that shows you where the query templates are located.":::
59-
60-
You can alter any template to search for specific results by changing the query and selecting search.
75+
Query templates are pre-formatted searches using commonly used filters. Use one of the existing query templates from the bottom of the page by selecting **Open query**.
6176

62-
## Query options
77+
:::image type="content" source="media/how-to-manage-cloud-security/cloud-security-explorer-query-templates.png" alt-text="Screenshot that shows you the location of the query templates." lightbox="media/how-to-manage-cloud-security/cloud-security-explorer-query-templates.png":::
6378

64-
The following information can be queried in the cloud security explorer:
79+
You can modify any template to search for specific results by changing the query and selecting **Search**.
6580

66-
- **Recommendations** - All Defender for Cloud security recommendations.
6781

68-
- **Vulnerabilities** - All vulnerabilities found by Defender for Cloud.
82+
## Share a query
6983

70-
- **Insights** - Contextual data about your cloud resources.
71-
72-
- **Connections** - Connections that are identified between cloud resources in your environment.
84+
Use the query link to share a query with other people. After creating a query, select **Share query link**. The link is copied to your clipboard.
7385

74-
You can review the [full list of recommendations, insights and connections](attack-path-reference.md).
86+
:::image type="content" source="media/how-to-manage-cloud-security/cloud-security-explorer-share-query.png" alt-text="Screenshot showing the Share Query Link icon." lightbox="media/how-to-manage-cloud-security/cloud-security-explorer-share-query.png":::
7587

7688
## Next steps
7789

78-
View the [reference list of attack paths and cloud security graph components](attack-path-reference.md)
90+
View the [reference list of attack paths and cloud security graph components](attack-path-reference.md).
7991

80-
Learn about the [Defender CSPM plan options](concept-cloud-security-posture-management.md#defender-cspm-plan-options)
92+
Learn about the [Defender CSPM plan options](concept-cloud-security-posture-management.md#defender-cspm-plan-options).
82.9 KB
Loading
93.3 KB
Loading
43.8 KB
Loading
99.1 KB
Loading
111 KB
Loading
85.2 KB
Loading

articles/defender-for-cloud/release-notes.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Release notes for Microsoft Defender for Cloud
33
description: A description of what's new and changed in Microsoft Defender for Cloud
44
ms.topic: overview
5-
ms.date: 02/09/2023
5+
ms.date: 02/13/2023
66
---
77

88
# What's new in Microsoft Defender for Cloud?
@@ -20,10 +20,17 @@ To learn about *planned* changes that are coming soon to Defender for Cloud, see
2020

2121
Updates in February include:
2222

23+
- [Enhanced Cloud Security Explorer](#enhanced-cloud-security-explorer)
2324
- [Recommendation to find vulnerabilities in running container images for Linux released for General Availability (GA)](#recommendation-to-find-vulnerabilities-in-running-container-images-released-for-general-availability-ga)
2425
- [Announcing support for the AWS CIS 1.5.0 compliance standard](#announcing-support-for-the-aws-cis-150-compliance-standard)
2526
- [Microsoft Defender for DevOps (preview) is now available in other regions](#microsoft-defender-for-devops-preview-is-now-available-in-other-regions)
2627

28+
### Enhanced Cloud Security Explorer
29+
30+
An improved version of the cloud security explorer includes a refreshed user experience that removes query friction dramatically, added the ability to run multicloud and multi-resource queries, and embedded documentation for each query option.
31+
32+
The Cloud Security Explorer now allows you to run cloud-abstract queries across resources. You can use either the pre-built query templates or use the custom search to apply filters to build your query. Learn [how to manage Cloud Security Explorer](how-to-manage-cloud-security-explorer.md).
33+
2734
### Recommendation to find vulnerabilities in running container images released for General Availability (GA)
2835

2936
The [Running container images should have vulnerability findings resolved](defender-for-containers-vulnerability-assessment-azure.md#view-vulnerabilities-for-images-running-on-your-aks-clusters) recommendation for Linux is now GA. The recommendation is used to identify unhealthy resources and is included in the calculations of your secure score.

0 commit comments

Comments
 (0)