You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/upcoming-changes.md
+51-4Lines changed: 51 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Important changes coming to Microsoft Defender for Cloud
3
3
description: Upcoming changes to Microsoft Defender for Cloud that you might need to be aware of and for which you might need to plan
4
4
ms.topic: overview
5
-
ms.date: 02/09/2023
5
+
ms.date: 02/12/2023
6
6
---
7
7
8
8
# Important upcoming changes to Microsoft Defender for Cloud
@@ -22,6 +22,7 @@ If you're looking for the latest release notes, you'll find them in the [What's
22
22
|[Three alerts in Defender for Azure Resource Manager plan will be deprecated](#three-alerts-in-defender-for-azure-resource-manager-plan-will-be-deprecated)| March 2023 |
23
23
|[Alerts automatic export to Log Analytics workspace will be deprecated](#alerts-automatic-export-to-log-analytics-workspace-will-be-deprecated)| March 2023 |
24
24
|[Deprecation and improvement of selected alerts for Windows and Linux Servers](#deprecation-and-improvement-of-selected-alerts-for-windows-and-linux-servers)| April 2023 |
25
+
|[Multiple changes to identity recommendations](#multiple-changes-to-identity-recommendations)| August 2023 |
25
26
26
27
### The built-in policy \[Preview]: Private endpoint should be configured for Key Vault will be deprecated
27
28
@@ -35,20 +36,20 @@ The related [policy definition](https://ms.portal.azure.com/#view/Microsoft_Azur
35
36
36
37
**Estimated date for change: March 2023**
37
38
38
-
As we continue to improve the quality of our alerts, the following three alerts from the Defender for ARM plan will be deprecated:
39
+
As we continue to improve the quality of our alerts, the following three alerts from the Defender for Azure Resource Manager plan will be deprecated:
39
40
1.`Activity from a risky IP address (ARM.MCAS_ActivityFromAnonymousIPAddresses)`
40
41
1.`Activity from infrequent country (ARM.MCAS_ActivityFromInfrequentCountry)`
You can learn more details about each of these alerts from the [alerts reference list](alerts-reference.md#alerts-resourcemanager).
44
45
45
-
In the scenario where an activity from a suspicious IP address is detected, one of the following Defender for ARM plan alerts `Azure Resource Manager operation from suspicious IP address` or `Azure Resource Manager operation from suspicious proxy IP address` will be present.
46
+
In the scenario where an activity from a suspicious IP address is detected, one of the following Defender for Azure Resource Manager plan alerts `Azure Resource Manager operation from suspicious IP address` or `Azure Resource Manager operation from suspicious proxy IP address` will be present.
46
47
47
48
### Alerts automatic export to Log Analytics workspace will be deprecated
48
49
49
50
**Estimated date for change: March 2023**
50
51
51
-
Currently, Defender for Cloud security alerts are automatically exported to a default Log Analytics workspace on the resource level. This causes an indeterministic behavior and therefore, this feature is set to be deprecated.
52
+
Currently, Defenders for Cloud security alerts are automatically exported to a default Log Analytics workspace on the resource level. This causes an indeterministic behavior and therefore, this feature is set to be deprecated.
52
53
53
54
You can export your security alerts to a dedicated Log Analytics workspace with the [Continuous Export](continuous-export.md#set-up-a-continuous-export) feature.
54
55
If you have already configured continuous export of your alerts to a Log Analytics workspace, no further action is required.
@@ -70,6 +71,52 @@ You can learn more about [Microsoft Defender for Endpoint onboarding options](in
70
71
You can also view the [full list of alerts](alerts-reference.md#defender-for-servers-alerts-to-be-deprecated) that are set to be deprecated.
71
72
72
73
Read the [Microsoft Defender for Cloud blog](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-servers-security-alerts-improvements/ba-p/3714175).
74
+
75
+
### Multiple changes to identity recommendations
76
+
77
+
**Estimated date for change: August 2023**
78
+
79
+
We announced previously the [availability of identity recommendations V2 (preview)](release-notes.md#extra-recommendations-added-to-identity), which included enhanced capabilities.
80
+
81
+
As part of these changes, the following recommendations will be released as General Availability (GA) and replace the V1 recommendations that are set to be deprecated.
82
+
83
+
#### General Availability (GA) release of identity recommendations V2
84
+
85
+
The following security recommendations will be released as GA and replace the V1 recommendations:
86
+
87
+
|Recommendation | Assessment Key|
88
+
|--|--|
89
+
|Accounts with owner permissions on Azure resources should be MFA enabled | 6240402e-f77c-46fa-9060-a7ce53997754 |
90
+
|Accounts with write permissions on Azure resources should be MFA enabled | c0cb17b2-0607-48a7-b0e0-903ed22de39b |
91
+
| Accounts with read permissions on Azure resources should be MFA enabled | dabc9bc4-b8a8-45bd-9a5a-43000df8aa1c |
92
+
| Guest accounts with owner permissions on Azure resources should be removed | 20606e75-05c4-48c0-9d97-add6daa2109a |
93
+
| Guest accounts with write permissions on Azure resources should be removed | 0354476c-a12a-4fcc-a79d-f0ab7ffffdbb |
94
+
| Guest accounts with read permissions on Azure resources should be removed | fde1c0c9-0fd2-4ecc-87b5-98956cbc1095 |
95
+
| Blocked accounts with owner permissions on Azure resources should be removed | 050ac097-3dda-4d24-ab6d-82568e7a50cf |
96
+
| Blocked accounts with read and write permissions on Azure resources should be removed | 1ff0b4c9-ed56-4de6-be9c-d7ab39645926 |
97
+
98
+
#### Deprecation of identity recommendations V1
99
+
100
+
The following security recommendations will be deprecated as part of this change:
101
+
102
+
The following security recommendations will be deprecated as part of this change:
103
+
104
+
105
+
| Recommendation | Assessment Key |
106
+
|--|--|
107
+
| MFA should be enabled on accounts with owner permissions on subscriptions | 94290b00-4d0c-d7b4-7cea-064a9554e681 |
108
+
| MFA should be enabled on accounts with write permissions on subscriptions | 57e98606-6b1e-6193-0e3d-fe621387c16b |
109
+
| MFA should be enabled on accounts with read permissions on subscriptions | 151e82c5-5341-a74b-1eb0-bc38d2c84bb5 |
110
+
| External accounts with owner permissions should be removed from subscriptions | c3b6ae71-f1f0-31b4-e6c1-d5951285d03d |
111
+
| External accounts with write permissions should be removed from subscriptions | 04e7147b-0deb-9796-2e5c-0336343ceb3d |
112
+
| External accounts with read permissions should be removed from subscriptions | a8c6a4ad-d51e-88fe-2979-d3ee3c864f8b |
113
+
| Deprecated accounts with owner permissions should be removed from subscriptions | e52064aa-6853-e252-a11e-dffc675689c2 |
114
+
| Deprecated accounts should be removed from subscriptions | 00c6d40b-e990-6acf-d4f3-471e747a27c4 |
115
+
116
+
We recommend updating custom scripts, workflows, and governance rules to correspond with the V2 recommendations.
117
+
118
+
We've improved the coverage of the V2 identity recommendations by scanning all Azure resources (rather than just subscriptions) which allows security administrators to view role assignments per account. These changes may result in changes to your Secure Score throughout the GA process.
119
+
73
120
## Next steps
74
121
75
122
For all recent changes to Defender for Cloud, see [What's new in Microsoft Defender for Cloud?](release-notes.md).
0 commit comments