You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/alerts-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ This article describes security alerts and notifications in Microsoft Defender f
14
14
## What are security alerts?
15
15
Security alerts are the notifications generated by Defender for Cloud and Defender for Cloud plans when threats are identified in your cloud, hybrid, or on-premises environment.
16
16
17
-
- Security alerts are triggered by advanced detections in Defender for Cloud, and are available when you enable Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#cloud-workload-protections-cwp).
17
+
- Security alerts are triggered by advanced detections in Defender for Cloud, and are available when you enable Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads).
18
18
- Each alert provides details of affected resources, issues, and remediation recommendations.
19
19
- Defender for Cloud classifies alerts and prioritizes them by severity in the Defender for Cloud portal.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/alerts-schemas.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.date: 11/09/2021
9
9
10
10
# Security alerts schemas
11
11
12
-
If your subscription has Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#cloud-workload-protections-cwp) enabled, you'll receive security alerts when Defender for Cloud detects threats to their resources.
12
+
If your subscription has Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads) enabled, you'll receive security alerts when Defender for Cloud detects threats to their resources.
13
13
14
14
You can view these security alerts in Microsoft Defender for Cloud's pages - [overview dashboard](overview-page.md), [alerts](tutorial-security-incident.md), [resource health pages](investigate-resource-health.md), or [workload protections dashboard](workload-protections-dashboard.md) - and through external tools such as:
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/asset-inventory.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ The asset inventory page of Microsoft Defender for Cloud shows the [security pos
12
12
13
13
Use this view and its filters to address such questions as:
14
14
15
-
- Which of my subscriptions with [Defender plans](defender-for-cloud-introduction.md#cloud-workload-protections-cwp) enabled have outstanding recommendations?
15
+
- Which of my subscriptions with [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads) enabled have outstanding recommendations?
16
16
- Which of my machines with the tag 'Production' are missing the Log Analytics agent?
17
17
- How many of my machines tagged with a specific tag have outstanding recommendations?
18
18
- Which machines in a specific resource group have a known vulnerability (using a CVE number)?
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-cloud-introduction.md
+5-7Lines changed: 5 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ Microsoft Defender for Cloud is a cloud-native application protection platform (
17
17
18
18
## Secure cloud applications
19
19
20
-
Defender for Cloud helps you to incorporate good security practices early during the software development process. You can protect your code management environments and your code pipelines, and get insights into your development environment security posture from a single location. Defender for Cloud currently supports Defender for DevOps, and Defender for GitHub.
20
+
Defender for Cloud helps you to incorporate good security practices early during the software development process, or DevSecOps. You can protect your code management environments and your code pipelines, and get insights into your development environment security posture from a single location. Defender for Cloud currently includes Defender for DevOps.
21
21
22
22
Today’s applications require security awareness at the code, infrastructure, and runtime levels to make sure that deployed applications are hardened against attacks.
23
23
@@ -29,7 +29,7 @@ Today’s applications require security awareness at the code, infrastructure, a
29
29
30
30
The security of your cloud and on-premises resources depends on proper configuration and deployment. Defender for Cloud recommendations identify the steps that you can take to secure your environment.
31
31
32
-
Defender for Cloud includes Foundational CSPM (Free) capabilities for free. You can also enable advanced CSPM capabilities and cloud workload protections by enabling paid Defender plans.
32
+
Defender for Cloud includes Foundational CSPM (Free) capabilities for free. You can also enable advanced CSPM capabilities by enabling paid Defender plans.
33
33
34
34
| Capability | What problem does it solve? | Get started | Defender plan and pricing |
@@ -45,11 +45,9 @@ Defender for Cloud includes Foundational CSPM (Free) capabilities for free. You
45
45
46
46
## Protect cloud workloads
47
47
48
-
### Cloud workload protections
49
-
50
48
Proactive security principles require that you implement security practices that protect your workloads from threats. Cloud workload protections (CWP) surface workload-specific recommendations that lead you to the right security controls to protect your workloads.
51
49
52
-
When your environment is threatened, you need to know right away the nature and severity of the threat so you can plan your response. After you identify a threat in your environment, you need to quickly respond to limit the risk to your resources.
50
+
When your environment is threatened, security alerts right away indicate the nature and severity of the threat so you can plan your response. After you identify a threat in your environment, you need to quickly respond to limit the risk to your resources.
53
51
54
52
| Capability | What problem does it solve? | Get started | Defender plan and pricing |
@@ -58,8 +56,8 @@ When your environment is threatened, you need to know right away the nature and
58
56
| Protect cloud databases | Protect your entire database estate with attack detection and threat response for the most popular database types in Azure to protect the database engines and data types, according to their attack surface and security risks. |[Deploy specialized protections for cloud and on-premises databases](quickstart-enable-database-protections.md)| - [Defender for Azure SQL Databases](https://azure.microsoft.com/pricing/details/defender-for-cloud/)</br>- [Defender for SQL servers on machines](https://azure.microsoft.com/pricing/details/defender-for-cloud/)</br>- [Defender for Open-source relational databases](https://azure.microsoft.com/pricing/details/defender-for-cloud/)</br>- [Defender for Azure Cosmos DB](https://azure.microsoft.com/pricing/details/defender-for-cloud/)|
59
57
| Protect containers | Secure your containers so you can improve, monitor, and maintain the security of your clusters, containers, and their applications with environment hardening, vulnerability assessments, and run-time protection. |[Find security risks in your containers](defender-for-containers-introduction.md)|[Defender for Containers](https://azure.microsoft.com/pricing/details/defender-for-cloud/)|
60
58
|[Infrastructure service insights](asset-inventory.md)| Diagnose weaknesses in your application infrastructure that can leave your environment susceptible to attack. | - [Identify attacks targeting applications running over App Service](defender-for-app-service-introduction.md)</br>- [Detect attempts to exploit Key Vault accounts](defender-for-key-vault-introduction.md)</br>- [Get alerted on suspicious Resource Manager operations](defender-for-resource-manager-introduction.md)</br>- [Expose anomalous DNS activities](defender-for-dns-introduction.md)| - [Defender for App Service](https://azure.microsoft.com/pricing/details/defender-for-cloud/)</br></br>- [Defender for Key Vault](https://azure.microsoft.com/pricing/details/defender-for-cloud/)</br></br>- [Defender for Resource Manager](https://azure.microsoft.com/pricing/details/defender-for-cloud/)</br></br>- [Defender for DNS](https://azure.microsoft.com/pricing/details/defender-for-cloud/)|
61
-
|[Security alerts](alerts-overview.md)| Get informed of real-time events that threaten the security of your environment. Alerts are categorized and assigned severity levels to indicate proper responses. |[Manage security alerts](managing-and-responding-alerts.md)|[Any workload protection Defender plan](#cloud-workload-protections-cwp)|
62
-
|[Security incidents](alerts-overview.md#what-are-security-incidents)| Correlate alerts to identify attack patterns and integrate with Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), and IT Service Management (ITSM) solutions to respond to threats and limit the risk to your resources. |[Export alerts to SIEM, SOAR, or ITSM systems](export-to-siem.md)|[Any workload protection Defender plan](#cloud-workload-protections-cwp)|
59
+
|[Security alerts](alerts-overview.md)| Get informed of real-time events that threaten the security of your environment. Alerts are categorized and assigned severity levels to indicate proper responses. |[Manage security alerts](managing-and-responding-alerts.md)|[Any workload protection Defender plan](#protect-cloud-workloads)|
60
+
|[Security incidents](alerts-overview.md#what-are-security-incidents)| Correlate alerts to identify attack patterns and integrate with Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), and IT Service Management (ITSM) solutions to respond to threats and limit the risk to your resources. |[Export alerts to SIEM, SOAR, or ITSM systems](export-to-siem.md)|[Any workload protection Defender plan](#protect-cloud-workloads)|
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-cloud-planning-and-operations-guide.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -123,7 +123,7 @@ Defenders for Cloud policies contain the following components:
123
123
-[Security policy](tutorial-security-policy.md): an [Azure Policy](../governance/policy/overview.md) that determines which controls are monitored and recommended by Defender for Cloud. You can also use Azure Policy to create new definitions, define more policies, and assign policies across management groups.
124
124
125
125
-[Email notifications](configure-email-notifications.md): security contacts and notification settings.
126
-
-[Pricing tier](defender-for-cloud-introduction.md#cloud-workload-protections-cwp): with or without Microsoft Defender for Cloud's Defender plans, which determine which Defender for Cloud features are available for resources in scope (can be specified for subscriptions and workspaces using the API).
126
+
-[Pricing tier](defender-for-cloud-introduction.md#protect-cloud-workloads): with or without Microsoft Defender for Cloud's Defender plans, which determine which Defender for Cloud features are available for resources in scope (can be specified for subscriptions and workspaces using the API).
127
127
128
128
> [!NOTE]
129
129
> Specifying a security contact ensures that Azure can reach the right person in your organization if a security incident occurs. Read [Provide security contact details in Defender for Cloud](configure-email-notifications.md) for more information on how to enable this recommendation.
@@ -167,7 +167,7 @@ In the Azure portal, you can browse to see a list of your Log Analytics workspac
167
167
168
168
For workspaces created by Defender for Cloud, data is retained for 30 days. For existing workspaces, retention is based on the workspace pricing tier. If you want, you can also use an existing workspace.
169
169
170
-
If your agent reports to a workspace other than the **default** workspace, any Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#cloud-workload-protections-cwp) that you've enabled on the subscription should also be enabled on the workspace.
170
+
If your agent reports to a workspace other than the **default** workspace, any Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads) that you've enabled on the subscription should also be enabled on the workspace.
171
171
172
172
> [!NOTE]
173
173
> Microsoft makes strong commitments to protect the privacy and security of this data. Microsoft adheres to strict compliance and security guidelines—from coding to operating a service. For more information about data handling and privacy, read [Defender for Cloud Data Security](data-security.md).
0 commit comments