Skip to content

Commit 2ff57af

Browse files
authored
Merge pull request #223479 from AlizaBernstein/WI-58488-Freshness-check-5
WI-58488 freshness check 5
2 parents e71920a + bf6f919 commit 2ff57af

File tree

8 files changed

+30
-27
lines changed

8 files changed

+30
-27
lines changed

articles/defender-for-cloud/concept-easm.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ Defender EASM applies Microsoft’s crawling technology to discover assets that
2222

2323
EASM collects data for publicly exposed assets (“outside-in”). That data can be used by MDC CSPM (“inside-out”) to assist with internet-exposure validation and discovery capabilities to provide better visibility to customers.
2424

25+
2526
## Learn more
2627

2728
You can learn more about [Defender EASM](../external-attack-surface-management/index.md), and learn about the [pricing](https://azure.microsoft.com/pricing/details/defender-external-attack-surface-management/) options available.

articles/defender-for-cloud/concept-regulatory-compliance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about the Microsoft cloud security benchmark and the benefits
44
titleSuffix: Microsoft cloud security benchmark
55
ms.topic: conceptual
66
ms.custom: ignite-2022
7-
ms.date: 09/21/2022
7+
ms.date: 01/10/2023
88
---
99

1010
# Microsoft cloud security benchmark in Defender for Cloud
112 KB
Loading
12 KB
Loading
105 KB
Loading

articles/defender-for-cloud/overview-page.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Microsoft Defender for Cloud's main dashboard or 'overview' page
33
description: Learn about the features of the Defender for Cloud overview page
4-
ms.date: 09/20/2022
5-
ms.topic: overview
4+
ms.date: 01/10/2023
5+
ms.topic: conceptual
66
ms.custom: ignite-2022
77
---
88

@@ -12,26 +12,26 @@ Microsoft Defender for Cloud's overview page is an interactive dashboard that pr
1212

1313
You can select any element on the page to get more detailed information.
1414

15-
:::image type="content" source="./media/overview-page/overview.png" alt-text="Screenshot of Defender for Cloud's overview page." lightbox="./media/overview-page/overview.png":::
15+
:::image type="content" source="./media/overview-page/overview-01-2023.png" alt-text="Screenshot of Defender for Cloud's overview page." lightbox="./media/overview-page/overview-01-2023.png":::
1616

1717
## Features of the overview page
1818

19-
:::image type="content" source="./media/overview-page/top-bar-of-overview.png" alt-text="Screenshot of Defender for Cloud's overview page's top bar." lightbox="media/overview-page/overview.png":::
19+
:::image type="content" source="./media/overview-page/top-bar-of-overview-new.png" alt-text="Screenshot of Defender for Cloud's overview page's top bar." lightbox="media/overview-page/top-bar-of-overview-new.png":::
2020

2121
### Metrics
2222

2323
The **top menu bar** offers:
2424

2525
- **Subscriptions** - You can view and filter the list of subscriptions by selecting this button. Defender for Cloud will adjust the display to reflect the security posture of the selected subscriptions.
2626
- **What's new** - Opens the [release notes](release-notes.md) so you can keep up to date with new features, bug fixes, and deprecated functionality.
27-
- **High-level numbers** for the connected cloud accounts, to show the context of the information in the main tiles below. As well as the number of assessed resources, active recommendations, and security alerts. Select the assessed resources number to access [Asset inventory](asset-inventory.md). Learn more about connecting your [AWS accounts](quickstart-onboard-aws.md) and your [GCP projects](quickstart-onboard-gcp.md).
27+
- **High-level numbers** for the connected cloud accounts, showing the context of the information in the main tiles, and the number of assessed resources, active recommendations, and security alerts. Select the assessed resources number to access [Asset inventory](asset-inventory.md). Learn more about connecting your [AWS accounts](quickstart-onboard-aws.md) and your [GCP projects](quickstart-onboard-gcp.md).
2828

2929
### Feature tiles
3030

31-
In the center of the page are the **feature tiles**, each linking to a high profile feature or dedicated dashboard:
31+
The center of the page displays the **feature tiles**, each linking to a high profile feature or dedicated dashboard:
3232

33-
- **Security posture** - Defender for Cloud continually assesses your resources, subscriptions, and organization for security issues. It then aggregates all the findings into a single score so that you can tell, at a glance, your current security situation: the higher the score, the lower the identified risk level. [Learn more](secure-score-security-controls.md).
34-
- **Workload protections** - This is the cloud workload protection platform (CWPP) integrated within Defender for Cloud for advanced, intelligent protection of your workloads running on Azure, on-premises machines, or other cloud providers. For each resource type, there's a corresponding Microsoft Defender plan. The tile shows the coverage of your connected resources (for the currently selected subscriptions) and the recent alerts, color-coded by severity. Learn more about [the enhanced security features](enhanced-security-features-overview.md).
33+
- **Security posture** - Defender for Cloud continually assesses your resources, subscriptions, and organization for security issues. It then aggregates all the findings into a single score so that you can understand, at a glance, your current security situation: the higher the score, the lower the identified risk level. [Learn more](secure-score-security-controls.md).
34+
- **Workload protections** - This tile is the cloud workload protection platform (CWPP) integrated within Defender for Cloud for advanced, intelligent protection of your workloads running on Azure, on-premises machines, or other cloud providers. For each resource type, there's a corresponding Microsoft Defender plan. The tile shows the coverage of your connected resources (for the currently selected subscriptions) and the recent alerts, color-coded by severity. Learn more about [the enhanced security features](enhanced-security-features-overview.md).
3535
- **Regulatory compliance** - Defender for Cloud provides insights into your compliance posture based on continuous assessments of your Azure environment. Defender for Cloud analyzes risk factors in your environment according to security best practices. These assessments are mapped to compliance controls from a supported set of standards. [Learn more](regulatory-compliance-dashboard.md).
3636
- **Inventory** - The asset inventory page of Microsoft Defender for Cloud provides a single page for viewing the security posture of the resources you've connected to Microsoft Defender for Cloud. All resources with unresolved security recommendations are shown in the inventory. If you've enabled the integration with Microsoft Defender for Endpoint and enabled Microsoft Defender for Servers, you'll also have access to a software inventory. The tile on the overview page shows you at a glance the total healthy and unhealthy resources (for the currently selected subscriptions). [Learn more](asset-inventory.md).
3737

articles/defender-for-cloud/partner-integration.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Integrate security solutions in Microsoft Defender for Cloud
33
description: Learn about how Microsoft Defender for Cloud integrates with partners to enhance the overall security of your Azure resources.
44
ms.topic: conceptual
55
ms.custom: ignite-2022
6-
ms.date: 07/14/2022
6+
ms.date: 01/10/2023
77
---
88
# Integrate security solutions in Microsoft Defender for Cloud
99

@@ -13,7 +13,7 @@ This document helps you to manage security solutions already connected to Micros
1313
Defender for Cloud makes it easy to enable integrated security solutions in Azure. Benefits include:
1414

1515
- **Simplified deployment**: Defender for Cloud offers streamlined provisioning of integrated partner solutions. For solutions like antimalware and vulnerability assessment, Defender for Cloud can provision the agent on your virtual machines. For firewall appliances, Defender for Cloud can take care of much of the network configuration required.
16-
- **Integrated detections**: Security events from partner solutions are automatically collected, aggregated, and displayed as part of Defender for Cloud alerts and incidents. These events also are fused with detections from other sources to provide advanced threat-detection capabilities.
16+
- **Integrated detections**: Security events from partner solutions are automatically collected, aggregated, and displayed as part of Defender for Cloud alerts and incidents. These events are also fused with detections from other sources to provide advanced threat-detection capabilities.
1717
- **Unified health monitoring and management**: Customers can use integrated health events to monitor all partner solutions at a glance. Basic management is available, with easy access to advanced setup by using the partner solution.
1818

1919
Currently, integrated security solutions include vulnerability assessment by [Qualys](https://www.qualys.com/public-cloud/#azure) and [Rapid7](https://www.rapid7.com/products/insightvm/).
@@ -32,7 +32,7 @@ Defender for Cloud also offers vulnerability analysis for your:
3232
## How security solutions are integrated
3333
Azure security solutions that are deployed from Defender for Cloud are automatically connected. You can also connect other security data sources, including computers running on-premises or in other clouds.
3434

35-
:::image type="content" source="./media/partner-integration/security-solutions-page.png" alt-text="Partner solutions integration." lightbox="./media/partner-integration/security-solutions-page.png":::
35+
:::image type="content" source="./media/partner-integration/security-solutions-page-01-2023.png" alt-text="Screenshot showing security Solutions page." lightbox="./media/partner-integration/security-solutions-page-01-2023.png":::
3636

3737
## Manage integrated Azure security solutions and other data sources
3838

@@ -48,7 +48,7 @@ The **Connected solutions** section includes security solutions that are current
4848

4949
![Connected solutions.](./media/partner-integration/connected-solutions.png)
5050

51-
The status of a partner solution can be:
51+
The status of a security solution can be:
5252

5353
* **Healthy** (green) - no health issues.
5454
* **Unhealthy** (red) - there's a health issue that requires immediate attention.
@@ -81,7 +81,7 @@ Select **CONNECT** under a solution to integrate with Defender for Cloud and be
8181

8282
### Add data sources
8383

84-
The **Add data sources** section includes other available data sources that can be connected. For instructions on adding data from any of these sources, click **ADD**.
84+
The **Add data sources** section includes other available data sources that can be connected. For instructions on adding data from any of these sources, select **ADD**.
8585

8686
![Data sources.](./media/partner-integration/add-data-sources.png)
8787

articles/defender-for-cloud/review-security-recommendations.md

Lines changed: 15 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,10 @@ To get to the list of recommendations:
1414
1. Sign in to the [Azure portal](https://portal.azure.com).
1515

1616
1. Either:
17-
- In the Defender for Cloud overview, select **Security posture** and then select **View recommendations** for the environment that you want to improve.
17+
- In the Defender for Cloud overview, select **Security posture** and then select **View recommendations** for the environment you want to improve.
1818
- Go to **Recommendations** in the Defender for Cloud menu.
1919

20-
You can search for specific recommendations by name. Use the search box and filters above the list of recommendations to find specific recommendations, and look at the [details of the recommendation](security-policy-concept.md#security-recommendation-details) to decide whether to [remediate it](implement-security-recommendations.md), [exempt resources](exempt-resource.md), or [disable the recommendation](tutorial-security-policy.md#disable-security-policies-and-disable-recommendations).
20+
You can search for specific recommendations by name. Use the search box and filters above the list of recommendations to find specific recommendations. Look at the [details of the recommendation](security-policy-concept.md#security-recommendation-details) to decide whether to [remediate it](implement-security-recommendations.md), [exempt resources](exempt-resource.md), or [disable the recommendation](tutorial-security-policy.md#disable-security-policies-and-disable-recommendations).
2121

2222
You can learn more by watching this video from the Defender for Cloud in the Field video series:
2323
- [Security posture management improvements](episode-four.md)
@@ -40,7 +40,7 @@ When you [remediate](implement-security-recommendations.md) all of the recommend
4040

4141
[Security teams can assign a recommendation](governance-rules.md) to a specific person and assign a due date to drive your organization towards increased security. If you have recommendations assigned to you, you're accountable to remediate the resources affected by the recommendations to help your organization be compliant with the security policy.
4242

43-
Recommendations are listed as **On time** until their due date is passed, when they're changed to **Overdue**. Before the recommendation is overdue, the recommendation doesn't impact the secure score. The security team can also apply a grace period during which overdue recommendations continue to not impact the secure score.
43+
Recommendations are listed as **On time** until their due date is passed, when they're changed to **Overdue**. Before the recommendation is overdue, the recommendation doesn't affect the secure score. The security team can also apply a grace period during which overdue recommendations continue to not affect the secure score.
4444

4545
To help you plan your work and report on progress, you can set an ETA for the specific resources to show when you plan to have the recommendation resolved by for those resources. You can also change the owner of the recommendation for specific resources so that the person responsible for remediation is assigned to the resource.
4646

@@ -51,13 +51,15 @@ To change the owner of resources and set the ETA for remediation of recommendati
5151
1. In the filters for list of recommendations, select **Show my items only**.
5252

5353
- The status column indicates the recommendations that are on time, overdue, or completed.
54-
- The insights column indicates the recommendations that are in a grace period, so they currently don't impact your secure score until they become overdue.
54+
- The insights column indicates the recommendations that are in a grace period, so they currently don't affect your secure score until they become overdue.
5555

5656
1. Select an on time or overdue recommendation.
5757
1. For the resources that are assigned to you, set the owner of the resource:
5858
1. Select the resources that are owned by another person, and select **Change owner and set ETA**.
5959
1. Select **Change owner**, enter the email address of the owner of the resource, and select **Save**.
60-
The owner of the resource gets a weekly email listing the recommendations that they're assigned to.
60+
61+
The owner of the resource gets a weekly email listing the recommendations that they're assigned.
62+
6163
1. For resources that you own, set an ETA for remediation:
6264
1. Select resources that you plan to remediate by the same date, and select **Change owner and set ETA**.
6365
1. Select **Change ETA** and set the date by which you plan to remediate the recommendation for those resources.
@@ -67,9 +69,9 @@ The due date for the recommendation doesn't change, but the security team can se
6769

6870
## Review recommendation data in Azure Resource Graph Explorer (ARG)
6971

70-
You can review recommendations in ARG both on the recommendations page or on an individual recommendation.
72+
You can review recommendations in ARG both on the Recommendations page or on an individual recommendation.
7173

72-
The toolbar on the recommendation details page includes an **Open query** button to explore the details in [Azure Resource Graph (ARG)](../governance/resource-graph/index.yml), an Azure service that gives you the ability to query - across multiple subscriptions - Defender for Cloud's security posture data.
74+
The toolbar on the Recommendations page includes an **Open query** button to explore the details in [Azure Resource Graph (ARG)](../governance/resource-graph/index.yml), an Azure service that gives you the ability to query - across multiple subscriptions - Defender for Cloud's security posture data.
7375

7476
ARG is designed to provide efficient resource exploration with the ability to query at scale across your cloud environments with robust filtering, grouping, and sorting capabilities. It's a quick and efficient way to query information across Azure subscriptions programmatically or from within the Azure portal.
7577

@@ -96,7 +98,7 @@ The Insights column of the page gives you more details for each recommendation.
9698

9799
Recommendations that aren't included in the calculations of your secure score, should still be remediated wherever possible, so that when the period ends they'll contribute towards your score instead of against it.
98100

99-
## Download recommendations in a CSV report
101+
## Download recommendations to a CSV report
100102

101103
Recommendations can be downloaded to a CSV report from the Recommendations page.
102104

@@ -108,13 +110,13 @@ To download a CSV report of your recommendations:
108110

109111
:::image type="content" source="media/review-security-recommendations/download-csv.png" alt-text="Screenshot showing you where to select the Download C S V report from.":::
110112

111-
You'll know the report is being prepared by the pop-up.
113+
You'll know the report is being prepared when the pop-up appears.
112114

113-
:::image type="content" source="media/review-security-recommendations/preparing-report.png" alt-text="Screenshot of report being prepared.":::
115+
:::image type="content" source="media/review-security-recommendations/preparing-report.png" alt-text="Screenshot of pop-up indicating report being prepared.":::
114116

115117
When the report is ready, you'll be notified by a second pop-up.
116118

117-
:::image type="content" source="media/review-security-recommendations/downloaded-csv.png" alt-text="Screenshot letting you know your downloaded completed.":::
119+
:::image type="content" source="media/review-security-recommendations/downloaded-csv.png" alt-text="Screenshot of pop-up indicating your downloaded completed.":::
118120

119121
## Learn more
120122

@@ -127,8 +129,8 @@ You can check out the following blogs:
127129

128130
In this document, you were introduced to security recommendations in Defender for Cloud. For related information:
129131

130-
- [Remediate recommendations](implement-security-recommendations.md)--Learn how to configure security policies for your Azure subscriptions and resource groups.
132+
- [Remediate recommendations](implement-security-recommendations.md)-Learn how to configure security policies for your Azure subscriptions and resource groups.
131133
- [Prevent misconfigurations with Enforce/Deny recommendations](prevent-misconfigurations.md).
132-
- [Automate responses to Defender for Cloud triggers](workflow-automation.md)--Automate responses to recommendations
134+
- [Automate responses to Defender for Cloud triggers](workflow-automation.md)-Automate responses to recommendations
133135
- [Exempt a resource from a recommendation](exempt-resource.md)
134136
- [Security recommendations - a reference guide](recommendations-reference.md)

0 commit comments

Comments
 (0)