Skip to content

Commit 1166b45

Browse files
secrets docs
1 parent 72a052d commit 1166b45

File tree

7 files changed

+15
-14
lines changed

7 files changed

+15
-14
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-cloud/secret-scanning.md",
5+
"redirect_url": "/azure/defender-for-cloud/secrets-scanning-servers",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/defender-for-cloud/prevent-misconfigurations.md",
510
"redirect_url": "/azure/defender-for-cloud/manage-mcsb",

articles/defender-for-cloud/concept-agentless-data-collection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Agentless scanning for virtual machines (VM) provides:
1919
- Broad, frictionless visibility into your software inventory using Microsoft Defender Vulnerability Management.
2020
- Deep analysis of operating system configuration and other machine meta data.
2121
- [Vulnerability assessment](enable-agentless-scanning-vms.md) using Defender Vulnerability Management.
22-
- [Secret scanning](secret-scanning.md) to locate plain text secrets in your compute environment.
22+
- [Secret scanning](secrets-scanning.md) to locate plain text secrets in your compute environment.
2323
- Threat detection with [agentless malware scanning](agentless-malware-scanning.md), using [Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows).
2424

2525
Agentless scanning assists you in the identification process of actionable posture issues without the need for installed agents, network connectivity, or any effect on machine performance. Agentless scanning is available through both the [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) plan and [Defender for Servers P2](plan-defender-for-servers-select-plan.md#plan-features) plan.
@@ -30,7 +30,7 @@ Agentless scanning assists you in the identification process of actionable postu
3030
|---------|---------|
3131
|Release state:| GA |
3232
|Pricing:|Requires either [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) or [Microsoft Defender for Servers Plan 2](plan-defender-for-servers-select-plan.md#plan-features)|
33-
| Supported use cases:| :::image type="icon" source="./media/icons/yes-icon.png"::: [Vulnerability assessment (powered by Defender Vulnerability Management)](deploy-vulnerability-assessment-defender-vulnerability-management.md)<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Software inventory (powered by Defender Vulnerability Management):::image type="icon" source="./media/icons/yes-icon.png"::: [Secret scanning](secret-scanning.md) <br />:::image type="icon" source="./media/icons/yes-icon.png"::: [Malware scanning (Preview)](agentless-malware-scanning.md) **Only available with Defender for Servers plan 2**|
33+
| Supported use cases:| :::image type="icon" source="./media/icons/yes-icon.png"::: [Vulnerability assessment (powered by Defender Vulnerability Management)](deploy-vulnerability-assessment-defender-vulnerability-management.md)<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Software inventory (powered by Defender Vulnerability Management):::image type="icon" source="./media/icons/yes-icon.png"::: [Secret scanning](secrets-scanning.md) <br />:::image type="icon" source="./media/icons/yes-icon.png"::: [Malware scanning (Preview)](agentless-malware-scanning.md) **Only available with Defender for Servers plan 2**|
3434
| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Azure Commercial clouds<br> :::image type="icon" source="./media/icons/no-icon.png"::: Azure Government<br>:::image type="icon" source="./media/icons/no-icon.png"::: Microsoft Azure operated by 21Vianet<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Connected AWS accounts<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Connected GCP projects |
3535
| Operating systems: | :::image type="icon" source="./media/icons/yes-icon.png"::: Windows<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Linux |
3636
| Instance and disk types: | **Azure**<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Standard VMs<br>:::image type="icon" source="./media/icons/no-icon.png"::: Unmanaged disks<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Virtual machine scale set - Flex<br>:::image type="icon" source="./media/icons/no-icon.png"::: Virtual machine scale set - Uniform<br><br>**AWS**<br>:::image type="icon" source="./media/icons/yes-icon.png"::: EC2<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Auto Scale instances<br>:::image type="icon" source="./media/icons/no-icon.png"::: Instances with a ProductCode (Paid AMIs)<br><br>**GCP**<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Compute instances<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Instance groups (managed and unmanaged) |
247 KB
Loading

articles/defender-for-cloud/release-notes-archive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -313,7 +313,7 @@ July 18, 2023
313313

314314
Secrets scanning is now available as part of the agentless scanning in Defender for Servers P2 and Defender CSPM. This capability helps to detect unmanaged and insecure secrets saved on virtual machines in Azure or AWS resources that can be used to move laterally in the network. If secrets are detected, Defender for Cloud can help to prioritize and take actionable remediation steps to minimize the risk of lateral movement, all without affecting your machine's performance.
315315

316-
For more information about how to protect your secrets with secrets scanning, see [Manage secrets with agentless secrets scanning](secret-scanning.md).
316+
For more information about how to protect your secrets with secrets scanning, see [Manage secrets with agentless secrets scanning](secrets-scanning.md).
317317

318318
### New security alert in Defender for Servers plan 2: detecting potential attacks leveraging Azure VM GPU driver extensions
319319

articles/defender-for-cloud/remediate-cloud-deployment-secrets.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ This article helps you to identify and remediate security risks with cloud deplo
2929

3030
## Remediate secrets with attack paths
3131

32-
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph). to expose exploitable paths that attackers might use to reach high-impact assets. Defender for Cloud provides [a number of attack paths scenarios](secrets-scanning.md#attack-path-scenarios) for VM secrets.
32+
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph). to expose exploitable paths that attackers might use to reach high-impact assets.
3333

3434

3535
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -75,20 +75,16 @@ Secrets that don't have a known attack path are referred to as `secrets without
7575

7676
## Remediate secrets with cloud security explorer
7777

78-
The [cloud security explorer](concept-attack-path.md#what-is-cloud-security-explorer) enables you to proactively identify potential security risks within your cloud environment. It does so by querying the [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph), which is the context engine of Defender for Cloud. Cloud security explorer provides a [number of query templates](secret-scanning-servers.md#) for investigating VM secrets issues.
78+
The [cloud security explorer](concept-attack-path.md#what-is-cloud-security-explorer) enables you to proactively identify potential security risks within your cloud environment. It does so by querying the [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph).
7979

8080

8181
1. Sign in to the [Azure portal](https://portal.azure.com).
8282

8383
1. Navigate to **Microsoft Defender for Cloud** > **Cloud Security Explorer**.
8484

85-
1. Select one of the following templates:
85+
1. Create a query to look for secrets in your cloud deployments. To do this, select a resource type, and then select the types of secret you want to find. For example:
8686

87-
- **VM with plaintext secret that can authenticate to another VM** - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access other VMs or EC2s.
88-
- **VM with plaintext secret that can authenticate to a storage account** - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access storage accounts.
89-
- **VM with plaintext secret that can authenticate to an SQL database** - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access SQL databases.
90-
91-
If you don't want to use any of the available templates, you can also [build your own query](how-to-manage-cloud-security-explorer.md) in the cloud security explorer.
87+
:::image type="content" source="media/remediate-cloud-deployment-secrets.md/query-example.png" alt-text="Screenshot that shows the detailed information of a secret after you have selected the secret in the findings section." lightbox="media/remediate-cloud-deployment-secrets.md/query-example.png":::
9288

9389
## Remediate secrets in the asset inventory
9490

articles/defender-for-cloud/remediate-server-secrets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ This article helps you to identify and remediate security risks with VM secrets.
2929

3030
## Remediate secrets with attack paths
3131

32-
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph). to expose exploitable paths that attackers might use to reach high-impact assets. Defender for Cloud provides [a number of attack paths scenarios](secrets-scanning.md#attack-path-scenarios) for VM secrets.
32+
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph). to expose exploitable paths that attackers might use to reach high-impact assets. Defender for Cloud provides a number of attack paths scenarios for VM secrets.
3333

3434

3535
1. Sign in to the [Azure portal](https://portal.azure.com).

articles/defender-for-cloud/support-matrix-defender-for-servers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ This table summarizes Azure cloud support for Defender for Servers features.
5050
| [Adaptive application controls](./adaptive-application-controls.md) | GA | GA | GA |
5151
| [Adaptive network hardening](./adaptive-network-hardening.md) | GA | NA | NA |
5252
| [Docker host hardening](./harden-docker-hosts.md) | GA | GA | GA |
53-
| [Agentless secret scanning](secret-scanning.md) | GA | NA | NA |
53+
| [Agentless secret scanning](secrets-scanning.md) | GA | NA | NA |
5454
| [Agentless malware scanning](agentless-malware-scanning.md) | Preview | NA | NA |
5555
| [Endpoint detection and response](endpoint-detection-response.md) | Preview | NA | NA |
5656

@@ -129,7 +129,7 @@ The following table shows feature support for AWS and GCP machines.
129129
| Third-party vulnerability assessment | - | - |
130130
| [Network security assessment](protect-network-resources.md) | - | - |
131131
| [Cloud security explorer](how-to-manage-cloud-security-explorer.md) || - |
132-
| [Agentless secret scanning](secret-scanning.md) |||
132+
| [Agentless secret scanning](secrets-scanning.md) |||
133133
| [Agentless malware scanning](agentless-malware-scanning.md) |||
134134
| [Endpoint detection and response](endpoint-detection-response.md) |||
135135

0 commit comments

Comments
 (0)