You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/review-security-recommendations.md
+10-11Lines changed: 10 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,34 +87,34 @@ You can perform many actions to interact with recommendations. If an option isn'
87
87
- Select **View policy definition** to view the Azure Policy entry for the underlying recommendation (if relevant).
88
88
89
89
1. In **Findings**, you can review affiliated findings by severity.
90
-
90
+
91
91
:::image type="content" source="media/review-security-recommendations/recommendation-findings.png" alt-text="Screenshot of the findings tab in a recommendation that shows all of the attack paths for that recommendation." lightbox="media/review-security-recommendations/recommendation-findings.png":::
92
92
93
93
1. In **Take action**:
94
94
-**Remediate**: A description of the manual steps required to remediate the security issue on the affected resources. For recommendations with the **Fix** option, you can select **View remediation logic** before applying the suggested fix to your resources.
95
-
96
-
-**Assign owner and due date**: If you have a [governance rule](governance-rules.md) turned on for the recommendation, you can assign an owner and due date.
97
-
95
+
96
+
-**Assign owner and due date**: If you have a [governance rule](governance-rules.md) turned on for the recommendation, you can assign an owner and due date.
97
+
98
98
-**Exempt**: You can exempt resources from the recommendation, or disable specific findings using disable rules.
99
-
99
+
100
100
-**Workflow automation**: Set a logic app to trigger with this recommendation.
101
-
102
-
:::image type="content" source="media/review-security-recommendations/recommendation-take-action.png" alt-text="Screenshot that shows what you can see in the recommendation when you select the take action tab." lightbox="media/review-security-recommendations/recommendation-take-action.png":::
103
-
101
+
102
+
:::image type="content" source="media/review-security-recommendations/recommendation-take-action.png" alt-text="Screenshot that shows what you can see in the recommendation when you select the take action tab." lightbox="media/review-security-recommendations/recommendation-take-action.png":::
103
+
104
104
1. In **Graph**, you can view and investigate all context that is used for risk prioritization, including [attack paths](how-to-manage-attack-path.md). You can select a node in an attack path to view the details of the selected node.
105
105
106
106
:::image type="content" source="media/review-security-recommendations/recommendation-graph.png" alt-text="Screenshot of the graph tab in a recommendation that shows all of the attack paths for that recommendation." lightbox="media/review-security-recommendations/recommendation-graph.png":::
107
107
108
108
## How are recommendations classified?
109
109
110
110
Every security recommendation from Defender for Cloud is assigned one of three severity ratings:
111
-
111
+
112
112
-**High severity**: These recommendations should be addressed immediately, as they indicate a critical security vulnerability that could be exploited by an attacker to gain unauthorized access to your systems or data. Examples of high severity recommendations are when we’ve discovered unprotected secrets on a machine, overly-permissive inbound NSG rules, clusters allowing images to be deployed from untrusted registries, and unrestricted public access to storage accounts or databases.
113
113
114
114
-**Medium severity**: These recommendations indicate a potential security risk that should be addressed in a timely manner, but may not require immediate attention. Examples of medium severity recommendations might include containers sharing sensitive host namespaces, web apps not using managed identities, Linux machines not requiring SSH keys during authentication, and unused credentials being left in the system after 90 days of inactivity.
115
115
116
116
-**Low severity**: These recommendations indicate a relatively minor security issue that can be addressed at your convenience. Examples of low severity recommendations might include the need to disable local authentication in favor of Microsoft Entra ID, health issues with your endpoint protection solution, best practices not being followed with network security groups, or misconfigured logging settings that could make it harder to detect and respond to security incidents.
117
-
117
+
118
118
Of course, the internal views of an organization might differ with Microsoft’s classification of a specific recommendation. So, it's always a good idea to review each recommendation carefully and consider its potential impact on your security posture before deciding how to address it.
119
119
120
120
## Manage recommendations assigned to you
@@ -192,4 +192,3 @@ When you open the underlying query, and run it, Azure Resource Graph Explorer re
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/secure-score-access-and-track.md
+5-7Lines changed: 5 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ You can find your overall secure score, and your score per subscription, through
14
14
15
15
## Get your secure score from the portal
16
16
17
-
Defender for Cloud displays your score prominently in the portal. When you select the Secure score tile on the overview page, you're taken to the dedicated secure score page, where you'll see the score broken down by subscription. Select a single subscription to see the detailed list of prioritized recommendations and the potential effect that remediating them will have on the subscription's score.
17
+
Defender for Cloud displays your score prominently in the portal. When you select the Secure score tile on the overview page, you're taken to the dedicated secure score page, where you'll see the score broken down by subscription. Select a single subscription to see the detailed list of prioritized recommendations and the potential effect that remediating them will have on the subscription's score.
18
18
19
19
Your secure score is shown in the following locations in Defender for Cloud's portal pages.
20
20
@@ -29,7 +29,7 @@ Your secure score is shown in the following locations in Defender for Cloud's po
29
29
:::image type="content" source="./media/secure-score-security-controls/secure-score-management-groups.png" alt-text="The secure score for management groups on Defender for Cloud's secure score page":::
30
30
31
31
> [!NOTE]
32
-
> Any management groups for which you don't have sufficient permissions, will show their score as “Restricted.”
32
+
> Any management groups for which you don't have sufficient permissions, will show their score as “Restricted.”
33
33
34
34
- At the top of the **Recommendations** page:
35
35
@@ -41,7 +41,7 @@ You can access your score via the secure score API. The API methods provide the
41
41
42
42

43
43
44
-
For examples of tools built on top of the secure score API, see [the secure score area of our GitHub community](https://github.com/Azure/Azure-Security-Center/tree/master/Secure%20Score).
44
+
For examples of tools built on top of the secure score API, see [the secure score area of our GitHub community](https://github.com/Azure/Azure-Security-Center/tree/master/Secure%20Score).
45
45
46
46
## Get your secure score from Azure Resource Graph
47
47
@@ -55,7 +55,7 @@ To access the secure score for multiple subscriptions with Azure Resource Graph:
55
55
56
56
1. Enter your Kusto query (using the following examples for guidance).
57
57
58
-
- This query returns the subscription ID, the current score in points and as a percentage, and the maximum score for the subscription.
58
+
- This query returns the subscription ID, the current score in points and as a percentage, and the maximum score for the subscription.
59
59
60
60
```kusto
61
61
SecurityResources
@@ -64,7 +64,7 @@ To access the secure score for multiple subscriptions with Azure Resource Graph:
- This query returns the status of all the security controls. For each control, you'll get the number of unhealthy resources, the current score, and the maximum score.
67
+
- This query returns the status of all the security controls. For each control, you'll get the number of unhealthy resources, the current score, and the maximum score.
68
68
69
69
```kusto
70
70
SecurityResources
@@ -75,7 +75,6 @@ To access the secure score for multiple subscriptions with Azure Resource Graph:
75
75
76
76
1. Select **Run query**.
77
77
78
-
79
78
## Tracking your secure score over time
80
79
81
80
### Secure Score Over Time report in workbooks page
@@ -99,7 +98,6 @@ The dashboard contains the following two reports to help you analyze your securi
99
98
100
99
:::image type="content" source="./media/secure-score-security-controls/power-bi-secure-score-dashboard.png" alt-text="The optional Secure Score Over Time Power BI dashboard for tracking your secure score over time and investigating changes.":::
101
100
102
-
103
101
## Next steps
104
102
105
103
This article described how to access and track your secure score. For related material, see the following articles:
0 commit comments