Skip to content

Commit 11325ee

Browse files
authored
Merge pull request #263505 from ElazarK/WI194292-architecture-servers
WI194292 servers rearchitecture
2 parents 1b80d06 + f522e04 commit 11325ee

19 files changed

+649
-615
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 119 additions & 113 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@
6363
- name: Protect your resources with Defender CSPM
6464
displayName: CSPM, cloud security posture management, enable
6565
href: tutorial-enable-cspm-plan.md
66-
- name: Protect your servers with Defender for Servers
66+
- name: Deploy Defender for Servers
6767
displayName: servers, server, enable
6868
href: tutorial-enable-servers-plan.md
6969
- name: Protect your applications with Defender for App Service
@@ -475,123 +475,129 @@
475475
- name: Defender for Servers
476476
displayName: hybrid, arc, Defender for Servers
477477
items:
478-
- name: Plan Defender for Servers deployment
478+
- name: Deploy
479+
displayName: hybrid, arc, Defender for Servers
479480
items:
480-
- name: Get started
481-
displayName: VM, JIT, plan 1, plan 2, plans, vulnerability assessment, threat
482-
management, defender for endpoint, vulnerability scanner,
483-
Qualys, FIM, File integrity monitoring, adaptive application
484-
controls, adaptive network hardening, docker, fileless attack
485-
detection, auditd, simulate alerts
486-
href: plan-defender-for-servers.md
487-
- name: Review data residency and workspace design
488-
href: plan-defender-for-servers-data-workspace.md
489-
- name: Understand just-in-time VM access
490-
displayName: jit, management
491-
href: just-in-time-access-overview.md
492-
- name: Understand File Integrity Monitoring
481+
- name: Deploy Defender for Servers
482+
href: tutorial-enable-servers-plan.md
483+
- name: Plan Defender for Servers deployment
484+
items:
485+
- name: Get started
486+
displayName: VM, JIT, plan 1, plan 2, plans, vulnerability assessment, threat management, defender for endpoint, vulnerability scanner, Qualys, FIM, File integrity monitoring, adaptive application controls, adaptive network hardening, docker, fileless attack detection, auditd, simulate alerts
487+
href: plan-defender-for-servers.md
488+
- name: Review data residency and workspace design
489+
href: plan-defender-for-servers-data-workspace.md
490+
- name: Determine roles and access
491+
href: plan-defender-for-servers-roles.md
492+
- name: Select a plan
493+
href: plan-defender-for-servers-select-plan.md
494+
- name: Review agents and extensions
495+
href: plan-defender-for-servers-agents.md
496+
- name: Scale a Defender for Servers deployment
497+
href: plan-defender-for-servers-scale.md
498+
- name: Agentless scanning
499+
items:
500+
- name: Agentless machine scanning
501+
displayName: agentless, scanning, virtual, machines, freshness, snapshot, snapshots
502+
href: concept-agentless-data-collection.md
503+
- name: Manage secrets with agentless secret scanning
504+
displayName: secrets, secret scanning, agentless
505+
href: secret-scanning.md
506+
- name: Protect servers with agentless malware scanning
507+
displayName: agentless, scanning, virtual, machines, freshness, snapshot, snapshots, Microsoft Defender Antivirus
508+
href: agentless-malware-scanning.md
509+
- name: Enable agentless scanning for VMs
510+
displayName: vulnerability, software inventory, agentless scanning
511+
href: enable-agentless-scanning-vms.md
512+
- name: Vulnerability scanning
513+
items:
514+
- name: Enable vulnerability scanning with Microsoft Defender Vulnerability Management
515+
displayName: mde, tvm, vulnerability, va, arc, hybrid, defender vulnerability management
516+
href: deploy-vulnerability-assessment-defender-vulnerability-management.md
517+
- name: Enable vulnerability scanning with a Bring Your Own License (BYOL) solution
518+
displayName: qualys, rapid7, vulnerability
519+
href: deploy-vulnerability-assessment-byol-vm.md
520+
- name: Automatically enable a vulnerability assessment solution
521+
displayName: qualys, rapid7, vulnerability, auto provision
522+
href: auto-deploy-vulnerability-assessment.md
523+
- name: Transition to Microsoft Defender Vulnerability Management for servers
524+
displayName: qualys, rapid7, vulnerability, migrate, transition, Microsoft Defender Vulnerability Management, mdvm
525+
href: how-to-transition-to-built-in.md
526+
- name: Common questions
527+
displayName: questions, common, MDVM, Qualys, BYOL, bring your own license, agent, consolidated, vulnerability, management, faq, frequently asked questions
528+
href: faq-scanner-detection.yml
529+
- name: Enable vulnerability scanning with the integrated Qualys scanner (deprecated)
530+
displayName: qualys, va, vulnerability, arc, hybrid
531+
href: deploy-vulnerability-assessment-vm.md
532+
- name: File integrity monitoring
533+
items:
534+
- name: Understand File Integrity Monitoring
535+
displayName: fim, change
536+
href: file-integrity-monitoring-overview.md
537+
- name: Enable File Integrity Monitoring (AMA)
538+
displayName: fim, change, azure monitor agent
539+
href: file-integrity-monitoring-enable-ama.md
540+
- name: Enable File Integrity Monitoring (Log Analytics)
541+
displayName: fim, change, log analytics, mma
542+
href: file-integrity-monitoring-enable-log-analytics.md
543+
- name: Just-in-time access
544+
items:
545+
- name: Understand just-in-time VM access
546+
displayName: jit, management
547+
href: just-in-time-access-overview.md
548+
- name: Enable just-in-time access on VMs
549+
displayName: jit, management, ports
550+
href: just-in-time-access-usage.md
551+
- name: Endpoint detection and response
552+
items:
553+
- name: Understand endpoint detection and response
554+
displayName: mdatp, wdatp, mde, mdfe, defender for endpoint, endpoint, edr
555+
href: integration-defender-for-endpoint.md
556+
- name: Enable the Defender for Endpoint integration
557+
displayName: ATP, mdatp, wdatp, mde, mdfe, defender for endpoint, endpoint, edr
558+
href: enable-defender-for-endpoint.md
559+
- name: Adaptive application controls
560+
items:
561+
- name: Understand adaptive application controls
562+
displayName: aac, allowlist, reviewgroup
563+
href: adaptive-application-controls.md
564+
- name: Enable and manage adaptive application controls
565+
displayName: aac, allowlist, reviewgroup
566+
href: enable-adaptive-application-controls.md
567+
- name: Review server protection
568+
items:
569+
- name: Review hardening recommendations
570+
displayName: VM, guest configuration, vulnerabilities, ASB, benchmark
571+
href: apply-security-baseline.md
572+
- name: Review Docker host hardening recommendations
573+
displayName: containers
574+
href: harden-docker-hosts.md
575+
- name: Review and remediate vulnerabilities
576+
displayName: qualys, va, rapid7, vulnerability
577+
href: remediate-vulnerability-findings-vm.md
578+
- name: Disable specific vulnerability findings
579+
displayName: qualys, rapid7, va
580+
href: remediate-vulnerability-findings-vm.md#disable-specific-findings
581+
- name: Compare baselines using file integrity monitoring
493582
displayName: fim, change
494-
href: file-integrity-monitoring-overview.md
495-
- name: Determine roles and access
496-
href: plan-defender-for-servers-roles.md
497-
- name: Select a plan
498-
href: plan-defender-for-servers-select-plan.md
499-
- name: Review agents and extensions
500-
href: plan-defender-for-servers-agents.md
501-
- name: Agentless scanning
502-
items:
503-
- name: Agentless machine scanning
504-
displayName: agentless, scanning, virtual, machines, freshness, snapshot, snapshots
505-
href: concept-agentless-data-collection.md
506-
- name: Manage secrets with agentless secret scanning
507-
displayName: secrets, secret scanning, agentless
508-
href: secret-scanning.md
509-
- name: Protect servers with agentless malware scanning
510-
displayName: agentless, scanning, virtual, machines, freshness, snapshot, snapshots, Microsoft Defender Antivirus
511-
href: agentless-malware-scanning.md
512-
- name: Scale a Defender for Servers deployment
513-
href: plan-defender-for-servers-scale.md
514-
- name: Protect servers with Defender for Servers
515-
href: tutorial-enable-servers-plan.md
516-
- name: Configure vulnerability scanning
517-
items:
518-
- name: Enable agentless scanning for VMs
519-
displayName: vulnerability, software inventory, agentless scanning
520-
href: enable-agentless-scanning-vms.md
521-
- name: Enable vulnerability scanning with Microsoft Defender Vulnerability
522-
Management
523-
displayName: mde, tvm, vulnerability, va, arc, hybrid, defender vulnerability
524-
management
525-
href: deploy-vulnerability-assessment-defender-vulnerability-management.md
526-
- name: Enable vulnerability scanning with a Bring Your Own License (BYOL)
527-
solution
528-
displayName: qualys, rapid7, vulnerability
529-
href: deploy-vulnerability-assessment-byol-vm.md
530-
- name: Automatically enable a vulnerability assessment solution
531-
displayName: qualys, rapid7, vulnerability, auto provision
532-
href: auto-deploy-vulnerability-assessment.md
533-
- name: Transition to Microsoft Defender Vulnerability Management for servers
534-
displayName: qualys, rapid7, vulnerability, migrate, transition, Microsoft Defender Vulnerability Management, mdvm
535-
href: how-to-transition-to-built-in.md
536-
- name: Common questions
537-
displayName: questions, common, MDVM, Qualys, BYOL, bring your own license, agent, consolidated, vulnerability, management, faq, frequently asked questions
538-
href: faq-scanner-detection.yml
539-
- name: Enable vulnerability scanning with the integrated Qualys scanner (deprecated)
540-
displayName: qualys, va, vulnerability, arc, hybrid
541-
href: deploy-vulnerability-assessment-vm.md
542-
- name: Enable just-in-time access on VMs
543-
displayName: jit, management, ports
544-
href: just-in-time-access-usage.md
545-
- name: Protect your endpoints with Defender for Cloud's integration with
546-
Microsoft Defender for Endpoint
547-
displayName: ATP, mdatp, wdatp, mde, mdfe, defender for endpoint, endpoint, edr
548-
href: integration-defender-for-endpoint.md
549-
- name: Define lists of safe applications for machines
550-
displayName: aac, allowlist, reviewgroup, adaptive application controls
551-
href: adaptive-application-controls.md
583+
href: file-integrity-monitoring-usage.md
584+
- name: Improve your network security posture
585+
displayName: anh, adaptive network hardening
586+
href: adaptive-network-hardening.md
552587
- name: Review applications and software installed on your machines
553588
displayName: inventory, apps, software inventory, mde, tvm
554589
href: asset-inventory.md#access-a-software-inventory
555-
- name: Configure file integrity monitoring
556-
items:
557-
- name: Enable File Integrity Monitoring (AMA)
558-
displayName: fim, change, azure monitor agent
559-
href: file-integrity-monitoring-enable-ama.md
560-
- name: Enable File Integrity Monitoring (Log Analytics)
561-
displayName: fim, change, log analytics, mma
562-
href: file-integrity-monitoring-enable-log-analytics.md
563-
- name: Review server protection
564-
items:
565-
- name: Review hardening recommendations
566-
displayName: VM, guest configuration, vulnerabilities, ASB, benchmark
567-
href: apply-security-baseline.md
568-
- name: Review Docker host hardening recommendations
569-
displayName: containers
570-
href: harden-docker-hosts.md
571-
- name: Review and remediate vulnerabilities
572-
displayName: qualys, va, rapid7, vulnerability
573-
href: remediate-vulnerability-findings-vm.md
574-
- name: Disable specific vulnerability findings
575-
displayName: qualys, rapid7, va
576-
href: remediate-vulnerability-findings-vm.md#disable-specific-findings
577-
- name: Compare baselines using file integrity monitoring
578-
displayName: fim, change
579-
href: file-integrity-monitoring-usage.md
580-
- name: Improve your network security posture
581-
displayName: anh, adaptive network hardening
582-
href: adaptive-network-hardening.md
583-
- name: Common questions (FAQ)
584-
items:
585-
- name: Common questions about Defender for Servers
586-
displayName: common questions, faq, frequently asked questions
587-
href: faq-defender-for-servers.yml
588-
- name: Common questions about Azure Virtual Machines
589-
displayName: common questions, faq, frequently asked questions
590-
href: faq-vms.yml
591-
- name: Common questions about vulnerability assessments
592-
displayName: common questions, VA, vulnerability, assessment, faq, frequently
593-
asked questions
594-
href: faq-vulnerability-assessments.yml
590+
- name: Common questions (FAQ)
591+
items:
592+
- name: Common questions about Defender for Servers
593+
displayName: common questions, faq, frequently asked questions
594+
href: faq-defender-for-servers.yml
595+
- name: Common questions about Azure Virtual Machines
596+
displayName: common questions, faq, frequently asked questions
597+
href: faq-vms.yml
598+
- name: Common questions about vulnerability assessments
599+
displayName: common questions, VA, vulnerability, assessment, faq, frequently asked questions
600+
href: faq-vulnerability-assessments.yml
595601
- name: Defender for Containers
596602
items:
597603
- name: Overview

0 commit comments

Comments
 (0)