Skip to content

Commit 1b7e0f9

Browse files
authored
Merge pull request #268606 from AlizaBernstein/WI-214554b-freshness-updates-march-2024
WI-214554b-freshness-updates-march-2024
2 parents f8107b1 + 7c1ce01 commit 1b7e0f9

15 files changed

+89
-91
lines changed

articles/defender-for-cloud/alerts-suppression-rules.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Suppressing false positives or other unwanted security alerts
3-
description: This article explains how to use Microsoft Defender for Cloud's suppression rules to hide unwanted security alerts, such as false positives
4-
ms.date: 01/09/2023
3+
description: This article explains how to use Microsoft Defender for Cloud's suppression rules to hide unwanted security alerts, such as false positives.
4+
ms.date: 03/11/2024
55
ms.topic: how-to
66
ms.author: dacurwin
77
author: dcurwin
@@ -69,11 +69,11 @@ To edit a rule you've created from the suppression rules page:
6969

7070
1. From Defender for Cloud's security alerts page, select **Suppression rules** at the top of the page.
7171

72-
:::image type="content" source="media/alerts-suppression-rules/suppression-rules-button.png" alt-text="Screenshot of the suppression rule button in the Security Alerts page.":::
72+
:::image type="content" source="media/alerts-suppression-rules/suppression-rules-button.png" alt-text="Screenshot that shows the suppression rule button in the Security Alerts page." lightbox="media/alerts-suppression-rules/suppression-rules-button.png":::
7373

7474
1. The suppression rules page opens with all the rules for the selected subscriptions.
7575

76-
:::image type="content" source="media/alerts-suppression-rules/suppression-rules-page.png" alt-text="Screenshot of the Suppression rules page where you can review the suppression rules and create new ones." lightbox="media/alerts-suppression-rules/suppression-rules-page.png":::
76+
:::image type="content" source="media/alerts-suppression-rules/suppression-rules-page.png" alt-text="Screenshot that shows the Suppression rules page where you can review the suppression rules and create new ones." lightbox="media/alerts-suppression-rules/suppression-rules-page.png":::
7777

7878
1. To edit a single rule, open the three dots (...) at the end of the rule and select **Edit**.
7979
1. Change the details of the rule and select **Apply**.
@@ -101,6 +101,4 @@ For details and usage examples, see the [API documentation](/rest/api/defenderfo
101101

102102
This article described the suppression rules in Microsoft Defender for Cloud that automatically dismiss unwanted alerts.
103103

104-
Learn more about security alerts:
105-
106-
- [Security alerts generated by Defender for Cloud](alerts-reference.md)
104+
Learn more about [security alerts generated by Defender for Cloud](alerts-reference.md).

articles/defender-for-cloud/concept-regulatory-compliance.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,26 +2,26 @@
22
title: The Microsoft cloud security benchmark in Microsoft Defender for Cloud
33
description: Learn about the Microsoft cloud security benchmark in Microsoft Defender for Cloud.
44
ms.topic: conceptual
5-
ms.date: 01/10/2023
5+
ms.date: 03/13/2024
66
---
77

88
# Microsoft cloud security benchmark in Defender for Cloud
99

10-
Industry standards, regulatory standards, and benchmarks are represented in Microsoft Defender for Cloud as [security standards](security-policy-concept.md), and are assigned to scopes such as Azure subscriptions, AWS accounts, and GCP projects.
10+
Industry standards, regulatory standards, and benchmarks are represented in Microsoft Defender for Cloud as [security standards](security-policy-concept.md). These standards are assigned to scopes such as Azure subscriptions, AWS accounts, and GCP projects.
1111

1212
Defender for Cloud continuously assesses your hybrid cloud environment against these standards, and provides information about compliance in the **Regulatory compliance** dashboard.
1313

1414
When you onboard subscriptions and accounts to Defender for Cloud, the [Microsoft cloud security benchmark](/security/benchmark/azure/introduction) (MCSB) automatically starts to assess resources in scope.
1515

1616
This benchmark builds on the cloud security principles defined by the Azure Security Benchmark and applies these principles with detailed technical implementation guidance for Azure, for other cloud providers (such as AWS and GCP), and for other Microsoft clouds.
1717

18-
:::image type="content" source="media/concept-regulatory-compliance/microsoft-security-benchmark.png" alt-text="Image that shows the components that make up the Microsoft cloud security benchmark.":::
18+
:::image type="content" source="media/concept-regulatory-compliance/microsoft-security-benchmark.png" alt-text="Image that shows the components that make up the Microsoft cloud security benchmark." lightbox="media/concept-regulatory-compliance/microsoft-security-benchmark.png":::
1919

2020
The compliance dashboard gives you a view of your overall compliance standing. Security for non-Azure platforms follows the same cloud-neutral security principles as Azure. Each control within the benchmark provides the same granularity and scope of technical guidance across Azure and other cloud resources.
2121

2222
:::image type="content" source="media/concept-regulatory-compliance/compliance-dashboard.png" alt-text="Screenshot of a sample regulatory compliance page in Defender for Cloud." lightbox="media/concept-regulatory-compliance/compliance-dashboard.png":::
2323

24-
From the compliance dashboard, you're able to manage all of your compliance requirements for your cloud deployments, including automatic, manual and shared responsibilities.
24+
From the compliance dashboard, you're able to manage all of your compliance requirements for your cloud deployments, including automatic, manual, and shared responsibilities.
2525

2626
> [!NOTE]
2727
> Shared responsibilities is only compatible with Azure.

articles/defender-for-cloud/defender-for-app-service-introduction.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Defender for App Service - the benefits and features
3-
description: Learn about the capabilities of Microsoft Defender for App Service and how to enable it on your subscription
4-
ms.date: 01/10/2023
3+
description: Learn about the capabilities of Microsoft Defender for App Service and how to enable it on your subscription.
4+
ms.date: 03/12/2024
55
ms.topic: overview
66
ms.author: dacurwin
77
author: dcurwin
@@ -17,7 +17,7 @@ To protect your Azure App Service plan with Microsoft Defender for App Service,
1717

1818
- A supported App Service plan associated with dedicated machines. Supported plans are listed in [Availability](#availability).
1919

20-
- Defender for Cloud's enhanced protections enabled on your subscription as described in [Quickstart: Enable enhanced security features](enable-enhanced-security.md).
20+
- Defender for Cloud's enhanced protections enabled on your subscription as described in [Enable enhanced security features](connect-azure-subscription.md).
2121

2222
> [!TIP]
2323
> You can optionally enable individual Microsoft Defender plans, like Microsoft Defender for App Service.
@@ -35,11 +35,11 @@ To protect your Azure App Service plan with Microsoft Defender for App Service,
3535

3636
Azure App Service is a fully managed platform for building and hosting your web apps and APIs. Since the platform is fully managed, you don't have to worry about the infrastructure. It provides management, monitoring, and operational insights to meet enterprise-grade performance, security, and compliance requirements. For more information, see [Azure App Service](https://azure.microsoft.com/services/app-service/).
3737

38-
**Microsoft Defender for App Service** uses the scale of the cloud to identify attacks targeting applications running over App Service. Attackers probe web applications to find and exploit weaknesses. Before being routed to specific environments, requests to applications running in Azure go through several gateways, where they're inspected and logged. This data is then used to identify exploits and attackers, and to learn new patterns that will be used later.
38+
**Microsoft Defender for App Service** uses the scale of the cloud to identify attacks targeting applications running over App Service. Attackers probe web applications to find and exploit weaknesses. Before being routed to specific environments, requests to applications running in Azure go through several gateways, where they're inspected and logged. This data is then used to identify exploits and attackers, and to learn new patterns that can be used later.
3939

4040
When you enable Microsoft Defender for App Service, you immediately benefit from the following services offered by this Defender plan:
4141

42-
- **Secure** - Defender for App Service assesses the resources covered by your App Service plan and generates security recommendations based on its findings. Use the detailed instructions in these recommendations to harden your App Service resources.
42+
- **Secure** - Defender for App Service assesses the resources covered by your App Service plan and generates security recommendations based on its findings. To harden your App Service resources, use the detailed instructions in these recommendations.
4343

4444
- **Detect** - Defender for App Service detects a multitude of threats to your App Service resources by monitoring:
4545
- the VM instance in which your App Service is running, and its management interface
@@ -65,7 +65,7 @@ Defender for Cloud monitors for many threats to your App Service resources. The
6565

6666
### Dangling DNS detection
6767

68-
Defender for App Service also identifies any DNS entries remaining in your DNS registrar when an App Service website is decommissioned - these are known as dangling DNS entries. When you remove a website and don't remove its custom domain from your DNS registrar, the DNS entry is pointing to a non-existent resource, and your subdomain is vulnerable to a takeover. Defender for Cloud doesn't scan your DNS registrar for *existing* dangling DNS entries; it alerts you when an App Service website is decommissioned and its custom domain (DNS entry) isn't deleted.
68+
Defender for App Service also identifies any DNS entries remaining in your DNS registrar when an App Service website is decommissioned - these are known as dangling DNS entries. When you remove a website and don't remove its custom domain from your DNS registrar, the DNS entry is pointing to a nonexistent resource, and your subdomain is vulnerable to a takeover. Defender for Cloud doesn't scan your DNS registrar for *existing* dangling DNS entries; it alerts you when an App Service website is decommissioned and its custom domain (DNS entry) isn't deleted.
6969

7070
Subdomain takeovers are a common, high-severity threat for organizations. When a threat actor detects a dangling DNS entry, they create their own site at the destination address. The traffic intended for the organization’s domain is then directed to the threat actor's site, and they can use that traffic for a wide range of malicious activity.
7171

@@ -89,6 +89,6 @@ In this article, you learned about Microsoft Defender for App Service.
8989
9090
For related material, see the following articles:
9191

92-
- To export your alerts to Microsoft Sentinel, any third-party SIEM, or any other external tool, follow the instructions in [Stream alerts to a SIEM, SOAR, or IT Service Management solution](export-to-siem.md).
92+
- To export your alerts to Microsoft Sentinel, any third-party SIEM, or any other external tool, follow the instructions in [Stream alerts to monitoring solutions](export-to-siem.md).
9393
- For a list of the Microsoft Defender for App Service alerts, see the [Reference table of alerts](alerts-reference.md#alerts-for-azure-app-service).
9494
- For more information on App Service plans, see [App Service plans](https://azure.microsoft.com/pricing/details/app-service/plans/).

articles/defender-for-cloud/defender-for-devops-introduction.md

Lines changed: 9 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Microsoft Defender for Cloud DevOps security - the benefits and features
3-
description: Learn about the benefits and features of Microsoft DevOps security
4-
ms.date: 01/24/2023
3+
description: Learn about the benefits and features of Microsoft DevOps security.
4+
ms.date: 03/11/2024
55
ms.topic: overview
66
ms.custom: references_regions
77
---
88

9-
# Overview of Microsoft Defender for Cloud DevOps Security
9+
# Overview of Microsoft Defender for Cloud DevOps security
1010

1111
Microsoft Defender for Cloud enables comprehensive visibility, posture management, and threat protection across multicloud environments including Azure, AWS, GCP, and on-premises resources.
1212

@@ -40,7 +40,7 @@ Here, you can add [Azure DevOps](quickstart-onboard-devops.md), [GitHub](quickst
4040

4141
The DevOps inventory table allows you to review onboarded DevOps resources and the security information related to them.
4242

43-
:::image type="content" source="media/defender-for-devops-introduction/inventory-grid.png" alt-text="Screenshot of the devops inventory table on the DevOps security overview page." lightbox="media/defender-for-devops-introduction/bottom-of-page.png":::
43+
:::image type="content" source="media/defender-for-devops-introduction/inventory-grid.png" alt-text="Screenshot that shows the Devops inventory table on the DevOps security overview page." lightbox="media/defender-for-devops-introduction/bottom-of-page.png":::
4444

4545
On this part of the screen you see:
4646

@@ -67,7 +67,7 @@ On this part of the screen you see:
6767
6868
- **Findings** - Shows the total number of code, secrets, dependency, and infrastructure-as-code findings identified in the DevOps resource.
6969

70-
This table can be viewed as a flat view at the DevOps resource level (repositories for Azure DevOps and GitHub, projects for GitLab) or in a grouping view showing organizations/projects/groups hierarchy. Also, the table can be filtered by subscription, resource type, finding type, or severity.
70+
This table can be viewed as a flat view at the DevOps resource level (repositories for Azure DevOps and GitHub, projects for GitLab) or in a grouping view showing organizations/projects/groups hierarchy. Also, you can filter the table by subscription, resource type, finding type, or severity.
7171

7272
## Learn more
7373

@@ -77,12 +77,10 @@ This table can be viewed as a flat view at the DevOps resource level (repositori
7777

7878
- You can learn about [securing Azure Pipelines](/azure/devops/pipelines/security/overview).
7979

80-
- Learn about [security hardening practices for GitHub Actions](https://docs.github.com/actions/security-guides/security-hardening-for-github-actions).
80+
- Learn about [security hardening practices for GitHub actions](https://docs.github.com/actions/security-guides/security-hardening-for-github-actions).
8181

8282
## Next steps
8383

84-
[Connect your Azure DevOps organizations](quickstart-onboard-devops.md).
85-
86-
[Connect your GitHub organizations](quickstart-onboard-github.md).
87-
88-
[Connect your GitLab groups](quickstart-onboard-gitlab.md).
84+
- [Connect your Azure DevOps organizations](quickstart-onboard-devops.md).
85+
- [Connect your GitHub organizations](quickstart-onboard-github.md).
86+
- [Connect your GitLab groups](quickstart-onboard-gitlab.md).

articles/defender-for-cloud/defender-for-dns-introduction.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Defender for DNS - the benefits and features
3-
description: Learn about the benefits and features of Microsoft Defender for DNS
4-
ms.date: 01/10/2023
3+
description: Learn about the benefits and features of Microsoft Defender for DNS.
4+
ms.date: 03/11/2024
55
ms.topic: overview
66
ms.author: dacurwin
77
author: dcurwin
@@ -11,9 +11,9 @@ author: dcurwin
1111

1212
[!INCLUDE [Defender for DNS note](./includes/defender-for-dns-note.md)]
1313

14-
Microsoft Defender for DNS provides an additional layer of protection for resources that use Azure DNS's [Azure-provided name resolution](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#azure-provided-name-resolution) capability.
14+
Microsoft Defender for DNS provides another layer of protection for resources that use Azure DNS's [Azure-provided name resolution](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#azure-provided-name-resolution) capability.
1515

16-
From within Azure DNS, Defender for DNS monitors the queries from these resources and detects suspicious activities without the need for any additional agents on your resources.
16+
From within Azure DNS, Defender for DNS monitors the queries from these resources and detects suspicious activities without the need for any extra agents on your resources.
1717

1818
## Availability
1919

articles/defender-for-cloud/defender-for-key-vault-introduction.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Defender for Key Vault - the benefits and features
33
description: Learn about the benefits and features of Microsoft Defender for Key Vault.
4-
ms.date: 11/09/2021
4+
ms.date: 03/13/2024
55
ms.topic: overview
66
ms.author: dacurwin
77
author: dcurwin
@@ -12,7 +12,7 @@ ms.custom: references_regions
1212

1313
Azure Key Vault is a cloud service that safeguards encryption keys and secrets like certificates, connection strings, and passwords.
1414

15-
Enable **Microsoft Defender for Key Vault** for Azure-native, advanced threat protection for Azure Key Vault, providing an additional layer of security intelligence.
15+
Enable **Microsoft Defender for Key Vault** for Azure-native, advanced threat protection for Azure Key Vault, providing another layer of security intelligence.
1616

1717
## Availability
1818

@@ -26,15 +26,15 @@ Enable **Microsoft Defender for Key Vault** for Azure-native, advanced threat pr
2626

2727
Microsoft Defender for Key Vault detects unusual and potentially harmful attempts to access or exploit Key Vault accounts. This layer of protection helps you address threats even if you're not a security expert, and without the need to manage third-party security monitoring systems.
2828

29-
When anomalous activities occur, Defender for Key Vault shows alerts and optionally sends them via email to relevant members of your organization. These alerts include the details of the suspicious activity and recommendations on how to investigate and remediate threats.
29+
When anomalous activities occur, Defender for Key Vault shows alerts, and optionally sends them via email to relevant members of your organization. These alerts include the details of the suspicious activity and recommendations on how to investigate and remediate threats.
3030

3131
## Microsoft Defender for Key Vault alerts
3232

3333
When you get an alert from Microsoft Defender for Key Vault, we recommend you investigate and respond to the alert as described in [Respond to Microsoft Defender for Key Vault](defender-for-key-vault-usage.md). Microsoft Defender for Key Vault protects applications and credentials, so even if you're familiar with the application or user that triggered the alert, it's important to check the situation surrounding every alert.
3434

3535
The alerts appear in Key Vault's **Security** page, the Workload protections, and Defender for Cloud's security alerts page.
3636

37-
:::image type="content" source="./media/defender-for-key-vault-intro/key-vault-security-page.png" alt-text="Azure Key Vault's security page":::
37+
:::image type="content" source="./media/defender-for-key-vault-intro/key-vault-security-page.png" alt-text="Screenshot that shows the Azure Key Vault's security page" lightbox="media/defender-for-key-vault-intro/key-vault-security-page.png":::
3838

3939
> [!TIP]
4040
> You can simulate Microsoft Defender for Key Vault alerts by following the instructions in [Validating Azure Key Vault threat detection in Microsoft Defender for Cloud](https://techcommunity.microsoft.com/t5/azure-security-center/validating-azure-key-vault-threat-detection-in-azure-security/ba-p/1220336).
@@ -43,7 +43,7 @@ The alerts appear in Key Vault's **Security** page, the Workload protections, an
4343

4444
When you receive an alert from [Microsoft Defender for Key Vault](defender-for-key-vault-introduction.md), we recommend you investigate and respond to the alert as described below. Microsoft Defender for Key Vault protects applications and credentials, so even if you're familiar with the application or user that triggered the alert, it's important to verify the situation surrounding every alert.
4545

46-
Alerts from Microsoft Defender for Key Vault includes these elements:
46+
Alerts from Microsoft Defender for Key Vault include these elements:
4747

4848
- Object ID
4949
- User Principal Name or IP address of the suspicious resource

0 commit comments

Comments
 (0)