Skip to content

Commit 225ec61

Browse files
updates 4
1 parent e94c2fd commit 225ec61

File tree

3 files changed

+19
-17
lines changed

3 files changed

+19
-17
lines changed

articles/defender-for-cloud/concept-regulatory-compliance.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,26 +2,26 @@
22
title: The Microsoft cloud security benchmark in Microsoft Defender for Cloud
33
description: Learn about the Microsoft cloud security benchmark in Microsoft Defender for Cloud.
44
ms.topic: conceptual
5-
ms.date: 01/10/2023
5+
ms.date: 03/13/2024
66
---
77

88
# Microsoft cloud security benchmark in Defender for Cloud
99

10-
Industry standards, regulatory standards, and benchmarks are represented in Microsoft Defender for Cloud as [security standards](security-policy-concept.md), and are assigned to scopes such as Azure subscriptions, AWS accounts, and GCP projects.
10+
Industry standards, regulatory standards, and benchmarks are represented in Microsoft Defender for Cloud as [security standards](security-policy-concept.md). These standards are assigned to scopes such as Azure subscriptions, AWS accounts, and GCP projects.
1111

1212
Defender for Cloud continuously assesses your hybrid cloud environment against these standards, and provides information about compliance in the **Regulatory compliance** dashboard.
1313

1414
When you onboard subscriptions and accounts to Defender for Cloud, the [Microsoft cloud security benchmark](/security/benchmark/azure/introduction) (MCSB) automatically starts to assess resources in scope.
1515

1616
This benchmark builds on the cloud security principles defined by the Azure Security Benchmark and applies these principles with detailed technical implementation guidance for Azure, for other cloud providers (such as AWS and GCP), and for other Microsoft clouds.
1717

18-
:::image type="content" source="media/concept-regulatory-compliance/microsoft-security-benchmark.png" alt-text="Image that shows the components that make up the Microsoft cloud security benchmark.":::
18+
:::image type="content" source="media/concept-regulatory-compliance/microsoft-security-benchmark.png" alt-text="Image that shows the components that make up the Microsoft cloud security benchmark." lightbox="media/concept-regulatory-compliance/microsoft-security-benchmark.png":::
1919

2020
The compliance dashboard gives you a view of your overall compliance standing. Security for non-Azure platforms follows the same cloud-neutral security principles as Azure. Each control within the benchmark provides the same granularity and scope of technical guidance across Azure and other cloud resources.
2121

2222
:::image type="content" source="media/concept-regulatory-compliance/compliance-dashboard.png" alt-text="Screenshot of a sample regulatory compliance page in Defender for Cloud." lightbox="media/concept-regulatory-compliance/compliance-dashboard.png":::
2323

24-
From the compliance dashboard, you're able to manage all of your compliance requirements for your cloud deployments, including automatic, manual and shared responsibilities.
24+
From the compliance dashboard, you're able to manage all of your compliance requirements for your cloud deployments, including automatic, manual, and shared responsibilities.
2525

2626
> [!NOTE]
2727
> Shared responsibilities is only compatible with Azure.

articles/defender-for-cloud/remediate-vulnerability-findings-vm.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,15 @@ description: Microsoft Defender for Cloud includes a fully integrated vulnerabil
44
ms.topic: how-to
55
author: dcurwin
66
ms.author: dacurwin
7-
ms.date: 11/09/2021
7+
ms.date: 03/13/2024
88
---
99

1010
# View and remediate findings from vulnerability assessment solutions on your VMs
1111

1212
> [!CAUTION]
1313
> This article references CentOS, a Linux distribution that is nearing End Of Life (EOL) status. Please consider your use and planning accordingly.
1414
15-
When your vulnerability assessment tool reports vulnerabilities to Defender for Cloud, Defender for Cloud presents the findings and related information as recommendations. In addition, the findings include related information such as remediation steps, relevant CVEs, CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific VM.
15+
When your vulnerability assessment tool reports vulnerabilities to Defender for Cloud, Defender for Cloud presents the findings and related information as recommendations. In addition, the findings include related information such as remediation steps, relevant common vulnerabilities and exposures (CVEs), CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific VM.
1616

1717
## View findings from the scans of your virtual machines
1818

@@ -38,7 +38,7 @@ To view vulnerability assessment findings (from all of your configured scanners)
3838

3939
- Links to all relevant CVEs (where available)
4040
- Remediation steps
41-
- Any additional reference pages
41+
- Any more reference pages
4242

4343
1. To remediate a finding, follow the remediation steps from this details pane.
4444

@@ -48,9 +48,9 @@ If you have an organizational need to ignore a finding, rather than remediate it
4848

4949
When a finding matches the criteria you defined in your disable rules, it doesn't appear in the list of findings. Typical scenarios include:
5050

51-
- Disable findings with severity below medium
51+
- Disable findings with severity less than medium
5252
- Disable findings that are non-patchable
53-
- Disable findings with CVSS score below 6.5
53+
- Disable findings with CVSS score less than 6.5
5454
- Disable findings with specific text in the security check or category (for example, “RedHat”, “CentOS Security Update for sudo”)
5555

5656
> [!IMPORTANT]
@@ -72,15 +72,17 @@ To create a rule:
7272

7373
1. Select **Apply rule**.
7474

75-
:::image type="content" source="./media/remediate-vulnerability-findings-vm/new-disable-rule-for-finding.png" alt-text="Create a disable rule for VA findings on VM.":::
75+
:::image type="content" source="./media/remediate-vulnerability-findings-vm/new-disable-rule-for-finding.png" alt-text="Create a disable rule for VA findings on VM." lightbox="media/remediate-vulnerability-findings-vm/new-disable-rule-for-finding.png":::
7676

7777
> [!IMPORTANT]
7878
> Changes might take up to 24 hours to take effect.
7979
8080
1. To view, override, or delete a rule:
8181
1. Select **Disable rule**.
8282
1. From the scope list, subscriptions with active rules show as **Rule applied**.
83-
:::image type="content" source="./media/remediate-vulnerability-findings-vm/modify-rule.png" alt-text="Modify or delete an existing rule.":::
83+
84+
:::image type="content" source="./media/remediate-vulnerability-findings-vm/modify-rule.png" alt-text="Modify or delete an existing rule." lightbox="media/remediate-vulnerability-findings-vm/modify-rule.png":::
85+
8486
1. To view or delete the rule, select the ellipsis menu ("...").
8587

8688
## Export the results

articles/defender-for-cloud/secure-score-access-and-track.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Tracking your secure score
33
description: Learn about the multiple ways to access and track your secure score in Microsoft Defender for Cloud.
44
ms.topic: how-to
5-
ms.date: 01/09/2023
5+
ms.date: 03/13/2024
66
---
77

88
# Track secure score
@@ -14,7 +14,7 @@ You can find your overall secure score, and your score per subscription, through
1414
1515
## Get your secure score from the portal
1616

17-
Defender for Cloud displays your score prominently in the portal. When you select the Secure score tile on the overview page, you're taken to the dedicated secure score page, where you'll see the score broken down by subscription. Select a single subscription to see the detailed list of prioritized recommendations and the potential effect that remediating them will have on the subscription's score.
17+
Defender for Cloud displays your score prominently in the portal. When you select the secure score tile on the overview page, you're taken to the dedicated secure score page, where you'll see the score broken down by subscription. Select a single subscription to see the detailed list of prioritized recommendations and the potential effect that remediating them will have on the subscription's score.
1818

1919
Your secure score is shown in the following locations in Defender for Cloud's portal pages.
2020

@@ -24,16 +24,16 @@ Your secure score is shown in the following locations in Defender for Cloud's po
2424

2525
- In the dedicated **Secure score** page you can see the secure score for your subscription and your management groups:
2626

27-
:::image type="content" source="./media/secure-score-security-controls/score-on-dedicated-dashboard.png" alt-text="The secure score for subscriptions on Defender for Cloud's secure score page":::
27+
:::image type="content" source="./media/secure-score-security-controls/score-on-dedicated-dashboard.png" alt-text="The secure score for subscriptions on Defender for Cloud's secure score page" lightbox="media/secure-score-security-controls/score-on-dedicated-dashboard.png":::
2828

29-
:::image type="content" source="./media/secure-score-security-controls/secure-score-management-groups.png" alt-text="The secure score for management groups on Defender for Cloud's secure score page":::
29+
:::image type="content" source="./media/secure-score-security-controls/secure-score-management-groups.png" alt-text="The secure score for management groups on Defender for Cloud's secure score page" lightbox="media/secure-score-security-controls/secure-score-management-groups.png":::
3030

3131
> [!NOTE]
3232
> Any management groups for which you don't have sufficient permissions, will show their score as “Restricted.”
3333
3434
- At the top of the **Recommendations** page:
3535

36-
:::image type="content" source="./media/secure-score-security-controls/score-on-recommendations-page.png" alt-text="The secure score on Defender for Cloud's recommendations page":::
36+
:::image type="content" source="./media/secure-score-security-controls/score-on-recommendations-page.png" alt-text="The secure score on Defender for Cloud's recommendations page" lightbox="media/secure-score-security-controls/score-on-recommendations-page.png":::
3737

3838
## Get your secure score from the REST API
3939

@@ -51,7 +51,7 @@ To access the secure score for multiple subscriptions with Azure Resource Graph:
5151

5252
1. From the Azure portal, open **Azure Resource Graph Explorer**.
5353

54-
:::image type="content" source="./media/multi-factor-authentication-enforcement/opening-resource-graph-explorer.png" alt-text="Launching Azure Resource Graph Explorer** recommendation page" :::
54+
:::image type="content" source="./media/multi-factor-authentication-enforcement/opening-resource-graph-explorer.png" alt-text="Launching Azure Resource Graph Explorer recommendation page." lightbox="media/multi-factor-authentication-enforcement/opening-resource-graph-explorer.png":::
5555

5656
1. Enter your Kusto query (using the following examples for guidance).
5757

0 commit comments

Comments
 (0)