Skip to content

Commit 2d6e449

Browse files
Merge pull request #269428 from memildin/patch-114
Removed out-of-date dupe content
2 parents 3764071 + ab1602f commit 2d6e449

File tree

1 file changed

+0
-45
lines changed

1 file changed

+0
-45
lines changed

articles/defender-for-cloud/upcoming-changes.md

Lines changed: 0 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -34,15 +34,12 @@ If you're looking for the latest release notes, you can find them in the [What's
3434
| [Change in pricing for multicloud container threat detection](#change-in-pricing-for-multicloud-container-threat-detection) | January 30, 2024 | April 2024 |
3535
| [Enforcement of Defender CSPM for Premium DevOps Security Capabilities](#enforcement-of-defender-cspm-for-premium-devops-security-value) | January 29, 2024 | March 2024 |
3636
| [Update to agentless VM scanning built-in Azure role](#update-to-agentless-vm-scanning-built-in-azure-role) |January 14, 2024 | February 2024 |
37-
| [Deprecation of two recommendations related to PCI](#deprecation-of-two-recommendations-related-to-pci) |January 14, 2024 | February 2024 |
3837
| [Defender for Servers built-in vulnerability assessment (Qualys) retirement path](#defender-for-servers-built-in-vulnerability-assessment-qualys-retirement-path) | January 9, 2024 | May 2024 |
39-
| [New version of Defender Agent for Defender for Containers](#new-version-of-defender-agent-for-defender-for-containers) | January 4, 2024 | February 2024 |
4038
| [Upcoming change for the Defender for Cloud’s multicloud network requirements](#upcoming-change-for-the-defender-for-clouds-multicloud-network-requirements) | January 3, 2024 | May 2024 |
4139
| [Deprecation of two DevOps security recommendations](#deprecation-of-two-devops-security-recommendations) | November 30, 2023 | January 2024 |
4240
| [Consolidation of Defender for Cloud's Service Level 2 names](#consolidation-of-defender-for-clouds-service-level-2-names) | November 1, 2023 | December 2023 |
4341
| [Changes to how Microsoft Defender for Cloud's costs are presented in Microsoft Cost Management](#changes-to-how-microsoft-defender-for-clouds-costs-are-presented-in-microsoft-cost-management) | October 25, 2023 | November 2023 |
4442
| [Replacing the "Key Vaults should have purge protection enabled" recommendation with combined recommendation "Key Vaults should have deletion protection enabled"](#replacing-the-key-vaults-should-have-purge-protection-enabled-recommendation-with-combined-recommendation-key-vaults-should-have-deletion-protection-enabled) | | June 2023|
45-
| [Preview alerts for DNS servers to be deprecated](#preview-alerts-for-dns-servers-to-be-deprecated) | | August 2023 |
4643
| [Change to the Log Analytics daily cap](#change-to-the-log-analytics-daily-cap) | | September 2023 |
4744
| [DevOps Resource Deduplication for Defender for DevOps](#devops-resource-deduplication-for-defender-for-devops) | | November 2023 |
4845
| [Deprecating two security incidents](#deprecating-two-security-incidents) | | November 2023 |
@@ -191,17 +188,6 @@ For more information on the code to cloud security capabilities in Defender CSPM
191188

192189
In Azure, agentless scanning for VMs uses a built-in role (called [VM scanner operator](faq-permissions.yml)) with the minimum necessary permissions required to scan and assess your VMs for security issues. To continuously provide relevant scan health and configuration recommendations for VMs with encrypted volumes, an update to this role's permissions is planned. The update includes the addition of the ```Microsoft.Compute/DiskEncryptionSets/read``` permission. This permission solely enables improved identification of encrypted disk usage in VMs. It doesn't provide Defender for Cloud any more capabilities to decrypt or access the content of these encrypted volumes beyond the encryption methods [already supported](concept-agentless-data-collection.md#availability) prior to this change. This change is expected to take place during February 2024 and no action is required on your end.
193190

194-
## Deprecation of two recommendations related to PCI
195-
196-
**Announcement date: January 14, 2024**
197-
198-
**Estimated date for change: February 2024**
199-
200-
The following two recommendations related to PCI (Permission Creep Index) are set for deprecation:
201-
202-
- `Over-provisioned identities in accounts should be investigated to reduce the Permission Creep Index (PCI)`
203-
- `Over-Provisioned identities in subscriptions should be investigated to reduce the Permission Creep Index (PCI)`
204-
205191
## Defender for Servers built-in vulnerability assessment (Qualys) retirement path
206192

207193
**Announcement date: January 9, 2024**
@@ -214,14 +200,6 @@ For more information about our decision to unify our vulnerability assessment of
214200

215201
You can also check out the [common questions about the transition to Microsoft Defender Vulnerability Management solution](faq-scanner-detection.yml).
216202

217-
## New version of Defender Agent for Defender for Containers
218-
219-
**Announcement date: January 4, 2024**
220-
221-
**Estimated date for change: February 2024**
222-
223-
A new version of the [Defender Agent for Defender for Containers](tutorial-enable-containers-azure.md#deploy-the-defender-agent-in-azure) will be released in February 2024. It includes performance and security improvements, support for both AMD64 and ARM64 arch nodes (Linux only), and uses [Inspektor Gadget](https://www.inspektor-gadget.io/) as the process collection agent instead of Sysdig. The new version is only supported on Linux kernel versions 5.4 and higher, so if you have older versions of the Linux kernel, you'll need to upgrade. For more information, see [Supported host operating systems](support-matrix-defender-for-containers.md#supported-host-operating-systems).
224-
225203
## Upcoming change for the Defender for Cloud’s multicloud network requirements
226204

227205
**Announcement date: January 3, 2024**
@@ -338,29 +316,6 @@ The `Key Vaults should have purge protection enabled` recommendation is deprecat
338316

339317
See the [full index of Azure Policy built-in policy definitions for Key Vault](../key-vault/policy-reference.md).
340318

341-
## Preview alerts for DNS servers to be deprecated
342-
343-
**Estimated date for change: August 2023**
344-
345-
Following quality improvement process, security alerts for DNS servers are set to be deprecated in August. For cloud resources, use [Azure DNS](defender-for-dns-introduction.md) to receive the same security value.
346-
347-
The following table lists the alerts to be deprecated:
348-
349-
| AlertDisplayName | AlertType |
350-
|--|--|
351-
| Communication with suspicious random domain name (Preview) | DNS_RandomizedDomain |
352-
| Communication with suspicious domain identified by threat intelligence (Preview) | DNS_ThreatIntelSuspectDomain |
353-
| Digital currency mining activity (Preview) | DNS_CurrencyMining |
354-
| Network intrusion detection signature activation (Preview) | DNS_SuspiciousDomain |
355-
| Attempted communication with suspicious sinkholed domain (Preview) | DNS_SinkholedDomain |
356-
| Communication with possible phishing domain (Preview) | DNS_PhishingDomain|
357-
| Possible data transfer via DNS tunnel (Preview) | DNS_DataObfuscation |
358-
| Possible data exfiltration via DNS tunnel (Preview) | DNS_DataExfiltration |
359-
| Communication with suspicious algorithmically generated domain (Preview) | DNS_DomainGenerationAlgorithm |
360-
| Possible data download via DNS tunnel (Preview) | DNS_DataInfiltration |
361-
| Anonymity network activity (Preview) | DNS_DarkWeb |
362-
| Anonymity network activity using web proxy (Preview) | DNS_DarkWebProxy |
363-
364319
## Change to the Log Analytics daily cap
365320

366321
Azure monitor offers the capability to [set a daily cap](../azure-monitor/logs/daily-cap.md) on the data that is ingested on your Log analytics workspaces. However, Defenders for Cloud security events are currently not supported in those exclusions.

0 commit comments

Comments
 (0)