You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/release-notes-archive.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -268,15 +268,15 @@ Updates in July include:
268
268
269
269
|Date |Update |
270
270
|----------|----------|
271
-
| July 31 |[Preview release of containers Vulnerability Assessment powered by Microsoft Defender Vulnerability Management in Defender for Containers and Defender for Container Registries](#preview-release-of-containers-vulnerability-assessment-powered-by-microsoft-defender-vulnerability-management-mdvm-in-defender-for-containers-and-defender-for-container-registries)|
271
+
| July 31 |[Preview release of containers Vulnerability Assessment powered by Microsoft Defender Vulnerability Management in Defender for Containers and Defender for Container Registries](#preview-release-of-containers-vulnerability-assessment-with-microsoft-defender-vulnerability-management)|
272
272
| July 30 |[Agentless container posture in Defender CSPM is now Generally Available](#agentless-container-posture-in-defender-cspm-is-now-generally-available)|
273
273
| July 20 |[Management of automatic updates to Defender for Endpoint for Linux](#management-of-automatic-updates-to-defender-for-endpoint-for-linux)|
274
274
| July 18 |[Agentless secrets scanning for virtual machines in Defender for servers P2 & Defender CSPM](#agentless-secrets-scanning-for-virtual-machines-in-defender-for-servers-p2--defender-cspm)|
275
275
| July 12 |[New Security alert in Defender for Servers plan 2: Detecting Potential Attacks leveraging Azure VM GPU driver extensions](#new-security-alert-in-defender-for-servers-plan-2-detecting-potential-attacks-leveraging-azure-vm-gpu-driver-extensions)|
276
276
| July 9 |[Support for disabling specific vulnerability findings](#support-for-disabling-specific-vulnerability-findings)|
277
277
| July 1 |[Data Aware Security Posture is now Generally Available](#data-aware-security-posture-is-now-generally-available)|
278
278
279
-
### Preview release of containers Vulnerability Assessment powered by Microsoft Defender Vulnerability Management in Defender for Containers and Defender for Container Registries
279
+
### Preview release of containers vulnerability assessment with Microsoft Defender Vulnerability Management
280
280
281
281
July 31, 2023
282
282
@@ -468,7 +468,7 @@ Updates in might include:
468
468
-[Update of two Defender for DevOps recommendations to include Azure DevOps scan findings](#two-defender-for-devops-recommendations-now-include-azure-devops-scan-findings).
469
469
-[New default setting for the Defender for Servers vulnerability assessment solution](#new-default-setting-for-defender-for-servers-vulnerability-assessment-solution).
470
470
-[Ability to download a CSV report of your cloud security explorer query results (Preview)](#download-a-csv-report-of-your-cloud-security-explorer-query-results-preview).
471
-
-[The release of containers Vulnerability Assessment powered by Microsoft Defender Vulnerability Management in Defender CSPM](#release-of-containers-vulnerability-assessment-powered-by-microsoft-defender-vulnerability-management-mdvm-in-defender-cspm).
471
+
-[The release of containers vulnerability assessment with Microsoft Defender Vulnerability Management](#release-of-containers-vulnerability-assessment-powered-by-microsoft-defender-vulnerability-management-mdvm-in-defender-cspm).
472
472
-[The renaming of container recommendations powered by Qualys](#renaming-container-recommendations-powered-by-qualys).
473
473
-[An update to Defender for DevOps GitHub Application](#defender-for-devops-github-application-update).
474
474
-[Change to Defender for DevOps Pull Request annotations in Azure DevOps repositories that now include Infrastructure as Code misconfigurations](#defender-for-devops-pull-request-annotations-in-azure-devops-repositories-now-includes-infrastructure-as-code-misconfigurations).
@@ -601,7 +601,7 @@ After your run a search for a query, you can select the **Download CSV report (P
601
601
602
602
Learn how to [build queries with cloud security explorer](how-to-manage-cloud-security-explorer.md)
603
603
604
-
### Release of containers vulnerability assessment with Microsoft Defender Vulnerability Management in Defender CSPM
604
+
### The release of containers vulnerability assessment with Microsoft Defender Vulnerability Management
605
605
606
606
We're announcing the release of Vulnerability Assessment for Linux images in Azure container registries powered by Microsoft Defender Vulnerability Management in Defender CSPM. This release includes daily scanning of images. Findings used in the Security Explorer and attack paths rely on Microsoft Defender Vulnerability Assessment, instead of the Qualys scanner.
607
607
@@ -2170,7 +2170,7 @@ Other changes in November include:
2170
2170
-[Snapshot export for recommendations and security findings (in preview)](#snapshot-export-for-recommendations-and-security-findings-in-preview)
2171
2171
-[Autoprovisioning of vulnerability assessment solutions released for general availability (GA)](#autoprovisioning-of-vulnerability-assessment-solutions-released-for-general-availability-ga)
2172
2172
-[Software inventory filters in asset inventory released for general availability (GA)](#software-inventory-filters-in-asset-inventory-released-for-general-availability-ga)
2173
-
-[New AKS security policy added to default initiative – preview](#new-aks-security-policy-added-to-default-initiative--for-use-by-private-preview-customers-only)
2173
+
-[New AKS security policy added to default initiative – preview](#new-aks-security-policy-added-to-default-initiative)
2174
2174
-[Inventory display of on-premises machines applies different template for resource name](#inventory-display-of-on-premises-machines-applies-different-template-for-resource-name)
2175
2175
2176
2176
### Azure Security Center and Azure Defender become Microsoft Defender for Cloud
@@ -2312,7 +2312,7 @@ To use these features, you'll need to enable the [integration with Microsoft Def
2312
2312
2313
2313
For full details, including sample Kusto queries for Azure Resource Graph, see [Access a software inventory](asset-inventory.md#access-a-software-inventory).
2314
2314
2315
-
### New AKS security policy added to default initiative – for use by preview customers only
2315
+
### New AKS security policy added to default initiative
2316
2316
2317
2317
To ensure that Kubernetes workloads are secure by default, Defender for Cloud includes Kubernetes level policies and hardening recommendations, including enforcement options with Kubernetes admission control.
-[Two recommendations from "Apply system updates" security control were deprecated](#two-recommendations-from-apply-system-updates-security-control-were-deprecated)
2988
2988
-[Azure Defender for SQL on machine tile removed from Azure Defender dashboard](#azure-defender-for-sql-on-machine-tile-removed-from-azure-defender-dashboard)
2989
-
-[Recommendations were moved between security controls](#twenty-one-recommendations-moved-between-security-controls)
2989
+
-[Recommendations were moved between security controls](#recommendations-moved-between-security-controls)
2990
2990
2991
2991
### Refreshed resource health page (in preview)
2992
2992
@@ -4213,7 +4213,7 @@ Updates in August include:
4213
4213
-[Added support for Azure Active Directory security defaults (for multifactor authentication)](#added-support-for-azure-active-directory-security-defaults-for-multifactor-authentication)
-[Vulnerability assessment on VMs - recommendations and policies consolidated](#vulnerability-assessment-on-vms---recommendations-and-policies-consolidated)
4216
-
-[New AKS security policies added to ASC_default initiative – for use by preview customers only](#new-aks-security-policies-added-to-asc_default-initiative--for-use-by-private-preview-customers-only)
4216
+
-[New AKS security policies added to ASC_default initiative](#new-aks-security-policies-added-to-asc_default-initiative--for-use-by-private-preview-customers-only)
4217
4217
4218
4218
### Asset inventory - powerful new view of the security posture of your assets
4219
4219
@@ -4291,7 +4291,7 @@ If you have scripts, queries, or automations referring to the previous recommend
4291
4291
|----|:----|
4292
4292
|[**Vulnerability assessment should be enabled on virtual machines**](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f501541f7-f7e7-4cd6-868c-4190fdad3ac9)<br>Policy ID: 501541f7-f7e7-4cd6-868c-4190fdad3ac9 |Built-in + BYOL|
4293
4293
4294
-
### New AKS security policies added to ASC_default initiative – for use by preview customers only
4294
+
### New AKS security policies added to ASC_default initiative
4295
4295
4296
4296
To ensure that Kubernetes workloads are secure by default, Security Center is adding Kubernetes level policies and hardening recommendations, including enforcement options with Kubernetes admission control.
0 commit comments