You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/remediate-server-secrets.md
+4-12Lines changed: 4 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,6 @@ Microsoft Defender for Cloud provides secrets scanning for virtual machines (VMs
12
12
13
13
This article helps you to identify and remediate security risks with VM secrets.
14
14
15
-
16
15
## Prerequisites
17
16
18
17
- An Azure account. If you don't already have an Azure account, you can [create your Azure free account today](https://azure.microsoft.com/free/).
@@ -25,12 +24,9 @@ This article helps you to identify and remediate security risks with VM secrets.
25
24
26
25
-[Agentless machine scanning](enable-vulnerability-assessment-agentless.md#enabling-agentless-scanning-for-machines) must be enabled. Learn more about [agentless scanning](concept-agentless-data-collection.md#availability).
27
26
28
-
29
-
30
27
## Remediate secrets with attack paths
31
28
32
-
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph) to expose exploitable paths that attackers might use to reach high-impact assets. Defender for Cloud provides a number of attack paths scenarios for VM secrets.
33
-
29
+
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph) to expose exploitable paths that attackers might use to reach high-impact assets. Defender for Cloud provides several attack paths scenarios for VM secrets.
34
30
35
31
1. Sign in to the [Azure portal](https://portal.azure.com).
36
32
@@ -46,7 +42,6 @@ Attack path analysis is a graph-based algorithm that scans your [cloud security
46
42
47
43
If a secret is found on your resource, that resource triggers an affiliated recommendation that is located under the Remediate vulnerabilities security control on the Recommendations page. Defender for Cloud provides a [number of VM secrets security recommendations](secrets-scanning-servers.md#security-recommendations).
48
44
49
-
50
45
1. Sign in to the [Azure portal](https://portal.azure.com).
51
46
52
47
1. Navigate to **Microsoft Defender for Cloud** > **Recommendations**.
@@ -65,21 +60,20 @@ If a secret is found on your resource, that resource triggers an affiliated reco
65
60
66
61
1. In the Findings section, select a secret to view detailed information about the secret.
67
62
68
-
:::image type="content" source="media/secret-scanning/select-findings.png" alt-text="Screenshot that shows the detailed information of a secret after you have selected the secret in the findings section." lightbox="media/secret-scanning/select-findings.png":::
63
+
:::image type="content" source="media/secret-scanning/select-findings.png" alt-text="Screenshot that shows the detailed information of a secret after you selected the secret in the findings section." lightbox="media/secret-scanning/select-findings.png":::
69
64
70
65
1. Expand **Remediation steps** and follow the listed steps.
71
66
72
67
1. Expand **Affected resources** to review the resources affected by this secret.
73
68
74
-
1. (Optional) You can select an affected resource to see that resource's information.
69
+
1. (Optional) You can select an affected resource to see the resource's information.
75
70
76
71
Secrets that don't have a known attack path are referred to as `secrets without an identified target resource`.
77
72
78
73
## Remediate secrets with cloud security explorer
79
74
80
75
The [cloud security explorer](concept-attack-path.md#what-is-cloud-security-explorer) enables you to proactively identify potential security risks within your cloud environment. It does so by querying the [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph), which is the context engine of Defender for Cloud. Cloud security explorer provides a [number of query templates](secrets-scanning-servers.md#) for investigating VM secrets issues.
81
76
82
-
83
77
1. Sign in to the [Azure portal](https://portal.azure.com).
84
78
85
79
1. Navigate to **Microsoft Defender for Cloud** > **Cloud Security Explorer**.
@@ -94,8 +88,7 @@ If you don't want to use any of the available templates, you can also [build you
94
88
95
89
## Remediate secrets in the asset inventory
96
90
97
-
Your [asset inventory](asset-inventory.md) shows the [security posture](concept-cloud-security-posture-management.md) of the resources you've connected to Defender for Cloud. You can view the secrets discovered on a specific machine.
98
-
91
+
Your [asset inventory](asset-inventory.md) shows the [security posture](concept-cloud-security-posture-management.md) of the resources you connected to Defender for Cloud. You can view the secrets discovered on a specific machine.
99
92
100
93
1. Sign in to the [Azure portal](https://portal.azure.com).
101
94
@@ -110,4 +103,3 @@ Your [asset inventory](asset-inventory.md) shows the [security posture](concept-
110
103
1. Select a secret to view extra details of that secret.
111
104
112
105
Different types of secrets have different sets of additional information. For example, for plaintext SSH private keys, the information includes related public keys (mapping between the private key to the authorized keys’ file we discovered or mapping to a different virtual machine that contains the same SSH private key identifier).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/security-policy-concept.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,8 +69,7 @@ Every recommendation in Defender for Cloud has an associated risk level that rep
69
69
70
70
The MCSB standard is an Azure Policy initiative that includes multiple compliance controls. One of these controls is "Storage accounts should restrict network access using virtual network rules."
71
71
72
-
As Defender for Cloud continually assesses and finds resources that don't satisfy this control, it marks the resources as noncompliant and triggers a recommendation. In this case, guidance is to harden Azure Storage accounts that aren't protected with virtual network rules.
73
-
72
+
Defender for Cloud continuously assesses resources. If it finds any that don’t satisfy this control, it marks them as noncompliant and triggers a recommendation. In this case, guidance is to harden Azure Storage accounts that aren't protected with virtual network rules.
0 commit comments