You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/concept-regulatory-compliance.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,26 +2,26 @@
2
2
title: The Microsoft cloud security benchmark in Microsoft Defender for Cloud
3
3
description: Learn about the Microsoft cloud security benchmark in Microsoft Defender for Cloud.
4
4
ms.topic: conceptual
5
-
ms.date: 01/10/2023
5
+
ms.date: 03/13/2024
6
6
---
7
7
8
8
# Microsoft cloud security benchmark in Defender for Cloud
9
9
10
-
Industry standards, regulatory standards, and benchmarks are represented in Microsoft Defender for Cloud as [security standards](security-policy-concept.md), and are assigned to scopes such as Azure subscriptions, AWS accounts, and GCP projects.
10
+
Industry standards, regulatory standards, and benchmarks are represented in Microsoft Defender for Cloud as [security standards](security-policy-concept.md). These standards are assigned to scopes such as Azure subscriptions, AWS accounts, and GCP projects.
11
11
12
12
Defender for Cloud continuously assesses your hybrid cloud environment against these standards, and provides information about compliance in the **Regulatory compliance** dashboard.
13
13
14
14
When you onboard subscriptions and accounts to Defender for Cloud, the [Microsoft cloud security benchmark](/security/benchmark/azure/introduction) (MCSB) automatically starts to assess resources in scope.
15
15
16
16
This benchmark builds on the cloud security principles defined by the Azure Security Benchmark and applies these principles with detailed technical implementation guidance for Azure, for other cloud providers (such as AWS and GCP), and for other Microsoft clouds.
17
17
18
-
:::image type="content" source="media/concept-regulatory-compliance/microsoft-security-benchmark.png" alt-text="Image that shows the components that make up the Microsoft cloud security benchmark.":::
18
+
:::image type="content" source="media/concept-regulatory-compliance/microsoft-security-benchmark.png" alt-text="Image that shows the components that make up the Microsoft cloud security benchmark." lightbox="media/concept-regulatory-compliance/microsoft-security-benchmark.png":::
19
19
20
20
The compliance dashboard gives you a view of your overall compliance standing. Security for non-Azure platforms follows the same cloud-neutral security principles as Azure. Each control within the benchmark provides the same granularity and scope of technical guidance across Azure and other cloud resources.
21
21
22
22
:::image type="content" source="media/concept-regulatory-compliance/compliance-dashboard.png" alt-text="Screenshot of a sample regulatory compliance page in Defender for Cloud." lightbox="media/concept-regulatory-compliance/compliance-dashboard.png":::
23
23
24
-
From the compliance dashboard, you're able to manage all of your compliance requirements for your cloud deployments, including automatic, manual and shared responsibilities.
24
+
From the compliance dashboard, you're able to manage all of your compliance requirements for your cloud deployments, including automatic, manual, and shared responsibilities.
25
25
26
26
> [!NOTE]
27
27
> Shared responsibilities is only compatible with Azure.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/remediate-vulnerability-findings-vm.md
+9-7Lines changed: 9 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,15 +4,15 @@ description: Microsoft Defender for Cloud includes a fully integrated vulnerabil
4
4
ms.topic: how-to
5
5
author: dcurwin
6
6
ms.author: dacurwin
7
-
ms.date: 11/09/2021
7
+
ms.date: 03/13/2024
8
8
---
9
9
10
10
# View and remediate findings from vulnerability assessment solutions on your VMs
11
11
12
12
> [!CAUTION]
13
13
> This article references CentOS, a Linux distribution that is nearing End Of Life (EOL) status. Please consider your use and planning accordingly.
14
14
15
-
When your vulnerability assessment tool reports vulnerabilities to Defender for Cloud, Defender for Cloud presents the findings and related information as recommendations. In addition, the findings include related information such as remediation steps, relevant CVEs, CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific VM.
15
+
When your vulnerability assessment tool reports vulnerabilities to Defender for Cloud, Defender for Cloud presents the findings and related information as recommendations. In addition, the findings include related information such as remediation steps, relevant common vulnerabilities and exposures (CVEs), CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific VM.
16
16
17
17
## View findings from the scans of your virtual machines
18
18
@@ -38,7 +38,7 @@ To view vulnerability assessment findings (from all of your configured scanners)
38
38
39
39
- Links to all relevant CVEs (where available)
40
40
- Remediation steps
41
-
- Any additional reference pages
41
+
- Any more reference pages
42
42
43
43
1. To remediate a finding, follow the remediation steps from this details pane.
44
44
@@ -48,9 +48,9 @@ If you have an organizational need to ignore a finding, rather than remediate it
48
48
49
49
When a finding matches the criteria you defined in your disable rules, it doesn't appear in the list of findings. Typical scenarios include:
50
50
51
-
- Disable findings with severity below medium
51
+
- Disable findings with severity less than medium
52
52
- Disable findings that are non-patchable
53
-
- Disable findings with CVSS score below 6.5
53
+
- Disable findings with CVSS score less than 6.5
54
54
- Disable findings with specific text in the security check or category (for example, “RedHat”, “CentOS Security Update for sudo”)
55
55
56
56
> [!IMPORTANT]
@@ -72,15 +72,17 @@ To create a rule:
72
72
73
73
1. Select **Apply rule**.
74
74
75
-
:::image type="content" source="./media/remediate-vulnerability-findings-vm/new-disable-rule-for-finding.png" alt-text="Create a disable rule for VA findings on VM.":::
75
+
:::image type="content" source="./media/remediate-vulnerability-findings-vm/new-disable-rule-for-finding.png" alt-text="Create a disable rule for VA findings on VM." lightbox="media/remediate-vulnerability-findings-vm/new-disable-rule-for-finding.png":::
76
76
77
77
> [!IMPORTANT]
78
78
> Changes might take up to 24 hours to take effect.
79
79
80
80
1. To view, override, or delete a rule:
81
81
1. Select **Disable rule**.
82
82
1. From the scope list, subscriptions with active rules show as **Rule applied**.
83
-
:::image type="content" source="./media/remediate-vulnerability-findings-vm/modify-rule.png" alt-text="Modify or delete an existing rule.":::
83
+
84
+
:::image type="content" source="./media/remediate-vulnerability-findings-vm/modify-rule.png" alt-text="Modify or delete an existing rule." lightbox="media/remediate-vulnerability-findings-vm/modify-rule.png":::
85
+
84
86
1. To view or delete the rule, select the ellipsis menu ("...").
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/secure-score-access-and-track.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Tracking your secure score
3
3
description: Learn about the multiple ways to access and track your secure score in Microsoft Defender for Cloud.
4
4
ms.topic: how-to
5
-
ms.date: 01/09/2023
5
+
ms.date: 03/13/2024
6
6
---
7
7
8
8
# Track secure score
@@ -14,7 +14,7 @@ You can find your overall secure score, and your score per subscription, through
14
14
15
15
## Get your secure score from the portal
16
16
17
-
Defender for Cloud displays your score prominently in the portal. When you select the Secure score tile on the overview page, you're taken to the dedicated secure score page, where you'll see the score broken down by subscription. Select a single subscription to see the detailed list of prioritized recommendations and the potential effect that remediating them will have on the subscription's score.
17
+
Defender for Cloud displays your score prominently in the portal. When you select the secure score tile on the overview page, you're taken to the dedicated secure score page, where you'll see the score broken down by subscription. Select a single subscription to see the detailed list of prioritized recommendations and the potential effect that remediating them will have on the subscription's score.
18
18
19
19
Your secure score is shown in the following locations in Defender for Cloud's portal pages.
20
20
@@ -24,16 +24,16 @@ Your secure score is shown in the following locations in Defender for Cloud's po
24
24
25
25
- In the dedicated **Secure score** page you can see the secure score for your subscription and your management groups:
26
26
27
-
:::image type="content" source="./media/secure-score-security-controls/score-on-dedicated-dashboard.png" alt-text="The secure score for subscriptions on Defender for Cloud's secure score page":::
27
+
:::image type="content" source="./media/secure-score-security-controls/score-on-dedicated-dashboard.png" alt-text="The secure score for subscriptions on Defender for Cloud's secure score page" lightbox="media/secure-score-security-controls/score-on-dedicated-dashboard.png":::
28
28
29
-
:::image type="content" source="./media/secure-score-security-controls/secure-score-management-groups.png" alt-text="The secure score for management groups on Defender for Cloud's secure score page":::
29
+
:::image type="content" source="./media/secure-score-security-controls/secure-score-management-groups.png" alt-text="The secure score for management groups on Defender for Cloud's secure score page" lightbox="media/secure-score-security-controls/secure-score-management-groups.png":::
30
30
31
31
> [!NOTE]
32
32
> Any management groups for which you don't have sufficient permissions, will show their score as “Restricted.”
33
33
34
34
- At the top of the **Recommendations** page:
35
35
36
-
:::image type="content" source="./media/secure-score-security-controls/score-on-recommendations-page.png" alt-text="The secure score on Defender for Cloud's recommendations page":::
36
+
:::image type="content" source="./media/secure-score-security-controls/score-on-recommendations-page.png" alt-text="The secure score on Defender for Cloud's recommendations page" lightbox="media/secure-score-security-controls/score-on-recommendations-page.png":::
37
37
38
38
## Get your secure score from the REST API
39
39
@@ -51,7 +51,7 @@ To access the secure score for multiple subscriptions with Azure Resource Graph:
51
51
52
52
1. From the Azure portal, open **Azure Resource Graph Explorer**.
0 commit comments