You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Broad, frictionless visibility into your software inventory using Microsoft Defender Vulnerability Management.
20
20
- Deep analysis of operating system configuration and other machine meta data.
21
21
-[Vulnerability assessment](enable-agentless-scanning-vms.md) using Defender Vulnerability Management.
22
-
-[Secret scanning](secret-scanning.md) to locate plain text secrets in your compute environment.
22
+
-[Secret scanning](secrets-scanning.md) to locate plain text secrets in your compute environment.
23
23
- Threat detection with [agentless malware scanning](agentless-malware-scanning.md), using [Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows).
24
24
25
25
Agentless scanning assists you in the identification process of actionable posture issues without the need for installed agents, network connectivity, or any effect on machine performance. Agentless scanning is available through both the [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) plan and [Defender for Servers P2](plan-defender-for-servers-select-plan.md#plan-features) plan.
@@ -30,7 +30,7 @@ Agentless scanning assists you in the identification process of actionable postu
30
30
|---------|---------|
31
31
|Release state:| GA |
32
32
|Pricing:|Requires either [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) or [Microsoft Defender for Servers Plan 2](plan-defender-for-servers-select-plan.md#plan-features)|
33
-
| Supported use cases:| :::image type="icon" source="./media/icons/yes-icon.png"::: [Vulnerability assessment (powered by Defender Vulnerability Management)](deploy-vulnerability-assessment-defender-vulnerability-management.md)<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Software inventory (powered by Defender Vulnerability Management):::image type="icon" source="./media/icons/yes-icon.png"::: [Secret scanning](secret-scanning.md) <br />:::image type="icon" source="./media/icons/yes-icon.png"::: [Malware scanning (Preview)](agentless-malware-scanning.md)**Only available with Defender for Servers plan 2**|
33
+
| Supported use cases:| :::image type="icon" source="./media/icons/yes-icon.png"::: [Vulnerability assessment (powered by Defender Vulnerability Management)](deploy-vulnerability-assessment-defender-vulnerability-management.md)<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Software inventory (powered by Defender Vulnerability Management):::image type="icon" source="./media/icons/yes-icon.png"::: [Secret scanning](secrets-scanning.md) <br />:::image type="icon" source="./media/icons/yes-icon.png"::: [Malware scanning (Preview)](agentless-malware-scanning.md)**Only available with Defender for Servers plan 2**|
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/release-notes-archive.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -313,7 +313,7 @@ July 18, 2023
313
313
314
314
Secrets scanning is now available as part of the agentless scanning in Defender for Servers P2 and Defender CSPM. This capability helps to detect unmanaged and insecure secrets saved on virtual machines in Azure or AWS resources that can be used to move laterally in the network. If secrets are detected, Defender for Cloud can help to prioritize and take actionable remediation steps to minimize the risk of lateral movement, all without affecting your machine's performance.
315
315
316
-
For more information about how to protect your secrets with secrets scanning, see [Manage secrets with agentless secrets scanning](secret-scanning.md).
316
+
For more information about how to protect your secrets with secrets scanning, see [Manage secrets with agentless secrets scanning](secrets-scanning.md).
317
317
318
318
### New security alert in Defender for Servers plan 2: detecting potential attacks leveraging Azure VM GPU driver extensions
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/remediate-cloud-deployment-secrets.md
+4-8Lines changed: 4 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ This article helps you to identify and remediate security risks with cloud deplo
29
29
30
30
## Remediate secrets with attack paths
31
31
32
-
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph). to expose exploitable paths that attackers might use to reach high-impact assets. Defender for Cloud provides [a number of attack paths scenarios](secrets-scanning.md#attack-path-scenarios) for VM secrets.
32
+
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph). to expose exploitable paths that attackers might use to reach high-impact assets.
33
33
34
34
35
35
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -75,20 +75,16 @@ Secrets that don't have a known attack path are referred to as `secrets without
75
75
76
76
## Remediate secrets with cloud security explorer
77
77
78
-
The [cloud security explorer](concept-attack-path.md#what-is-cloud-security-explorer) enables you to proactively identify potential security risks within your cloud environment. It does so by querying the [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph), which is the context engine of Defender for Cloud. Cloud security explorer provides a [number of query templates](secret-scanning-servers.md#) for investigating VM secrets issues.
78
+
The [cloud security explorer](concept-attack-path.md#what-is-cloud-security-explorer) enables you to proactively identify potential security risks within your cloud environment. It does so by querying the [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph).
79
79
80
80
81
81
1. Sign in to the [Azure portal](https://portal.azure.com).
82
82
83
83
1. Navigate to **Microsoft Defender for Cloud** > **Cloud Security Explorer**.
84
84
85
-
1.Select one of the following templates:
85
+
1.Create a query to look for secrets in your cloud deployments. To do this, select a resource type, and then select the types of secret you want to find. For example:
86
86
87
-
-**VM with plaintext secret that can authenticate to another VM** - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access other VMs or EC2s.
88
-
-**VM with plaintext secret that can authenticate to a storage account** - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access storage accounts.
89
-
-**VM with plaintext secret that can authenticate to an SQL database** - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access SQL databases.
90
-
91
-
If you don't want to use any of the available templates, you can also [build your own query](how-to-manage-cloud-security-explorer.md) in the cloud security explorer.
87
+
:::image type="content" source="media/remediate-cloud-deployment-secrets.md/query-example.png" alt-text="Screenshot that shows the detailed information of a secret after you have selected the secret in the findings section." lightbox="media/remediate-cloud-deployment-secrets.md/query-example.png":::
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/remediate-server-secrets.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ This article helps you to identify and remediate security risks with VM secrets.
29
29
30
30
## Remediate secrets with attack paths
31
31
32
-
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph). to expose exploitable paths that attackers might use to reach high-impact assets. Defender for Cloud provides [a number of attack paths scenarios](secrets-scanning.md#attack-path-scenarios) for VM secrets.
32
+
Attack path analysis is a graph-based algorithm that scans your [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph). to expose exploitable paths that attackers might use to reach high-impact assets. Defender for Cloud provides a number of attack paths scenarios for VM secrets.
33
33
34
34
35
35
1. Sign in to the [Azure portal](https://portal.azure.com).
0 commit comments