You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/built-in-vulnerability-assessment.md
+23-15Lines changed: 23 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,11 +19,17 @@ ms.author: memildin
19
19
20
20
The vulnerability scanner included with Azure Security Center is powered by Qualys. Qualys's scanner is the leading tool for real-time identification of vulnerabilities in your Azure Virtual Machines. It's only available to users on the standard pricing tier. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center.
21
21
22
-
This feature is currently in preview.
23
-
24
22
> [!NOTE]
25
23
> Security Center supports the integration of tools from other vendors, but you'll need to handle the licensing costs, deployment, and configuration. For more information, see [Deploying a partner vulnerability scanning solution](partner-vulnerability-assessment.md). You can also use those instructions to integrate your organization's own Qualys license, if you choose not to use the built-in vulnerability scanner included with Azure Security Center.
26
24
25
+
## Availability
26
+
27
+
- Release state: **Generally Available**
28
+
- Required roles: **Resource owner** can deploy the scanner. **Security reader** can view findings.
29
+
- Clouds:
30
+
- ✔ Commercial clouds
31
+
- ✘ National, Government, and Sovereign
32
+
27
33
28
34
## Overview of the integrated vulnerability scanner
29
35
@@ -85,7 +91,7 @@ To deploy the vulnerability scanner extension:
85
91
86
92
Scanning begins automatically as soon as the extension is successfully deployed. Scans will then run at four-hour intervals. This interval is hard-coded and not configurable.
87
93
88
-
1. If the deployment fails on one or more VMs, ensure the target VMs can communicate with Qualys's cloud service on the following two IP addresses:
94
+
1. If the deployment fails on one or more VMs, ensure the target VMs can communicate with Qualys's cloud service on the following two IP addresses (via port 443 - the default for HTTPS):
89
95
90
96
- 64.39.104.113
91
97
- 154.59.121.74
@@ -144,7 +150,7 @@ You'll need write permissions for any VM on which you want to deploy the extensi
144
150
145
151
The Azure Security Center Vulnerability Assessment extension (powered by Qualys), like other extensions, runs on top of the Azure Virtual Machine agent. So it runs as Local Host on Windows, and Root on Linux.
146
152
147
-
During setup, Security Center checks to ensure that the VM can communicate with Qualys's cloud service on the following two IP addresses:
153
+
During setup, Security Center checks to ensure that the VM can communicate with Qualys's cloud service on the following two IP addresses (via port 443 - the default for HTTPS):
148
154
149
155
- 64.39.104.113
150
156
- 154.59.121.74
@@ -161,25 +167,27 @@ You'll need the following details:
161
167
### How does the extension get updated?
162
168
Like the Azure Security Center agent itself and all other Azure extensions, minor updates of the Qualys scanner may automatically happen in the background. All agents and extensions are tested extensively before being automatically deployed.
163
169
164
-
Some updates to the vulnerability scanner extension may require manual deployment. For example, **if you're running v1.0.0.4, you must take the following steps**:
170
+
If you're running v1.0.0.4, you must manually update the vulnerability scanner extension using the steps below. This procedure also shows you how to check the version of the scanner currently deployed to your VMs.
165
171
166
-
1.Verify the version of the Qualys vulnerability scanner extension running on your VM:
172
+
1.From the Azure portal, open **Virtual machines**.
167
173
168
-
1. From the Azure portal, open Virtual machines.
169
-
1. Select the VM on which the agent is installed.
170
-
1. From the sidebar navigation, open **Extensions** and select the following extension:
174
+
1. Select the VM on which the extension is installed.

180
+
1. Review the version information of the extension.
177
181
178
-
1. If the version is 1.0.0.4, click **Uninstall** and wait until the extension is no longer listed in the VM's extensions page.
182
+

179
183
180
-
1. Restart the VM.
184
+
1. If the version is 1.0.0.4, click **Uninstall** and wait until the extension is no longer listed in the VM's extensions page.
185
+
186
+
1. Restart the VM.
181
187
182
-
1. When the VM's status is "Running", deploy the extension as described above in [Deploying the Qualys built-in vulnerability scanner](#deploying-the-qualys-built-in-vulnerability-scanner).
188
+
1. When the VM's status is "Running", deploy the extension as described above in [Deploying the Qualys built-in vulnerability scanner](#deploying-the-qualys-built-in-vulnerability-scanner).
189
+
190
+
183
191
184
192
### Why does my VM show as "not applicable" in the recommendation?
185
193
The recommendation details page for the **"Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)"** recommendation groups your VMs in one or more of the following lists: **Healthy resources**, **Unhealthy resources**, and **Not applicable resources**.
Copy file name to clipboardExpand all lines: articles/security-center/release-notes.md
+51-5Lines changed: 51 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.devlang: na
10
10
ms.topic: conceptual
11
11
ms.tgt_pltfrm: na
12
12
ms.workload: na
13
-
ms.date: 05/11/2020
13
+
ms.date: 05/15/2020
14
14
ms.author: memildin
15
15
16
16
---
@@ -28,6 +28,52 @@ This page is updated regularly, so revisit it often. If you're looking for items
28
28
29
29
## May 2020
30
30
31
+
32
+
### Alert suppression rules (preview)
33
+
34
+
This new feature (currently in preview) helps reduce alert fatigue. Use rules to automatically hide alerts that are known to be innocuous or related to normal activities in your organization. This lets you focus on the most relevant threats.
35
+
36
+
Alerts that match your enabled suppression rules will still be generated, but their state will be set to dismissed. You can see the state in the Azure portal or however you access your Security Center security alerts.
37
+
38
+
Suppression rules define the criteria for which alerts should be automatically dismissed. Typically, you'd use a suppression rule to:
39
+
40
+
- suppress alerts that you've identified as false positives
41
+
42
+
- suppress alerts that are being triggered too often to be useful
43
+
44
+
[Learn more about suppressing alerts from Azure Security Center's threat protection](alerts-suppression-rules.md).
45
+
46
+
47
+
### Virtual machine vulnerability assessment is now generally available
48
+
49
+
Security Center's standard tier now includes a built-in vulnerability assessment for virtual machines for no additional fee. This extension is powered by Qualys but reports its findings directly back to Security Center. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center.
50
+
51
+
The new solution can continuously scan your virtual machines to find vulnerabilities and present the findings in Security Center.
52
+
53
+
To deploy the solution, use the new security recommendation:
54
+
55
+
"Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)"
This new feature (currently in preview) helps reduce alert fatigue. Use rules to automatically hide alerts that are known to be innocuous or related to normal activities in your organization. This lets you focus on the most relevant threats.
64
+
65
+
Alerts that match your enabled suppression rules will still be generated, but their state will be set to dismissed. You can see the state in the Azure portal or however you access your Security Center security alerts.
66
+
67
+
Suppression rules define the criteria for which alerts should be automatically dismissed. Typically, you'd use a suppression rule to:
68
+
69
+
- suppress alerts that you've identified as false positives
70
+
71
+
- suppress alerts that are being triggered too often to be useful
72
+
73
+
[Learn more about suppressing alerts from Azure Security Center's threat protection](alerts-suppression-rules.md).
74
+
75
+
76
+
31
77
### Changes to just-in-time (JIT) virtual machine (VM) access
32
78
33
79
Security Center includes an optional feature to protect the management ports of your VMs. This provides a defense against the most common form of brute force attacks.
@@ -78,7 +124,7 @@ The recommendations are:
78
124
Learn more about security controls in [Enhanced secure score (preview) in Azure Security Center](secure-score-security-controls.md).
79
125
80
126
81
-
### Custom policies with custom metadata generally available
127
+
### Custom policies with custom metadata are now generally available
82
128
83
129
Custom policies are now part of the Security Center recommendations experience, secure score, and the regulatory compliance standards dashboard. This feature is now generally available and allows you to extend your organization's security assessment coverage in Security Center.
84
130
@@ -91,7 +137,7 @@ We've now also added the option to edit the custom recommendation metadata. Meta
91
137
92
138
## April 2020
93
139
94
-
### Dynamic compliance packages now generally available
140
+
### Dynamic compliance packages are now generally available
95
141
96
142
The Azure Security Center regulatory compliance dashboard now includes **dynamic compliance packages** (now generally available) to track additional industry and regulatory standards.
97
143
@@ -193,7 +239,7 @@ These recommendations will no longer appear in the Security Center list of recom
193
239
194
240
## February 2020
195
241
196
-
### Fileless attack detection for Linux is now in preview
242
+
### Fileless attack detection for Linux (preview)
197
243
198
244
As attackers increasing employ stealthier methods to avoid detection, Azure Security Center is extending fileless attack detection for Linux, in addition to Windows. Fileless attacks exploit software vulnerabilities, inject malicious payloads into benign system processes, and hide in memory. These techniques:
199
245
@@ -205,7 +251,7 @@ To counter this threat, Azure Security Center released fileless attack detection
205
251
206
252
## January 2020
207
253
208
-
### Enhanced secure score
254
+
### Enhanced secure score (preview)
209
255
210
256
An enhanced version of the secure score feature of Azure Security Center is now available in preview. In this version, multiple recommendations are grouped into Security Controls that better reflect your vulnerable attack surfaces (for example, restrict access to management ports).
Copy file name to clipboardExpand all lines: articles/security-center/security-center-vulnerability-assessment-recommendations.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ ms.author: memildin
17
17
---
18
18
# Vulnerability assessments for your Azure Virtual Machines
19
19
20
-
A core component of every cyber risk and security program is the identification and analysis of vulnerabilities. Azure Security Center's Standard pricing tier includes vulnerability scanning for your virtual machines at no extra cost. Additionally, Security Center can automatically deploy this tool for you. This feature is currently in preview.
20
+
A core component of every cyber risk and security program is the identification and analysis of vulnerabilities. Azure Security Center's Standard pricing tier includes vulnerability scanning for your virtual machines at no extra cost. Additionally, Security Center can automatically deploy this tool for you.
21
21
22
22
Security Center presents one of two recommendations if it doesn't find a vulnerability assessment solution installed on a VM:
23
23
@@ -28,4 +28,4 @@ Security Center presents one of two recommendations if it doesn't find a vulnera
28
28
Security Center also offers vulnerability analysis for your:
29
29
30
30
* SQL databases - see [Explore vulnerability assessment reports in the vulnerability assessment dashboard](security-center-iaas-advanced-data.md#explore-vulnerability-assessment-reports)
31
-
* Azure Container Registry images - see [Azure Container Registry integration with Security Center (Preview)](azure-container-registry-integration.md)
31
+
* Azure Container Registry images - see [Azure Container Registry integration with Security Center](azure-container-registry-integration.md)
0 commit comments