Skip to content

Commit 1b2823c

Browse files
committed
Initial overview section from release branch
1 parent b5f83d3 commit 1b2823c

File tree

58 files changed

+611
-811
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

58 files changed

+611
-811
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 32 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -383,7 +383,7 @@
383383
{
384384
"source_path_from_root": "/articles/security-center/defender-for-cloud-introduction.md",
385385
"redirect_url": "/azure/defender-for-cloud/defender-for-cloud-introduction",
386-
"redirect_document_id": true
386+
"redirect_document_id": false
387387
},
388388
{
389389
"source_path_from_root": "/articles/security-center/defender-for-container-registries-cicd.md",
@@ -473,7 +473,7 @@
473473
{
474474
"source_path_from_root": "/articles/security-center/enable-data-collection.md",
475475
"redirect_url": "/azure/defender-for-cloud/enable-data-collection",
476-
"redirect_document_id": true
476+
"redirect_document_id": false
477477
},
478478
{
479479
"source_path_from_root": "/articles/security-center/enable-enhanced-security.md",
@@ -508,7 +508,7 @@
508508
{
509509
"source_path_from_root": "/articles/security-center/get-started.md",
510510
"redirect_url": "/azure/defender-for-cloud/get-started",
511-
"redirect_document_id": true
511+
"redirect_document_id": false
512512
},
513513
{
514514
"source_path_from_root": "/articles/security-center/harden-docker-hosts.md",
@@ -553,7 +553,7 @@
553553
{
554554
"source_path_from_root": "/articles/security-center/os-coverage.md",
555555
"redirect_url": "/azure/defender-for-cloud/os-coverage",
556-
"redirect_document_id": true
556+
"redirect_document_id": false
557557
},
558558
{
559559
"source_path_from_root": "/articles/security-center/other-threat-protections.md",
@@ -568,7 +568,7 @@
568568
{
569569
"source_path_from_root": "/articles/security-center/permissions.md",
570570
"redirect_url": "/azure/defender-for-cloud/permissions",
571-
"redirect_document_id": true
571+
"redirect_document_id": false
572572
},
573573
{
574574
"source_path_from_root": "/articles/security-center/protect-network-resources.md",
@@ -653,7 +653,7 @@
653653
{
654654
"source_path_from_root": "/articles/security-center/supported-machines-endpoint-solutions-clouds.md",
655655
"redirect_url": "/azure/defender-for-cloud/supported-machines-endpoint-solutions-clouds-containers",
656-
"redirect_document_id": true
656+
"redirect_document_id": false
657657
},
658658
{
659659
"source_path_from_root": "/articles/security-center/tutorial-protect-resources.md",
@@ -779,6 +779,31 @@
779779
"source_path_from_root": "/articles/defender-for-cloud/security-center-planning-and-operations-guide.md",
780780
"redirect_url": "/azure/defender-for-cloud/defender-for-cloud-planning-and-operations-guide",
781781
"redirect_document_id": true
782+
},
783+
{
784+
"source_path_from_root": "/articles/defender-for-cloud/enhanced-security-features-overview.md",
785+
"redirect_url": "/azure/defender-for-cloud/defender-for-cloud-introduction",
786+
"redirect_document_id": true
787+
},
788+
{
789+
"source_path_from_root": "/articles/defender-for-cloud/os-coverage.md",
790+
"redirect_url": "/azure/defender-for-cloud/monitoring-components",
791+
"redirect_document_id": false
792+
},
793+
{
794+
"source_path_from_root": "/articles/defender-for-cloud/features-paas.md",
795+
"redirect_url": "/azure/defender-for-cloud/support-matrix-defender-for-cloud",
796+
"redirect_document_id": true
797+
},
798+
{
799+
"source_path_from_root": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds-containers.md",
800+
"redirect_url": "/azure/defender-for-cloud/support-matrix-defender-for-containers",
801+
"redirect_document_id": true
802+
},
803+
{
804+
"source_path_from_root": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds-servers.md",
805+
"redirect_url": "/azure/defender-for-cloud/support-matrix-defender-for-servers",
806+
"redirect_document_id": true
782807
}
783-
]
808+
]
784809
}

articles/azure-monitor/logs/cost-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ In some scenarios, combining this data can result in cost savings. Typically, th
141141
- [LinuxAuditLog](/azure/azure-monitor/reference/tables/linuxauditlog)
142142
- [SysmonEvent](/azure/azure-monitor/reference/tables/sysmonevent)
143143
- [ProtectionStatus](/azure/azure-monitor/reference/tables/protectionstatus)
144-
- [Update](/azure/azure-monitor/reference/tables/update) and [UpdateSummary](/azure/azure-monitor/reference/tables/updatesummary) when the Update Management solution isn't running in the workspace or solution targeting is enabled. See [What data types are included in the 500-MB data daily allowance?](../../defender-for-cloud/enhanced-security-features-overview.md#what-data-types-are-included-in-the-500-mb-data-daily-allowance).
144+
- [Update](/azure/azure-monitor/reference/tables/update) and [UpdateSummary](/azure/azure-monitor/reference/tables/updatesummary) when the Update Management solution isn't running in the workspace or solution targeting is enabled. See [What data types are included in the 500-MB data daily allowance?](../../defender-for-cloud/plan-defender-for-servers-data-workspace.md#log-analytics-pricing-faq).
145145

146146
The count of monitored servers is calculated on an hourly granularity. The daily data allocation contributions from each monitored server are aggregated at the workspace level. If the workspace is in the legacy Per Node pricing tier, the Microsoft Defender for Cloud and Log Analytics allocations are combined and applied jointly to all billable ingested data.
147147

articles/defender-for-cloud/TOC.yml

Lines changed: 13 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -7,32 +7,12 @@
77
- name: What is Microsoft Defender for Cloud?
88
displayName: Defender for cloud, servers, storage, sql, containers, app service, key vault, resource manager, dns, open-source relational databases, Azure cosmos db, db, Azure, defender
99
href: defender-for-cloud-introduction.md
10-
- name: What are the enhanced security features?
11-
displayName: azure defender
12-
href: enhanced-security-features-overview.md
1310
- name: What's new?
1411
displayName: changelog, news, release notes
1512
href: release-notes.md
1613
- name: Important upcoming changes
1714
displayName: release notes, changelog, news
1815
href: upcoming-changes.md
19-
- name: Availability
20-
items:
21-
- name: Supported platforms for servers
22-
displayName: coverage, supported platforms, cloud services, virtual machines
23-
href: os-coverage.md
24-
- name: Servers coverage by OS, machine type, and cloud
25-
displayName: coverage, machines, windows, linux, multicloud, supported features, endpoint protections
26-
href: supported-machines-endpoint-solutions-clouds-servers.md
27-
- name: Defender for Containers feature availability
28-
displayName: Containers, features availability, environment information
29-
href: supported-machines-endpoint-solutions-clouds-containers.md
30-
- name: Feature coverage for Azure PaaS resources
31-
displayName: Paas, resources
32-
href: features-paas.md
33-
- name: User roles and permissions
34-
displayName: RBAC, permissions, roles, contributor, security, reader, admin, owner
35-
href: permissions.md
3616

3717
- name: Quickstarts
3818
items:
@@ -98,6 +78,19 @@
9878

9979
- name: Concepts
10080
items:
81+
- name: Interoperability and permissions
82+
items:
83+
- name: User roles and permissions
84+
href: permissions.md
85+
- name: Azure cloud support
86+
displayName: coverage, supported platforms, cloud services, roles, permissions
87+
href: support-matrix-defender-for-cloud.md
88+
- name: Defender for Servers support matrices
89+
displayName: coverage, machines, windows, linux, multicloud, supported features, endpoint protections
90+
href: support-matrix-defender-for-servers.md
91+
- name: Defender for Containers support matrices
92+
displayName: Containers, features availability, environment information
93+
href: support-matrix-defender-for-containers.md
10194
- name: Protect multicloud resources
10295
items:
10396
- name: The Defender for Cloud multicloud solution

articles/defender-for-cloud/adaptive-application-controls.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,11 @@ description: This document helps you use adaptive application control in Microso
44
author: bmansheim
55
ms.author: benmansheim
66
ms.topic: how-to
7-
ms.date: 01/08/2023
7+
ms.date: 02/06/2023
88

99
---
1010
# Use adaptive application controls to reduce your machines' attack surfaces
1111

12-
1312
Learn about the benefits of Microsoft Defender for Cloud's adaptive application controls and how you can enhance your security with this data-driven, intelligent feature.
1413

1514
## What are adaptive application controls?
@@ -97,7 +96,7 @@ Select the recommendation, or open the adaptive application controls page to vie
9796
> [!TIP]
9897
> Both application lists include the option to restrict a specific application to certain users. Adopt the principle of least privilege whenever possible.
9998
>
100-
> Applications are defined by their publishers; if an application doesn't have publisher information (it's unsigned), a path rule is created for the full path of the specific application.
99+
> Applications are defined by their publishers. If an application doesn't have publisher information (it's unsigned), a path rule is created for the full path of the specific application.
101100
102101
1. To apply the rule, select **Audit**.
103102

@@ -176,21 +175,21 @@ To remediate the issues:
176175

177176
1. To investigate further, select a group.
178177

179-
:::image type="content" source="./media/adaptive-application/recent-alerts.png" alt-text="Screenshot showing selecting a group the group settings page for adaptive application controls." lightbox="./media/adaptive-application/recent-alerts.png":::
178+
![Recent alerts.](./media/adaptive-application/recent-alerts.png)
180179

181180
1. For further details, and the list of affected machines, select an alert.
182181

183182
The security alerts page shows more details of the alerts and provides a **Take action** link with recommendations of how to mitigate the threat.
184183

185-
:::image type="content" source="media/adaptive-application/adaptive-application-alerts-start-time.png" alt-text="Screenshot showing the start time of adaptive application controls alerts is the time that adaptive application controls created the alert.":::
184+
:::image type="content" source="media/adaptive-application/adaptive-application-alerts-start-time.png" alt-text="The start time of adaptive application controls alerts is the time that adaptive application controls created the alert.":::
186185

187186
> [!NOTE]
188187
> Adaptive application controls calculates events once every twelve hours. The "activity start time" shown in the security alerts page is the time that adaptive application controls created the alert, **not** the time that the suspicious process was active.
189188
190189

191190
## Move a machine from one group to another
192191

193-
When you move a machine from one group to another, the application control policy applied to it changes to the settings of the group that you moved it to. You can also move a machine from a configured group to a non-configured group; doing so removes any application control rules that were applied to the machine.
192+
When you move a machine from one group to another, the application control policy applied to it changes to the settings of the group that you moved it to. You can also move a machine from a configured group to a non-configured group, which removes any application control rules that were applied to the machine.
194193

195194
1. Open the **Workload protections dashboard** and from the advanced protection area, select **Adaptive application controls**.
196195

@@ -212,13 +211,13 @@ When you move a machine from one group to another, the application control polic
212211

213212
To manage your adaptive application controls programmatically, use our REST API.
214213

215-
The relevant API documentation is available in [the Adaptive application Controls section of Defender for Cloud's API docs](https://learn.microsoft.com/rest/api/defenderforcloud/adaptive-application-controls).
214+
The relevant API documentation is available in [the Adaptive application Controls section of Defender for Cloud's API docs](/rest/api/defenderforcloud/adaptive-application-controls).
216215

217216
Some of the functions available from the REST API include:
218217

219218
* **List** retrieves all your group recommendations and provides a JSON with an object for each group.
220219

221-
* **Get** retrieves the JSON with the full recommendation data (list of machines, publisher/path rules, etc.).
220+
* **Get** retrieves the JSON with the full recommendation data (that is, list of machines, publisher/path rules, and so on).
222221

223222
* **Put** configures your rule (use the JSON you retrieved with **Get** as the body for this request).
224223

articles/defender-for-cloud/alerts-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ This article describes security alerts and notifications in Microsoft Defender f
1414
## What are security alerts?
1515
Security alerts are the notifications generated by Defender for Cloud and Defender for Cloud plans when threats are identified in your cloud, hybrid, or on-premises environment.
1616

17-
- Security alerts are triggered by advanced detections in Defender for Cloud, and are available when you enable [enhanced security features](enhanced-security-features-overview.md).
17+
- Security alerts are triggered by advanced detections in Defender for Cloud, and are available when you enable Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#cloud-workload-protections-cwp).
1818
- Each alert provides details of affected resources, issues, and remediation recommendations.
1919
- Defender for Cloud classifies alerts and prioritizes them by severity in the Defender for Cloud portal.
2020
- Alerts data is retained for 90 days.

articles/defender-for-cloud/alerts-schemas.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.date: 11/09/2021
99

1010
# Security alerts schemas
1111

12-
If your subscription has enhanced security features enabled, you'll receive security alerts when Defender for Cloud detects threats to their resources.
12+
If your subscription has Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#cloud-workload-protections-cwp) enabled, you'll receive security alerts when Defender for Cloud detects threats to their resources.
1313

1414
You can view these security alerts in Microsoft Defender for Cloud's pages - [overview dashboard](overview-page.md), [alerts](tutorial-security-incident.md), [resource health pages](investigate-resource-health.md), or [workload protections dashboard](workload-protections-dashboard.md) - and through external tools such as:
1515

articles/defender-for-cloud/alerts-suppression-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ This page explains how you can use alerts suppression rules to suppress false po
1515
|Aspect|Details|
1616
|----|:----|
1717
|Release state:|General availability (GA)|
18-
|Pricing:|Free<br>(Security alerts are generated by [Defender plans](enable-enhanced-security.md))|
18+
|Pricing:|Free<br>(Most security alerts are only available with [Defender plans](defender-for-cloud-introduction.md#cloud-workload-protections-cwp))|
1919
|Required roles and permissions:|**Security admin** and **Owner** can create/delete rules.<br>**Security reader** and **Reader** can view rules.|
2020
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National (Azure Government, Azure China 21Vianet)|
2121

articles/defender-for-cloud/asset-inventory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ The asset inventory page of Microsoft Defender for Cloud shows the [security pos
1212

1313
Use this view and its filters to address such questions as:
1414

15-
- Which of my subscriptions with [Defender plans](defender-for-cloud-introduction.md#cwp---identify-unique-workload-security-requirements) enabled have outstanding recommendations?
15+
- Which of my subscriptions with [Defender plans](defender-for-cloud-introduction.md#cloud-workload-protections-cwp) enabled have outstanding recommendations?
1616
- Which of my machines with the tag 'Production' are missing the Log Analytics agent?
1717
- How many of my machines tagged with a specific tag have outstanding recommendations?
1818
- Which machines in a specific resource group have a known vulnerability (using a CVE number)?

articles/defender-for-cloud/auto-deploy-azure-monitoring-agent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ When you auto-provision the Log Analytics agent in Defender for Cloud, you can c
107107

108108
If you want to collect security events when you auto-provision the Azure Monitor Agent, you can create a [Data Collection Rule](../azure-monitor/essentials/data-collection-rule-overview.md) to collect the required events.
109109

110-
Like for Log Analytics workspaces, Defender for Cloud users are eligible for [500-MB of free data](enhanced-security-features-overview.md#faq---pricing-and-billing) daily on defined data types that include security events.
110+
Like for Log Analytics workspaces, Defender for Cloud users are eligible for [500-MB of free data](plan-defender-for-servers-data-workspace.md#log-analytics-pricing-faq) daily on defined data types that include security events.
111111

112112
## Next steps
113113

articles/defender-for-cloud/concept-attack-path.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,6 @@ Learn how to use the [cloud security explorer](how-to-manage-cloud-security-expl
4545

4646
## Next steps
4747

48-
- [Enable Defender CSPM on a subscription](enable-enhanced-security.md#enable-enhanced-security-features-on-a-subscription)
4948
- [Identify and remediate attack paths](how-to-manage-attack-path.md)
5049
- [Enabling agentless scanning for machines](enable-vulnerability-assessment-agentless.md#enabling-agentless-scanning-for-machines)
5150
- [Build a query with the cloud security explorer](how-to-manage-cloud-security-explorer.md)

0 commit comments

Comments
 (0)