You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/tutorial-security-policy.md
+73-36Lines changed: 73 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,7 @@
2
2
title: Working with security policies
3
3
description: Learn how to work with security policies in Microsoft Defender for Cloud.
4
4
ms.topic: conceptual
5
-
ms.custom: ignite-2022
6
-
ms.date: 01/24/2023
5
+
ms.date: 01/25/2022
7
6
---
8
7
9
8
# Manage security policies
@@ -14,20 +13,20 @@ To understand the relationships between initiatives, policies, and recommendatio
14
13
15
14
## Who can edit security policies?
16
15
17
-
Defender for Cloud uses Azure role-based access control (Azure RBAC), which provides built-in roles you can assign to Azure users, groups, and services. When users open Defender for Cloud, they see only information related to the resources they can access. Which means users are assigned the role of *owner*, *contributor*, or *reader* to the resource's subscription. There are also two specific Defenders for Cloud roles:
16
+
Defender for Cloud uses Azure role-based access control (Azure RBAC), which provides built-in roles you can assign to Azure users, groups, and services. When users open Defender for Cloud, they see only information related to the resources they can access. Which means users are assigned the role of *owner*, *contributor*, or *reader* to the resource's subscription. There are two specific Defender for Cloud roles that can view and manage security policies:
18
17
19
18
-**Security reader**: Has rights to view Defender for Cloud items such as recommendations, alerts, policy, and health. Can't make changes.
20
19
-**Security admin**: Has the same view rights as *security reader*. Can also update the security policy and dismiss alerts.
21
20
22
-
You can edit security policies through the Azure Policy portal, via REST API or using Windows PowerShell.
21
+
You can edit Azure security policies through Defender for Cloud, Azure Policy, via REST API or using PowerShell.
23
22
24
23
## Manage your security policies
25
24
26
25
To view your security policies in Defender for Cloud:
27
26
28
-
1. From Defender for Cloud's menu, open the **Environment settings** page. Here, you can see the management groups, subscriptions, and the initiatives applied to each.
27
+
1. From Defender for Cloud's menu, open the **Environment settings** page. Here, you can see the Azure management groups or subscriptions.
29
28
30
-
1. Select the relevant subscription or management group whose policies you want to view.
29
+
1. Select the relevant subscription or management group whose security policies you want to view.
31
30
32
31
1. Open the **Security policy** page.
33
32
@@ -36,7 +35,7 @@ To view your security policies in Defender for Cloud:
36
35
:::image type="content" source="./media/tutorial-security-policy/security-policy-page.png" alt-text="Defender for Cloud's security policy page" lightbox="./media/tutorial-security-policy/security-policy-page.png":::
37
36
38
37
> [!NOTE]
39
-
> If there is a label "MG Inherited" alongside your default initiative, it means that the initiative has been assigned to a management group and inherited by the subscription you're viewing.
38
+
> The settings of each recommendation that apply to the scope are taken into consideration and the cumulative outcome of actions taken by the recommendation is shown. For example, if in one assignment, a recommendation is Disabled, but in another it's set to Audit, then the cumulative effect applies Audit. The more active effect always takes precedence.
40
39
41
40
1. Choose from the available options on this page:
42
41
@@ -46,78 +45,116 @@ To view your security policies in Defender for Cloud:
46
45
47
46
1. To view and edit the default initiative, select it and proceed as described below.
This **Security policy** screen reflects the action taken by the policies assigned on the subscription or management group you selected.
50
51
51
-
* Use the links at the top to open a policy **assignment** that applies on the subscription or management group. These links let you access the assignment and edit or disable the policy. For example, if you see that a particular policy assignment is effectively denying endpoint protection, use the link to edit or disable the policy.
52
+
* Use the links at the top to open a policy **assignment** that applies on the subscription or management group. These links let you access the assignment and manage recommendations. For example, if you see that a particular recommendation is set to audit effect, use to change it to deny or disable from being evaluated.
52
53
53
-
* In the list of policies, you can see the effective application of the policy on your subscription or management group. The settings of each policy that apply to the scope are taken into consideration and the cumulative outcome of actions taken by the policy is shown. For example, if in one assignment of the policy is disabled, but in another it's set to AuditIfNotExist, then the cumulative effect applies AuditIfNotExist. The more active effect always takes precedence.
54
+
* In the list of recommendations, you can see the effective application of the recommendation on your subscription or management group.
54
55
55
-
* The policies' effect can be: Append, Audit, AuditIfNotExists, Deny, DeployIfNotExists, Disabled. For more information on how effects are applied, see [Understand Policy effects](../governance/policy/concepts/effects.md).
56
+
* The recommendations' effect can be:
57
+
58
+
**Audit** evaluates the compliance state of resources according to recommendation logic.<br>
59
+
**Deny** prevents deployment of non-compliant resources based on recommendation logic.<br>
60
+
**Disabled** prevents the recommendation from running.
56
61
57
-
> [!NOTE]
58
-
> When you view assigned policies, you can see multiple assignments and you can see how each assignment is configured on its own.
## Disable security policies and disable recommendations
66
+
Some recommendations might be disabled by default. For example, in the Azure Security Benchmark initiative, some recommendations are provided for you to enable only if they meet a specific regulatory or compliance requirement for your organization. For example: recommendations to encrypt data at rest with customer-managed keys, such as "Container registries should be encrypted with a customer-managed key (CMK)".
62
67
63
-
When your security initiative triggers a recommendation that's irrelevant for your environment, you can prevent that recommendation from appearing again. To disable a recommendation, disable the specific policy that generates the recommendation.
68
+
To enable a disabled recommendation and ensure it's assessed for your resources:
64
69
65
-
The recommendation you want to disable will still appear if it's required for a regulatory standard you've applied with Defender for Cloud's regulatory compliance tools. Even if you've disabled a policy in the built-in initiative, a policy in the regulatory standard's initiative will still trigger the recommendation if it's necessary for compliance. You can't disable policies from regulatory standard initiatives.
70
+
1. From Defender for Cloud's menu, open the **Environment settings** page.
66
71
67
-
For more information about recommendations, see [Managing security recommendations](review-security-recommendations.md).
72
+
1. Select the subscription or management group for which you want to disable a recommendation.
73
+
74
+
1. Open the **Security policy** page.
75
+
76
+
1. From the **Default initiative** section, select the relevant initiative.
68
77
78
+
1. Search for the recommendation that that you want to disable, either by the search bar or filters.
69
79
70
-
1.From Defender for Cloud's menu, open the **Environment settings** page. Here, you can see the management groups, subscriptions, and the initiatives applied to each.
80
+
1.Select the ellipses menu, select **Manage effect and parameters**.
71
81
72
-
1. Select the subscription or management group for which you want to disable the recommendation (and policy).
82
+
1. From the effect section, select **Audit**.
83
+
84
+
1. Select **Save**.
85
+
86
+
:::image type="content" source="./media/tutorial-security-policy/enable-security-recommendation.png" alt-text="Enable security recommendation on manage effect and parameters screen.":::
73
87
74
88
> [!NOTE]
75
-
> Remember that a management group applies its policies to its subscriptions. Therefore, if you disable a subscription's policy, and the subscription belongs to a management group that still uses the same policy, then you will continue to receive the policy recommendations. The policy will still be applied from the management level and the recommendations will still be generated.
89
+
> Setting will take effect immediately, but recommendations will update based on their freshness interval (up to 12 hours).
90
+
91
+
## Manage a security recommendation's settings
92
+
93
+
It may be necessary to configure additional parameters for some recommendations.
94
+
As an example, diagnostic logging recommendations have a default retention period of 1 day. You can change the default value if your organizational security requirements require logs to be kept for more than that, for example: 30 days.
95
+
The **additional parameters** column indicates whether a recommendation has associated additional parameters:
96
+
97
+
**Default** – the recommendation is running with default configuration<br>
98
+
**Configured** – the recommendation’s configuration is modified from its default values<br>
99
+
**None** – the recommendation does not require any additional configuration
100
+
101
+
1. From Defender for Cloud's menu, open the **Environment settings** page.
102
+
103
+
1. Select the subscription or management group for which you want to disable a recommendation.
76
104
77
105
1. Open the **Security policy** page.
78
106
79
-
1. From the **Default initiative** or **Your custom initiatives** sections, select the relevant initiative containing the policy you want to disable.
107
+
1. From the **Default initiative** section, select the relevant initiative.
108
+
109
+
1. Search for the recommendation that that you want to configure.
80
110
81
-
1. Open the **Parameters** section and search for the policy that invokes the recommendation that you want to disable.
111
+
> [!TIP]
112
+
> To view all available recommendations with additional parameters, using the filters to view the **Additional parameters** column and then default.
82
113
83
-
1.From the dropdown list, change the value for the corresponding policy to **Disabled**.
114
+
1.Select the ellipses menu, select **Manage effect and parameters**.
1. From the additional parameters section, configure the available parameters with new values.
86
117
87
118
1. Select **Save**.
88
119
89
-
> [!NOTE]
90
-
> The change might take up to 12 hours to take effect.
120
+
:::image type="content" source="./media/tutorial-security-policy/additional-parameters.png" alt-text="Configure additional parameters on manage effect and parameters screen.":::
121
+
122
+
Use the "reset to default" button to revert changes per the recommendation and restore the default value.
91
123
124
+
## Disable a security recommendation
92
125
93
-
## Enable a security policy
126
+
When your security policy triggers a recommendation that's irrelevant for your environment, you can prevent that recommendation from appearing again. To disable a recommendation, select an initiative and change its settings to disable relevant recommendations.
94
127
95
-
Some policies in your initiatives might be disabled by default. For example, in the Microsoft cloud security benchmark initiative, some policies are provided for you to enable only if they meet a specific regulatory or compliance requirement for your organization. Such policies include recommendations to encrypt data at rest with customer-managed keys, such as "Container registries should be encrypted with a customer-managed key (CMK)".
128
+
The recommendation you want to disable will still appear if it's required for a regulatory standard you've applied with Defender for Cloud's regulatory compliance tools. Even if you've disabled a recommendation in the built-in initiative, a recommendation in the regulatory standard's initiative will still trigger the recommendation if it's necessary for compliance. You can't disable recommendations from regulatory standard initiatives.
96
129
97
-
To enable a disabled policy and ensure it's assessed for your resources:
130
+
For more information about recommendations, see [Managing security recommendations](review-security-recommendations.md).
131
+
132
+
1. From Defender for Cloud's menu, open the **Environment settings** page.
98
133
99
-
1.From Defender for Cloud's menu, open the **Environment settings** page. Here, you can see the management groups, subscriptions, and the initiatives applied to each.
134
+
1.Select the subscription or management group for which you want to enable a recommendation.
100
135
101
-
1. Select the subscription or management group for which you want to enable the recommendation (and policy).
136
+
> [!NOTE]
137
+
> Remember that a management group applies its settings to its subscriptions. Therefore, if you disabled a subscription's recommendation, and the subscription belongs to a management group that still uses the same settings, then you will continue to receive the recommendation. The security policy settings will still be applied from the management level and the recommendation will still be generated.
102
138
103
139
1. Open the **Security policy** page.
104
140
105
-
1. From the **Default initiative**or **Your custom initiatives** sections, select the relevant initiative with the policy you want to enable.
141
+
1. From the **Default initiative**section, select the relevant initiative.
106
142
107
-
1.Open the **Parameters** section and search for the policy that invokes the recommendation that you want to disable.
143
+
1.Search for the recommendation that that you want to enable, either by the search bar or filters.
108
144
109
-
1. From the dropdown list, change the value for the corresponding policy to **AuditIfNotExists** or **Enforce**.
145
+
1. Select the ellipses menu, select **Manage effect and parameters**.
146
+
147
+
1. From the effect section, select **Disabled**.
110
148
111
149
1. Select **Save**.
112
150
113
151
> [!NOTE]
114
-
> The change might take up to 12 hours to take effect.
115
-
152
+
> Setting will take effect immediately, but recommendations will update based on their freshness interval (up to 12 hours).
116
153
117
154
## Next steps
118
155
This page explained security policies. For related information, see the following pages:
119
156
120
157
-[Learn how to set policies using PowerShell](../governance/policy/assign-policy-powershell.md)
121
158
-[Learn how to edit a security policy in Azure Policy](../governance/policy/tutorials/create-and-manage.md)
122
159
-[Learn how to set a policy across subscriptions or on Management groups using Azure Policy](../governance/policy/overview.md)
123
-
-[Learn how to enable Defender for Cloud on all subscriptions in a management group](onboard-management-group.md)
160
+
-[Learn how to enable Defender for Cloud on all subscriptions in a management group](onboard-management-group.md)
0 commit comments