Skip to content

Commit 2831f07

Browse files
authored
Merge pull request #224625 from TerryLanfear/sec-threat
freshness update
2 parents 66bb17e + ba09dc8 commit 2831f07

File tree

1 file changed

+15
-53
lines changed

1 file changed

+15
-53
lines changed

articles/security/fundamentals/threat-detection.md

Lines changed: 15 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,14 @@ services: security
55
documentationcenter: na
66
author: TerryLanfear
77
manager: rkarlin
8-
editor: TomSh
98

109
ms.assetid:
11-
ms.service: information-protection
12-
ms.subservice: aiplabels
10+
ms.service: security
11+
ms.subservice: security-fundamentals
1312
ms.topic: article
1413
ms.tgt_pltfrm: na
1514
ms.workload: na
16-
ms.date: 02/03/2021
15+
ms.date: 01/20/2023
1716
ms.author: terrylan
1817

1918
---
@@ -26,7 +25,7 @@ Azure provides a wide array of options to configure and customize security to me
2625

2726
## Azure Active Directory Identity Protection
2827

29-
[Azure AD Identity Protection](../../active-directory/identity-protection/overview-identity-protection.md) is an [Azure Active Directory Premium P2](../../active-directory/fundamentals/active-directory-whatis.md) edition feature that provides an overview of the risk detections and potential vulnerabilities that can affect your organization’s identities. Identity Protection uses existing Azure AD anomaly-detection capabilities that are available through [Azure AD Anomalous Activity Reports](../../active-directory/reports-monitoring/overview-reports.md), and introduces new risk detection types that can detect real time anomalies.
28+
[Azure AD Identity Protection](../../active-directory/identity-protection/overview-identity-protection.md) is an [Azure Active Directory Premium P2](../../active-directory/fundamentals/active-directory-whatis.md#what-are-the-azure-ad-licenses) edition feature that provides an overview of the risk detections and potential vulnerabilities that can affect your organization’s identities. Identity Protection uses existing Azure AD anomaly-detection capabilities that are available through [Azure AD Anomalous Activity Reports](../../active-directory/reports-monitoring/overview-reports.md), and introduces new risk detection types that can detect real time anomalies.
3029

3130
![Azure AD Identity Protection diagram](./media/threat-detection/azure-threat-detection-fig1.png)
3231

@@ -70,13 +69,11 @@ PIM helps you:
7069

7170
## Azure Monitor logs
7271

73-
[Azure Monitor logs](../../azure-monitor/index.yml) is a Microsoft cloud-based IT management solution that helps you manage and protect your on-premises and cloud infrastructure. Because Azure Monitor logs is implemented as a cloud-based service, you can have it up and running quickly with minimal investment in infrastructure services. New security features are delivered automatically, saving ongoing maintenance and upgrade costs.
74-
75-
In addition to providing valuable services on its own, Azure Monitor logs can integrate with System Center components, such as [System Center Operations Manager](/archive/blogs/cbernier/monitoring-windows-azure-with-system-center-operations-manager-2012-get-me-started), to extend your existing security management investments into the cloud. System Center and Azure Monitor logs can work together to provide a full hybrid management experience.
72+
[Azure Monitor logs](../../azure-monitor/logs/data-platform-logs.md) is a Microsoft cloud-based IT management solution that helps you manage and protect your on-premises and cloud infrastructure. Because Azure Monitor logs is implemented as a cloud-based service, you can have it up and running quickly with minimal investment in infrastructure services. New security features are delivered automatically, saving ongoing maintenance and upgrade costs.
7673

7774
### Holistic security and compliance posture
7875

79-
[Microsoft Defender for Cloud](../../security-center/security-center-introduction.md) provides a comprehensive view into your organizations IT security posture, with built-in search queries for notable issues that require your attention. It provides high-level insight into the security state of your computers. You can also view all events from the past 24 hours, 7 days, or any other custom time-frame.
76+
[Microsoft Defender for Cloud](../../defender-for-cloud/defender-for-cloud-introduction.md) provides a comprehensive view into your organization's IT security posture, with built-in search queries for notable issues that require your attention. It provides high-level insight into the security state of your computers. You can also view all events from the past 24 hours, 7 days, or any other custom time-frame.
8077

8178
Azure Monitor logs help you quickly and easily understand the overall security posture of any environment, all within the context of IT Operations, including software update assessment, antimalware assessment, and configuration baselines. Security log data is readily accessible to streamline the security and compliance audit processes.
8279

@@ -108,7 +105,7 @@ You can create and manage DSC resources that are hosted in Azure and apply them
108105

109106
## Microsoft Defender for Cloud
110107

111-
Microsoft Defender for Cloud helps protect your hybrid cloud environment. By performing continuous security assessments of your connected resources, it's able to provide detailed security recommendations for the discovered vulnerabilities.
108+
[Microsoft Defender for Cloud](../../defender-for-cloud/defender-for-cloud-introduction.md) helps protect your hybrid cloud environment. By performing continuous security assessments of your connected resources, it's able to provide detailed security recommendations for the discovered vulnerabilities.
112109

113110
Defender for Cloud's recommendations are based on the [Microsoft cloud security benchmark](/security/benchmark/azure/introduction) - the Microsoft-authored, Azure-specific set of guidelines for security and compliance best practices based on common compliance frameworks. This widely respected benchmark builds on the controls from the [Center for Internet Security (CIS)](https://www.cisecurity.org/benchmark/azure/) and the [National Institute of Standards and Technology (NIST)](https://www.nist.gov/) with a focus on cloud centric security.
114111

@@ -194,6 +191,10 @@ Microsoft Defender for Cloud operates with security research and data science te
194191

195192
These combined efforts culminate in new and improved detections, which you can benefit from instantly. There’s no action for you to take.
196193

194+
### Microsoft Defender for Storage
195+
196+
[Microsoft Defender for Storage](../../storage/common/azure-defender-storage-configure.md) is an Azure-native layer of security intelligence that detects unusual and potentially harmful attempts to access or exploit your storage accounts. It uses advanced threat detection capabilities and [Microsoft Threat Intelligence](https://go.microsoft.com/fwlink/?linkid=2128684) data to provide contextual security alerts. Those alerts also include steps to mitigate the detected threats and prevent future attacks.
197+
197198
## Threat protection features: Other Azure services
198199

199200
### Virtual machines: Microsoft antimalware
@@ -250,7 +251,7 @@ SQL Database threat detectors use one of the following detection methodologies:
250251

251252
### Application Gateway Web Application Firewall
252253

253-
[Web Application Firewall (WAF)](../../app-service/environment/integrate-with-application-gateway.md) is a feature of [Azure Application Gateway](../../web-application-firewall/ag/ag-overview.md) that provides protection to web applications that use an application gateway for standard [application delivery control](https://kemptechnologies.com/in/application-delivery-controllers) functions. Web Application Firewall does this by protecting them against most of the [Open Web Application Security Project (OWASP) top 10 common web vulnerabilities](https://owasp.org/www-project-top-ten/).
254+
[Web application firewall (WAF)](../../web-application-firewall/ag/ag-overview.md) is a feature of [Application Gateway](../../application-gateway/overview.md) that provides protection to web applications that use an application gateway for standard [application delivery control](https://kemptechnologies.com/in/application-delivery-controllers) functions. Web Application Firewall does this by protecting them against most of the [Open Web Application Security Project (OWASP) top 10 common web vulnerabilities](https://owasp.org/www-project-top-ten/).
254255

255256
![Application Gateway Web Application Firewall diagram](./media/threat-detection/azure-threat-detection-fig13.png)
256257

@@ -280,42 +281,6 @@ Configuring WAF at your application gateway provides the following benefits:
280281

281282
- Helps meet compliance requirements. Certain compliance controls require all internet-facing endpoints to be protected by a WAF solution.
282283

283-
### Anomaly Detection API: Built with Azure Machine Learning
284-
285-
The Anomaly Detection API is an API that's useful for detecting a variety of anomalous patterns in your time series data. The API assigns an anomaly score to each data point in the time series, which can be used for generating alerts, monitoring through dashboards, or connecting with your ticketing systems.
286-
287-
The [Anomaly Detection API](/azure/architecture/data-science-process/apps-anomaly-detection-api) can detect the following types of anomalies on time series data:
288-
289-
- **Spikes and dips**: When you're monitoring the number of login failures to a service or number of checkouts in an e-commerce site, unusual spikes or dips could indicate security attacks or service disruptions.
290-
291-
- **Positive and negative trends**: When you're monitoring memory usage in computing, shrinking free memory size indicates a potential memory leak. For service queue length monitoring, a persistent upward trend might indicate an underlying software issue.
292-
293-
- **Level changes and changes in dynamic range of values**: Level changes in latencies of a service after a service upgrade or lower levels of exceptions after upgrade can be interesting to monitor.
294-
295-
The machine learning-based API enables:
296-
297-
- **Flexible and robust detection**: The anomaly detection models allow users to configure sensitivity settings and detect anomalies among seasonal and non-seasonal data sets. Users can adjust the anomaly detection model to make the detection API less or more sensitive according to their needs. This would mean detecting the less or more visible anomalies in data with and without seasonal patterns.
298-
299-
- **Scalable and timely detection**: The traditional way of monitoring with present thresholds set by experts' domain knowledge are costly and not scalable to millions of dynamically changing data sets. The anomaly detection models in this API are learned, and models are tuned automatically from both historical and real-time data.
300-
301-
- **Proactive and actionable detection**: Slow trend and level change detection can be applied for early anomaly detection. The early abnormal signals that are detected can be used to direct humans to investigate and act on the problem areas. In addition, root cause analysis models and alerting tools can be developed on top of this anomaly-detection API service.
302-
303-
The anomaly-detection API is an effective and efficient solution for a wide range of scenarios, such as service health and KPI monitoring, IoT, performance monitoring, and network traffic monitoring. Here are some popular scenarios where this API can be useful:
304-
305-
- IT departments need tools to track events, error code, usage log, and performance (CPU, memory, and so on) in a timely manner.
306-
307-
- Online commerce sites want to track customer activities, page views, clicks, and so on.
308-
309-
- Utility companies want to track consumption of water, gas, electricity, and other resources.
310-
311-
- Facility or building management services want to monitor temperature, moisture, traffic, and so on.
312-
313-
- IoT/manufacturers want to use sensor data in time series to monitor work flow, quality, and so on.
314-
315-
- Service providers, such as call centers, need to monitor service demand trend, incident volume, wait queue length, and so on.
316-
317-
- Business analytics groups want to monitor business KPIs' (such as sales volume, customer sentiments, or pricing) abnormal movement in real time.
318-
319284
### Defender for Cloud Apps
320285

321286
[Defender for Cloud Apps](/cloud-app-security/what-is-cloud-app-security) is a critical component of the Microsoft Cloud Security stack. It's a comprehensive solution that can help your organization as you move to take full advantage of the promise of cloud applications. It keeps you in control, through improved visibility into activity. It also helps increase the protection of critical data across cloud applications.
@@ -330,7 +295,6 @@ With tools that help uncover shadow IT, assess risk, enforce policies, investiga
330295
| Protect | Use Defender for Cloud Apps to sanction or prohibit applications, enforce data loss prevention, control permissions and sharing, and generate custom reports and alerts. |
331296
| Control | Mitigate risk by setting policies and alerts to achieve maximum control over network cloud traffic. Use Defender for Cloud Apps to migrate your users to safe, sanctioned cloud app alternatives. |
332297

333-
334298
![Defender for Cloud Apps diagram](./media/threat-detection/azure-threat-detection-fig14.png)
335299

336300
Defender for Cloud Apps integrates visibility with your cloud by:
@@ -361,10 +325,8 @@ Web Application Firewall provides the following benefits:
361325

362326
- Accelerates the delivery of web application contents, using capabilities such as caching, compression, and other traffic optimizations.
363327

364-
For examples of web application firewalls that are available in the Azure Marketplace, see [Barracuda WAF, Brocade virtual web application firewall (vWAF), Imperva SecureSphere, and the ThreatSTOP IP firewall](https://azuremarketplace.microsoft.com/marketplace/apps/barracudanetworks.waf).
365-
366-
## Next steps
328+
For examples of web application firewalls that are available in the Azure Marketplace, see [Barracuda WAF, Brocade virtual web application firewall (vWAF), Imperva SecureSphere, and the ThreatSTOP IP firewall](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/category/networking?page=1).
367329

368-
- [Responding to today’s threats](../../security-center/security-center-managing-and-responding-alerts.md): Helps identify active threats that target your Azure resources and provides the insights you need to respond quickly.
330+
## Next step
369331

370-
- [Azure SQL Database Threat Detection](https://azure.microsoft.com/blog/azure-sql-database-threat-detection-your-built-in-security-expert/): Helps address your concerns about potential threats to your databases.
332+
- [Responding to today's threats](../../defender-for-cloud/managing-and-responding-alerts.md): Helps identify active threats that target your Azure resources and provides the insights you need to respond quickly.

0 commit comments

Comments
 (0)