You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/concept-easm.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,7 @@ Defender EASM applies Microsoft’s crawling technology to discover assets that
22
22
23
23
EASM collects data for publicly exposed assets (“outside-in”). That data can be used by MDC CSPM (“inside-out”) to assist with internet-exposure validation and discovery capabilities to provide better visibility to customers.
24
24
25
+
25
26
## Learn more
26
27
27
28
You can learn more about [Defender EASM](../external-attack-surface-management/index.md), and learn about the [pricing](https://azure.microsoft.com/pricing/details/defender-external-attack-surface-management/) options available.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/overview-page.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,8 @@
1
1
---
2
2
title: Microsoft Defender for Cloud's main dashboard or 'overview' page
3
3
description: Learn about the features of the Defender for Cloud overview page
4
-
ms.date: 09/20/2022
5
-
ms.topic: overview
4
+
ms.date: 01/10/2023
5
+
ms.topic: conceptual
6
6
ms.custom: ignite-2022
7
7
---
8
8
@@ -12,26 +12,26 @@ Microsoft Defender for Cloud's overview page is an interactive dashboard that pr
12
12
13
13
You can select any element on the page to get more detailed information.
14
14
15
-
:::image type="content" source="./media/overview-page/overview.png" alt-text="Screenshot of Defender for Cloud's overview page." lightbox="./media/overview-page/overview.png":::
15
+
:::image type="content" source="./media/overview-page/overview-01-2023.png" alt-text="Screenshot of Defender for Cloud's overview page." lightbox="./media/overview-page/overview-01-2023.png":::
16
16
17
17
## Features of the overview page
18
18
19
-
:::image type="content" source="./media/overview-page/top-bar-of-overview.png" alt-text="Screenshot of Defender for Cloud's overview page's top bar." lightbox="media/overview-page/overview.png":::
19
+
:::image type="content" source="./media/overview-page/top-bar-of-overview-new.png" alt-text="Screenshot of Defender for Cloud's overview page's top bar." lightbox="media/overview-page/top-bar-of-overview-new.png":::
20
20
21
21
### Metrics
22
22
23
23
The **top menu bar** offers:
24
24
25
25
-**Subscriptions** - You can view and filter the list of subscriptions by selecting this button. Defender for Cloud will adjust the display to reflect the security posture of the selected subscriptions.
26
26
-**What's new** - Opens the [release notes](release-notes.md) so you can keep up to date with new features, bug fixes, and deprecated functionality.
27
-
-**High-level numbers** for the connected cloud accounts, to show the context of the information in the main tiles below. As well as the number of assessed resources, active recommendations, and security alerts. Select the assessed resources number to access [Asset inventory](asset-inventory.md). Learn more about connecting your [AWS accounts](quickstart-onboard-aws.md) and your [GCP projects](quickstart-onboard-gcp.md).
27
+
-**High-level numbers** for the connected cloud accounts, showing the context of the information in the main tiles, and the number of assessed resources, active recommendations, and security alerts. Select the assessed resources number to access [Asset inventory](asset-inventory.md). Learn more about connecting your [AWS accounts](quickstart-onboard-aws.md) and your [GCP projects](quickstart-onboard-gcp.md).
28
28
29
29
### Feature tiles
30
30
31
-
In the center of the page are the **feature tiles**, each linking to a high profile feature or dedicated dashboard:
31
+
The center of the page displays the **feature tiles**, each linking to a high profile feature or dedicated dashboard:
32
32
33
-
-**Security posture** - Defender for Cloud continually assesses your resources, subscriptions, and organization for security issues. It then aggregates all the findings into a single score so that you can tell, at a glance, your current security situation: the higher the score, the lower the identified risk level. [Learn more](secure-score-security-controls.md).
34
-
-**Workload protections** - This is the cloud workload protection platform (CWPP) integrated within Defender for Cloud for advanced, intelligent protection of your workloads running on Azure, on-premises machines, or other cloud providers. For each resource type, there's a corresponding Microsoft Defender plan. The tile shows the coverage of your connected resources (for the currently selected subscriptions) and the recent alerts, color-coded by severity. Learn more about [the enhanced security features](enhanced-security-features-overview.md).
33
+
-**Security posture** - Defender for Cloud continually assesses your resources, subscriptions, and organization for security issues. It then aggregates all the findings into a single score so that you can understand, at a glance, your current security situation: the higher the score, the lower the identified risk level. [Learn more](secure-score-security-controls.md).
34
+
-**Workload protections** - This tile is the cloud workload protection platform (CWPP) integrated within Defender for Cloud for advanced, intelligent protection of your workloads running on Azure, on-premises machines, or other cloud providers. For each resource type, there's a corresponding Microsoft Defender plan. The tile shows the coverage of your connected resources (for the currently selected subscriptions) and the recent alerts, color-coded by severity. Learn more about [the enhanced security features](enhanced-security-features-overview.md).
35
35
-**Regulatory compliance** - Defender for Cloud provides insights into your compliance posture based on continuous assessments of your Azure environment. Defender for Cloud analyzes risk factors in your environment according to security best practices. These assessments are mapped to compliance controls from a supported set of standards. [Learn more](regulatory-compliance-dashboard.md).
36
36
-**Inventory** - The asset inventory page of Microsoft Defender for Cloud provides a single page for viewing the security posture of the resources you've connected to Microsoft Defender for Cloud. All resources with unresolved security recommendations are shown in the inventory. If you've enabled the integration with Microsoft Defender for Endpoint and enabled Microsoft Defender for Servers, you'll also have access to a software inventory. The tile on the overview page shows you at a glance the total healthy and unhealthy resources (for the currently selected subscriptions). [Learn more](asset-inventory.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/partner-integration.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Integrate security solutions in Microsoft Defender for Cloud
3
3
description: Learn about how Microsoft Defender for Cloud integrates with partners to enhance the overall security of your Azure resources.
4
4
ms.topic: conceptual
5
5
ms.custom: ignite-2022
6
-
ms.date: 07/14/2022
6
+
ms.date: 01/10/2023
7
7
---
8
8
# Integrate security solutions in Microsoft Defender for Cloud
9
9
@@ -13,7 +13,7 @@ This document helps you to manage security solutions already connected to Micros
13
13
Defender for Cloud makes it easy to enable integrated security solutions in Azure. Benefits include:
14
14
15
15
-**Simplified deployment**: Defender for Cloud offers streamlined provisioning of integrated partner solutions. For solutions like antimalware and vulnerability assessment, Defender for Cloud can provision the agent on your virtual machines. For firewall appliances, Defender for Cloud can take care of much of the network configuration required.
16
-
-**Integrated detections**: Security events from partner solutions are automatically collected, aggregated, and displayed as part of Defender for Cloud alerts and incidents. These events also are fused with detections from other sources to provide advanced threat-detection capabilities.
16
+
-**Integrated detections**: Security events from partner solutions are automatically collected, aggregated, and displayed as part of Defender for Cloud alerts and incidents. These events are also fused with detections from other sources to provide advanced threat-detection capabilities.
17
17
-**Unified health monitoring and management**: Customers can use integrated health events to monitor all partner solutions at a glance. Basic management is available, with easy access to advanced setup by using the partner solution.
18
18
19
19
Currently, integrated security solutions include vulnerability assessment by [Qualys](https://www.qualys.com/public-cloud/#azure) and [Rapid7](https://www.rapid7.com/products/insightvm/).
@@ -32,7 +32,7 @@ Defender for Cloud also offers vulnerability analysis for your:
32
32
## How security solutions are integrated
33
33
Azure security solutions that are deployed from Defender for Cloud are automatically connected. You can also connect other security data sources, including computers running on-premises or in other clouds.
***Unhealthy** (red) - there's a health issue that requires immediate attention.
@@ -81,7 +81,7 @@ Select **CONNECT** under a solution to integrate with Defender for Cloud and be
81
81
82
82
### Add data sources
83
83
84
-
The **Add data sources** section includes other available data sources that can be connected. For instructions on adding data from any of these sources, click**ADD**.
84
+
The **Add data sources** section includes other available data sources that can be connected. For instructions on adding data from any of these sources, select**ADD**.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/review-security-recommendations.md
+15-13Lines changed: 15 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,10 +14,10 @@ To get to the list of recommendations:
14
14
1. Sign in to the [Azure portal](https://portal.azure.com).
15
15
16
16
1. Either:
17
-
- In the Defender for Cloud overview, select **Security posture** and then select **View recommendations** for the environment that you want to improve.
17
+
- In the Defender for Cloud overview, select **Security posture** and then select **View recommendations** for the environment you want to improve.
18
18
- Go to **Recommendations** in the Defender for Cloud menu.
19
19
20
-
You can search for specific recommendations by name. Use the search box and filters above the list of recommendations to find specific recommendations, and look at the [details of the recommendation](security-policy-concept.md#security-recommendation-details) to decide whether to [remediate it](implement-security-recommendations.md), [exempt resources](exempt-resource.md), or [disable the recommendation](tutorial-security-policy.md#disable-security-policies-and-disable-recommendations).
20
+
You can search for specific recommendations by name. Use the search box and filters above the list of recommendations to find specific recommendations. Look at the [details of the recommendation](security-policy-concept.md#security-recommendation-details) to decide whether to [remediate it](implement-security-recommendations.md), [exempt resources](exempt-resource.md), or [disable the recommendation](tutorial-security-policy.md#disable-security-policies-and-disable-recommendations).
21
21
22
22
You can learn more by watching this video from the Defender for Cloud in the Field video series:
@@ -40,7 +40,7 @@ When you [remediate](implement-security-recommendations.md) all of the recommend
40
40
41
41
[Security teams can assign a recommendation](governance-rules.md) to a specific person and assign a due date to drive your organization towards increased security. If you have recommendations assigned to you, you're accountable to remediate the resources affected by the recommendations to help your organization be compliant with the security policy.
42
42
43
-
Recommendations are listed as **On time** until their due date is passed, when they're changed to **Overdue**. Before the recommendation is overdue, the recommendation doesn't impact the secure score. The security team can also apply a grace period during which overdue recommendations continue to not impact the secure score.
43
+
Recommendations are listed as **On time** until their due date is passed, when they're changed to **Overdue**. Before the recommendation is overdue, the recommendation doesn't affect the secure score. The security team can also apply a grace period during which overdue recommendations continue to not affect the secure score.
44
44
45
45
To help you plan your work and report on progress, you can set an ETA for the specific resources to show when you plan to have the recommendation resolved by for those resources. You can also change the owner of the recommendation for specific resources so that the person responsible for remediation is assigned to the resource.
46
46
@@ -51,13 +51,15 @@ To change the owner of resources and set the ETA for remediation of recommendati
51
51
1. In the filters for list of recommendations, select **Show my items only**.
52
52
53
53
- The status column indicates the recommendations that are on time, overdue, or completed.
54
-
- The insights column indicates the recommendations that are in a grace period, so they currently don't impact your secure score until they become overdue.
54
+
- The insights column indicates the recommendations that are in a grace period, so they currently don't affect your secure score until they become overdue.
55
55
56
56
1. Select an on time or overdue recommendation.
57
57
1. For the resources that are assigned to you, set the owner of the resource:
58
58
1. Select the resources that are owned by another person, and select **Change owner and set ETA**.
59
59
1. Select **Change owner**, enter the email address of the owner of the resource, and select **Save**.
60
-
The owner of the resource gets a weekly email listing the recommendations that they're assigned to.
60
+
61
+
The owner of the resource gets a weekly email listing the recommendations that they're assigned.
62
+
61
63
1. For resources that you own, set an ETA for remediation:
62
64
1. Select resources that you plan to remediate by the same date, and select **Change owner and set ETA**.
63
65
1. Select **Change ETA** and set the date by which you plan to remediate the recommendation for those resources.
@@ -67,9 +69,9 @@ The due date for the recommendation doesn't change, but the security team can se
67
69
68
70
## Review recommendation data in Azure Resource Graph Explorer (ARG)
69
71
70
-
You can review recommendations in ARG both on the recommendations page or on an individual recommendation.
72
+
You can review recommendations in ARG both on the Recommendations page or on an individual recommendation.
71
73
72
-
The toolbar on the recommendation details page includes an **Open query** button to explore the details in [Azure Resource Graph (ARG)](../governance/resource-graph/index.yml), an Azure service that gives you the ability to query - across multiple subscriptions - Defender for Cloud's security posture data.
74
+
The toolbar on the Recommendations page includes an **Open query** button to explore the details in [Azure Resource Graph (ARG)](../governance/resource-graph/index.yml), an Azure service that gives you the ability to query - across multiple subscriptions - Defender for Cloud's security posture data.
73
75
74
76
ARG is designed to provide efficient resource exploration with the ability to query at scale across your cloud environments with robust filtering, grouping, and sorting capabilities. It's a quick and efficient way to query information across Azure subscriptions programmatically or from within the Azure portal.
75
77
@@ -96,7 +98,7 @@ The Insights column of the page gives you more details for each recommendation.
96
98
97
99
Recommendations that aren't included in the calculations of your secure score, should still be remediated wherever possible, so that when the period ends they'll contribute towards your score instead of against it.
98
100
99
-
## Download recommendations in a CSV report
101
+
## Download recommendations to a CSV report
100
102
101
103
Recommendations can be downloaded to a CSV report from the Recommendations page.
102
104
@@ -108,13 +110,13 @@ To download a CSV report of your recommendations:
108
110
109
111
:::image type="content" source="media/review-security-recommendations/download-csv.png" alt-text="Screenshot showing you where to select the Download C S V report from.":::
110
112
111
-
You'll know the report is being prepared by the pop-up.
113
+
You'll know the report is being prepared when the pop-up appears.
112
114
113
-
:::image type="content" source="media/review-security-recommendations/preparing-report.png" alt-text="Screenshot of report being prepared.":::
115
+
:::image type="content" source="media/review-security-recommendations/preparing-report.png" alt-text="Screenshot of pop-up indicating report being prepared.":::
114
116
115
117
When the report is ready, you'll be notified by a second pop-up.
116
118
117
-
:::image type="content" source="media/review-security-recommendations/downloaded-csv.png" alt-text="Screenshot letting you know your downloaded completed.":::
119
+
:::image type="content" source="media/review-security-recommendations/downloaded-csv.png" alt-text="Screenshot of pop-up indicating your downloaded completed.":::
118
120
119
121
## Learn more
120
122
@@ -127,8 +129,8 @@ You can check out the following blogs:
127
129
128
130
In this document, you were introduced to security recommendations in Defender for Cloud. For related information:
129
131
130
-
-[Remediate recommendations](implement-security-recommendations.md)--Learn how to configure security policies for your Azure subscriptions and resource groups.
132
+
-[Remediate recommendations](implement-security-recommendations.md)-Learn how to configure security policies for your Azure subscriptions and resource groups.
131
133
-[Prevent misconfigurations with Enforce/Deny recommendations](prevent-misconfigurations.md).
132
-
-[Automate responses to Defender for Cloud triggers](workflow-automation.md)--Automate responses to recommendations
134
+
-[Automate responses to Defender for Cloud triggers](workflow-automation.md)-Automate responses to recommendations
133
135
-[Exempt a resource from a recommendation](exempt-resource.md)
134
136
-[Security recommendations - a reference guide](recommendations-reference.md)
0 commit comments