Skip to content

Commit 0be8f2c

Browse files
committed
Move FAQs to concepts
1 parent df75108 commit 0be8f2c

20 files changed

+103
-103
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,18 @@
1313
- name: Important upcoming changes
1414
displayName: release notes, changelog, news
1515
href: upcoming-changes.md
16+
- name: Common questions
17+
items:
18+
- name: General questions
19+
href: faq-general.yml
20+
- name: Permissions questions
21+
href: faq-permissions.yml
22+
- name: Data collection and agent questions
23+
href: faq-data-collection-agents.yml
24+
- name: Azure Virtual Machines questions
25+
href: faq-vms.yml
26+
- name: Azure Log Analytics questions
27+
href: faq-azure-monitor-logs.yml
1628

1729
- name: Quickstarts
1830
items:
@@ -568,18 +580,6 @@
568580
href: /rest/api/defenderforcloud/
569581
- name: Security baseline
570582
href: /security/benchmark/azure/baselines/security-center-security-baseline?toc=/azure/defender-for-cloud/TOC.json
571-
- name: FAQ for Microsoft Defender for Cloud
572-
items:
573-
- name: General questions
574-
href: faq-general.yml
575-
- name: Permissions questions
576-
href: faq-permissions.yml
577-
- name: Data collection and agent questions
578-
href: faq-data-collection-agents.yml
579-
- name: Virtual Machines questions
580-
href: faq-vms.yml
581-
- name: Existing users of Azure Log Analytics
582-
href: faq-azure-monitor-logs.yml
583583
- name: Azure Policy built-ins
584584
displayName: samples, policy
585585
href: policy-reference.md

articles/defender-for-cloud/alerts-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ This article describes security alerts and notifications in Microsoft Defender f
1414
## What are security alerts?
1515
Security alerts are the notifications generated by Defender for Cloud and Defender for Cloud plans when threats are identified in your cloud, hybrid, or on-premises environment.
1616

17-
- Security alerts are triggered by advanced detections in Defender for Cloud, and are available when you enable Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#cloud-workload-protections-cwp).
17+
- Security alerts are triggered by advanced detections in Defender for Cloud, and are available when you enable Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads).
1818
- Each alert provides details of affected resources, issues, and remediation recommendations.
1919
- Defender for Cloud classifies alerts and prioritizes them by severity in the Defender for Cloud portal.
2020
- Alerts data is retained for 90 days.

articles/defender-for-cloud/alerts-schemas.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.date: 11/09/2021
99

1010
# Security alerts schemas
1111

12-
If your subscription has Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#cloud-workload-protections-cwp) enabled, you'll receive security alerts when Defender for Cloud detects threats to their resources.
12+
If your subscription has Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads) enabled, you'll receive security alerts when Defender for Cloud detects threats to their resources.
1313

1414
You can view these security alerts in Microsoft Defender for Cloud's pages - [overview dashboard](overview-page.md), [alerts](tutorial-security-incident.md), [resource health pages](investigate-resource-health.md), or [workload protections dashboard](workload-protections-dashboard.md) - and through external tools such as:
1515

articles/defender-for-cloud/alerts-suppression-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ This page explains how you can use alerts suppression rules to suppress false po
1515
|Aspect|Details|
1616
|----|:----|
1717
|Release state:|General availability (GA)|
18-
|Pricing:|Free<br>(Most security alerts are only available with [Defender plans](defender-for-cloud-introduction.md#cloud-workload-protections-cwp))|
18+
|Pricing:|Free<br>(Most security alerts are only available with [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads))|
1919
|Required roles and permissions:|**Security admin** and **Owner** can create/delete rules.<br>**Security reader** and **Reader** can view rules.|
2020
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National (Azure Government, Azure China 21Vianet)|
2121

articles/defender-for-cloud/asset-inventory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ The asset inventory page of Microsoft Defender for Cloud shows the [security pos
1212

1313
Use this view and its filters to address such questions as:
1414

15-
- Which of my subscriptions with [Defender plans](defender-for-cloud-introduction.md#cloud-workload-protections-cwp) enabled have outstanding recommendations?
15+
- Which of my subscriptions with [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads) enabled have outstanding recommendations?
1616
- Which of my machines with the tag 'Production' are missing the Log Analytics agent?
1717
- How many of my machines tagged with a specific tag have outstanding recommendations?
1818
- Which machines in a specific resource group have a known vulnerability (using a CVE number)?

articles/defender-for-cloud/concept-cloud-security-posture-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,4 +80,4 @@ Learn more about [agentless scanning](concept-agentless-data-collection.md).
8080

8181
## Next steps
8282

83-
Learn about Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#cloud-workload-protections-cwp).
83+
Learn about Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads).

articles/defender-for-cloud/defender-for-cloud-introduction.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Microsoft Defender for Cloud is a cloud-native application protection platform (
1717

1818
## Secure cloud applications
1919

20-
Defender for Cloud helps you to incorporate good security practices early during the software development process. You can protect your code management environments and your code pipelines, and get insights into your development environment security posture from a single location. Defender for Cloud currently supports Defender for DevOps, and Defender for GitHub.
20+
Defender for Cloud helps you to incorporate good security practices early during the software development process, or DevSecOps. You can protect your code management environments and your code pipelines, and get insights into your development environment security posture from a single location. Defender for Cloud currently includes Defender for DevOps.
2121

2222
Today’s applications require security awareness at the code, infrastructure, and runtime levels to make sure that deployed applications are hardened against attacks.
2323

@@ -29,7 +29,7 @@ Today’s applications require security awareness at the code, infrastructure, a
2929

3030
The security of your cloud and on-premises resources depends on proper configuration and deployment. Defender for Cloud recommendations identify the steps that you can take to secure your environment.
3131

32-
Defender for Cloud includes Foundational CSPM (Free) capabilities for free. You can also enable advanced CSPM capabilities and cloud workload protections by enabling paid Defender plans.
32+
Defender for Cloud includes Foundational CSPM (Free) capabilities for free. You can also enable advanced CSPM capabilities by enabling paid Defender plans.
3333

3434
| Capability | What problem does it solve? | Get started | Defender plan and pricing |
3535
| ---------- | --------------------------- | ----------- | ------------------------- |
@@ -45,11 +45,9 @@ Defender for Cloud includes Foundational CSPM (Free) capabilities for free. You
4545

4646
## Protect cloud workloads
4747

48-
### Cloud workload protections
49-
5048
Proactive security principles require that you implement security practices that protect your workloads from threats. Cloud workload protections (CWP) surface workload-specific recommendations that lead you to the right security controls to protect your workloads.
5149

52-
When your environment is threatened, you need to know right away the nature and severity of the threat so you can plan your response. After you identify a threat in your environment, you need to quickly respond to limit the risk to your resources.
50+
When your environment is threatened, security alerts right away indicate the nature and severity of the threat so you can plan your response. After you identify a threat in your environment, you need to quickly respond to limit the risk to your resources.
5351

5452
| Capability | What problem does it solve? | Get started | Defender plan and pricing |
5553
| ---------- | --------------------------- | ----------- | ------------------------- |
@@ -58,8 +56,8 @@ When your environment is threatened, you need to know right away the nature and
5856
| Protect cloud databases | Protect your entire database estate with attack detection and threat response for the most popular database types in Azure to protect the database engines and data types, according to their attack surface and security risks. | [Deploy specialized protections for cloud and on-premises databases](quickstart-enable-database-protections.md) | - [Defender for Azure SQL Databases](https://azure.microsoft.com/pricing/details/defender-for-cloud/)</br>- [Defender for SQL servers on machines](https://azure.microsoft.com/pricing/details/defender-for-cloud/)</br>- [Defender for Open-source relational databases](https://azure.microsoft.com/pricing/details/defender-for-cloud/)</br>- [Defender for Azure Cosmos DB](https://azure.microsoft.com/pricing/details/defender-for-cloud/) |
5957
| Protect containers | Secure your containers so you can improve, monitor, and maintain the security of your clusters, containers, and their applications with environment hardening, vulnerability assessments, and run-time protection. | [Find security risks in your containers](defender-for-containers-introduction.md) | [Defender for Containers](https://azure.microsoft.com/pricing/details/defender-for-cloud/) |
6058
| [Infrastructure service insights](asset-inventory.md) | Diagnose weaknesses in your application infrastructure that can leave your environment susceptible to attack. | - [Identify attacks targeting applications running over App Service](defender-for-app-service-introduction.md)</br>- [Detect attempts to exploit Key Vault accounts](defender-for-key-vault-introduction.md)</br>- [Get alerted on suspicious Resource Manager operations](defender-for-resource-manager-introduction.md)</br>- [Expose anomalous DNS activities](defender-for-dns-introduction.md) | - [Defender for App Service](https://azure.microsoft.com/pricing/details/defender-for-cloud/)</br></br>- [Defender for Key Vault](https://azure.microsoft.com/pricing/details/defender-for-cloud/)</br></br>- [Defender for Resource Manager](https://azure.microsoft.com/pricing/details/defender-for-cloud/)</br></br>- [Defender for DNS](https://azure.microsoft.com/pricing/details/defender-for-cloud/)|
61-
| [Security alerts](alerts-overview.md) | Get informed of real-time events that threaten the security of your environment. Alerts are categorized and assigned severity levels to indicate proper responses. | [Manage security alerts]( managing-and-responding-alerts.md) | [Any workload protection Defender plan](#cloud-workload-protections-cwp) |
62-
| [Security incidents](alerts-overview.md#what-are-security-incidents) | Correlate alerts to identify attack patterns and integrate with Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), and IT Service Management (ITSM) solutions to respond to threats and limit the risk to your resources. | [Export alerts to SIEM, SOAR, or ITSM systems](export-to-siem.md) | [Any workload protection Defender plan](#cloud-workload-protections-cwp) |
59+
| [Security alerts](alerts-overview.md) | Get informed of real-time events that threaten the security of your environment. Alerts are categorized and assigned severity levels to indicate proper responses. | [Manage security alerts]( managing-and-responding-alerts.md) | [Any workload protection Defender plan](#protect-cloud-workloads) |
60+
| [Security incidents](alerts-overview.md#what-are-security-incidents) | Correlate alerts to identify attack patterns and integrate with Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), and IT Service Management (ITSM) solutions to respond to threats and limit the risk to your resources. | [Export alerts to SIEM, SOAR, or ITSM systems](export-to-siem.md) | [Any workload protection Defender plan](#protect-cloud-workloads) |
6361

6462
## Learn More
6563

articles/defender-for-cloud/defender-for-cloud-planning-and-operations-guide.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ Defenders for Cloud policies contain the following components:
123123
- [Security policy](tutorial-security-policy.md): an [Azure Policy](../governance/policy/overview.md) that determines which controls are monitored and recommended by Defender for Cloud. You can also use Azure Policy to create new definitions, define more policies, and assign policies across management groups.
124124

125125
- [Email notifications](configure-email-notifications.md): security contacts and notification settings.
126-
- [Pricing tier](defender-for-cloud-introduction.md#cloud-workload-protections-cwp): with or without Microsoft Defender for Cloud's Defender plans, which determine which Defender for Cloud features are available for resources in scope (can be specified for subscriptions and workspaces using the API).
126+
- [Pricing tier](defender-for-cloud-introduction.md#protect-cloud-workloads): with or without Microsoft Defender for Cloud's Defender plans, which determine which Defender for Cloud features are available for resources in scope (can be specified for subscriptions and workspaces using the API).
127127

128128
> [!NOTE]
129129
> Specifying a security contact ensures that Azure can reach the right person in your organization if a security incident occurs. Read [Provide security contact details in Defender for Cloud](configure-email-notifications.md) for more information on how to enable this recommendation.
@@ -167,7 +167,7 @@ In the Azure portal, you can browse to see a list of your Log Analytics workspac
167167

168168
For workspaces created by Defender for Cloud, data is retained for 30 days. For existing workspaces, retention is based on the workspace pricing tier. If you want, you can also use an existing workspace.
169169

170-
If your agent reports to a workspace other than the **default** workspace, any Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#cloud-workload-protections-cwp) that you've enabled on the subscription should also be enabled on the workspace.
170+
If your agent reports to a workspace other than the **default** workspace, any Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads) that you've enabled on the subscription should also be enabled on the workspace.
171171

172172
> [!NOTE]
173173
> Microsoft makes strong commitments to protect the privacy and security of this data. Microsoft adheres to strict compliance and security guidelines—from coding to operating a service. For more information about data handling and privacy, read [Defender for Cloud Data Security](data-security.md).

articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -183,4 +183,4 @@ Images should first be imported to ACR. Learn more about [importing container im
183183

184184
## Next steps
185185

186-
Learn more about the Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#cloud-workload-protections-cwp).
186+
Learn more about the Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads).

articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-elastic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,5 +170,5 @@ Yes. The results are under [Sub-Assessments REST API](/rest/api/defenderforcloud
170170

171171
Learn more about:
172172

173-
- Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#cloud-workload-protections-cwp)
173+
- Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads)
174174
- [Multicloud protections](multicloud.yml) for your AWS account

0 commit comments

Comments
 (0)