Skip to content

Commit 0a4be6f

Browse files
authored
Merge pull request #227101 from ElazarK/WI63257-identity-recommendations
identity recommendations
2 parents 4845853 + d355fea commit 0a4be6f

File tree

1 file changed

+51
-4
lines changed

1 file changed

+51
-4
lines changed

articles/defender-for-cloud/upcoming-changes.md

Lines changed: 51 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Important changes coming to Microsoft Defender for Cloud
33
description: Upcoming changes to Microsoft Defender for Cloud that you might need to be aware of and for which you might need to plan
44
ms.topic: overview
5-
ms.date: 02/09/2023
5+
ms.date: 02/12/2023
66
---
77

88
# Important upcoming changes to Microsoft Defender for Cloud
@@ -22,6 +22,7 @@ If you're looking for the latest release notes, you'll find them in the [What's
2222
| [Three alerts in Defender for Azure Resource Manager plan will be deprecated](#three-alerts-in-defender-for-azure-resource-manager-plan-will-be-deprecated) | March 2023 |
2323
| [Alerts automatic export to Log Analytics workspace will be deprecated](#alerts-automatic-export-to-log-analytics-workspace-will-be-deprecated) | March 2023 |
2424
| [Deprecation and improvement of selected alerts for Windows and Linux Servers](#deprecation-and-improvement-of-selected-alerts-for-windows-and-linux-servers) | April 2023 |
25+
| [Multiple changes to identity recommendations](#multiple-changes-to-identity-recommendations) | August 2023 |
2526

2627
### The built-in policy \[Preview]: Private endpoint should be configured for Key Vault will be deprecated
2728

@@ -35,20 +36,20 @@ The related [policy definition](https://ms.portal.azure.com/#view/Microsoft_Azur
3536

3637
**Estimated date for change: March 2023**
3738

38-
As we continue to improve the quality of our alerts, the following three alerts from the Defender for ARM plan will be deprecated:
39+
As we continue to improve the quality of our alerts, the following three alerts from the Defender for Azure Resource Manager plan will be deprecated:
3940
1. `Activity from a risky IP address (ARM.MCAS_ActivityFromAnonymousIPAddresses)`
4041
1. `Activity from infrequent country (ARM.MCAS_ActivityFromInfrequentCountry)`
4142
1. `Impossible travel activity (ARM.MCAS_ImpossibleTravelActivity)`
4243

4344
You can learn more details about each of these alerts from the [alerts reference list](alerts-reference.md#alerts-resourcemanager).
4445

45-
In the scenario where an activity from a suspicious IP address is detected, one of the following Defender for ARM plan alerts `Azure Resource Manager operation from suspicious IP address` or `Azure Resource Manager operation from suspicious proxy IP address` will be present.
46+
In the scenario where an activity from a suspicious IP address is detected, one of the following Defender for Azure Resource Manager plan alerts `Azure Resource Manager operation from suspicious IP address` or `Azure Resource Manager operation from suspicious proxy IP address` will be present.
4647

4748
### Alerts automatic export to Log Analytics workspace will be deprecated
4849

4950
**Estimated date for change: March 2023**
5051

51-
Currently, Defender for Cloud security alerts are automatically exported to a default Log Analytics workspace on the resource level. This causes an indeterministic behavior and therefore, this feature is set to be deprecated.
52+
Currently, Defenders for Cloud security alerts are automatically exported to a default Log Analytics workspace on the resource level. This causes an indeterministic behavior and therefore, this feature is set to be deprecated.
5253

5354
You can export your security alerts to a dedicated Log Analytics workspace with the [Continuous Export](continuous-export.md#set-up-a-continuous-export) feature.
5455
If you have already configured continuous export of your alerts to a Log Analytics workspace, no further action is required.
@@ -70,6 +71,52 @@ You can learn more about [Microsoft Defender for Endpoint onboarding options](in
7071
You can also view the [full list of alerts](alerts-reference.md#defender-for-servers-alerts-to-be-deprecated) that are set to be deprecated.
7172

7273
Read the [Microsoft Defender for Cloud blog](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-servers-security-alerts-improvements/ba-p/3714175).
74+
75+
### Multiple changes to identity recommendations
76+
77+
**Estimated date for change: August 2023**
78+
79+
We announced previously the [availability of identity recommendations V2 (preview)](release-notes.md#extra-recommendations-added-to-identity), which included enhanced capabilities.
80+
81+
As part of these changes, the following recommendations will be released as General Availability (GA) and replace the V1 recommendations that are set to be deprecated.
82+
83+
#### General Availability (GA) release of identity recommendations V2
84+
85+
The following security recommendations will be released as GA and replace the V1 recommendations:
86+
87+
|Recommendation | Assessment Key|
88+
|--|--|
89+
|Accounts with owner permissions on Azure resources should be MFA enabled | 6240402e-f77c-46fa-9060-a7ce53997754 |
90+
|Accounts with write permissions on Azure resources should be MFA enabled | c0cb17b2-0607-48a7-b0e0-903ed22de39b |
91+
| Accounts with read permissions on Azure resources should be MFA enabled | dabc9bc4-b8a8-45bd-9a5a-43000df8aa1c |
92+
| Guest accounts with owner permissions on Azure resources should be removed | 20606e75-05c4-48c0-9d97-add6daa2109a |
93+
| Guest accounts with write permissions on Azure resources should be removed | 0354476c-a12a-4fcc-a79d-f0ab7ffffdbb |
94+
| Guest accounts with read permissions on Azure resources should be removed | fde1c0c9-0fd2-4ecc-87b5-98956cbc1095 |
95+
| Blocked accounts with owner permissions on Azure resources should be removed | 050ac097-3dda-4d24-ab6d-82568e7a50cf |
96+
| Blocked accounts with read and write permissions on Azure resources should be removed | 1ff0b4c9-ed56-4de6-be9c-d7ab39645926 |
97+
98+
#### Deprecation of identity recommendations V1
99+
100+
The following security recommendations will be deprecated as part of this change:
101+
102+
The following security recommendations will be deprecated as part of this change:
103+
104+
105+
| Recommendation | Assessment Key |
106+
|--|--|
107+
| MFA should be enabled on accounts with owner permissions on subscriptions | 94290b00-4d0c-d7b4-7cea-064a9554e681 |
108+
| MFA should be enabled on accounts with write permissions on subscriptions | 57e98606-6b1e-6193-0e3d-fe621387c16b |
109+
| MFA should be enabled on accounts with read permissions on subscriptions | 151e82c5-5341-a74b-1eb0-bc38d2c84bb5 |
110+
| External accounts with owner permissions should be removed from subscriptions | c3b6ae71-f1f0-31b4-e6c1-d5951285d03d |
111+
| External accounts with write permissions should be removed from subscriptions | 04e7147b-0deb-9796-2e5c-0336343ceb3d |
112+
| External accounts with read permissions should be removed from subscriptions | a8c6a4ad-d51e-88fe-2979-d3ee3c864f8b |
113+
| Deprecated accounts with owner permissions should be removed from subscriptions | e52064aa-6853-e252-a11e-dffc675689c2 |
114+
| Deprecated accounts should be removed from subscriptions | 00c6d40b-e990-6acf-d4f3-471e747a27c4 |
115+
116+
We recommend updating custom scripts, workflows, and governance rules to correspond with the V2 recommendations.
117+
118+
We've improved the coverage of the V2 identity recommendations by scanning all Azure resources (rather than just subscriptions) which allows security administrators to view role assignments per account. These changes may result in changes to your Secure Score throughout the GA process.
119+
73120
## Next steps
74121

75122
For all recent changes to Defender for Cloud, see [What's new in Microsoft Defender for Cloud?](release-notes.md).

0 commit comments

Comments
 (0)