Skip to content

Commit 346a9f6

Browse files
Merge pull request #115205 from memildin/asc-melvyn-release-notes
Added alerts suppression rules and fixed formatting inconsistencies
2 parents 4758686 + 6b1f472 commit 346a9f6

File tree

4 files changed

+77
-23
lines changed

4 files changed

+77
-23
lines changed

articles/security-center/alerts-suppression-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ The relevant HTTP methods for suppression rules in the REST API are:
142142

143143
- **DELETE**: Deletes an existing rule (but doesn't change the status of alerts already dismissed by it).
144144

145-
For full details and usage examples, see the [API documentation](/azure/security-center/).
145+
For full details and usage examples, see the [API documentation](https://docs.microsoft.com/rest/api/securitycenter/).
146146

147147

148148
## Next steps

articles/security-center/built-in-vulnerability-assessment.md

Lines changed: 23 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -19,11 +19,17 @@ ms.author: memildin
1919

2020
The vulnerability scanner included with Azure Security Center is powered by Qualys. Qualys's scanner is the leading tool for real-time identification of vulnerabilities in your Azure Virtual Machines. It's only available to users on the standard pricing tier. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center.
2121

22-
This feature is currently in preview.
23-
2422
> [!NOTE]
2523
> Security Center supports the integration of tools from other vendors, but you'll need to handle the licensing costs, deployment, and configuration. For more information, see [Deploying a partner vulnerability scanning solution](partner-vulnerability-assessment.md). You can also use those instructions to integrate your organization's own Qualys license, if you choose not to use the built-in vulnerability scanner included with Azure Security Center.
2624
25+
## Availability
26+
27+
- Release state: **Generally Available**
28+
- Required roles: **Resource owner** can deploy the scanner. **Security reader** can view findings.
29+
- Clouds:
30+
- ✔ Commercial clouds
31+
- ✘ National, Government, and Sovereign
32+
2733

2834
## Overview of the integrated vulnerability scanner
2935

@@ -85,7 +91,7 @@ To deploy the vulnerability scanner extension:
8591

8692
Scanning begins automatically as soon as the extension is successfully deployed. Scans will then run at four-hour intervals. This interval is hard-coded and not configurable.
8793

88-
1. If the deployment fails on one or more VMs, ensure the target VMs can communicate with Qualys's cloud service on the following two IP addresses:
94+
1. If the deployment fails on one or more VMs, ensure the target VMs can communicate with Qualys's cloud service on the following two IP addresses (via port 443 - the default for HTTPS):
8995

9096
- 64.39.104.113
9197
- 154.59.121.74
@@ -144,7 +150,7 @@ You'll need write permissions for any VM on which you want to deploy the extensi
144150

145151
The Azure Security Center Vulnerability Assessment extension (powered by Qualys), like other extensions, runs on top of the Azure Virtual Machine agent. So it runs as Local Host on Windows, and Root on Linux.
146152

147-
During setup, Security Center checks to ensure that the VM can communicate with Qualys's cloud service on the following two IP addresses:
153+
During setup, Security Center checks to ensure that the VM can communicate with Qualys's cloud service on the following two IP addresses (via port 443 - the default for HTTPS):
148154

149155
- 64.39.104.113
150156
- 154.59.121.74
@@ -161,25 +167,27 @@ You'll need the following details:
161167
### How does the extension get updated?
162168
Like the Azure Security Center agent itself and all other Azure extensions, minor updates of the Qualys scanner may automatically happen in the background. All agents and extensions are tested extensively before being automatically deployed.
163169

164-
Some updates to the vulnerability scanner extension may require manual deployment. For example, **if you're running v1.0.0.4, you must take the following steps**:
170+
If you're running v1.0.0.4, you must manually update the vulnerability scanner extension using the steps below. This procedure also shows you how to check the version of the scanner currently deployed to your VMs.
165171

166-
1. Verify the version of the Qualys vulnerability scanner extension running on your VM:
172+
1. From the Azure portal, open **Virtual machines**.
167173

168-
1. From the Azure portal, open Virtual machines.
169-
1. Select the VM on which the agent is installed.
170-
1. From the sidebar navigation, open **Extensions** and select the following extension:
174+
1. Select the VM on which the extension is installed.
171175

172-
Name: **WindowsAgent.AzureSecurityCenter** Type: **Qualys.WindowsAgent.AzureSecurityCenter**
176+
1. From the sidebar navigation, open **Extensions** and select the following extension:
173177

174-
1. Review the version information of the extension.
178+
Name: **WindowsAgent.AzureSecurityCenter** Type: **Qualys.WindowsAgent.AzureSecurityCenter**
175179

176-
![Qualys agent extension version information](media/built-in-vulnerability-assessment/qualys-agent-extension-version.png)
180+
1. Review the version information of the extension.
177181

178-
1. If the version is 1.0.0.4, click **Uninstall** and wait until the extension is no longer listed in the VM's extensions page.
182+
![Qualys agent extension version information](media/built-in-vulnerability-assessment/qualys-agent-extension-version.png)
179183

180-
1. Restart the VM.
184+
1. If the version is 1.0.0.4, click **Uninstall** and wait until the extension is no longer listed in the VM's extensions page.
185+
186+
1. Restart the VM.
181187

182-
1. When the VM's status is "Running", deploy the extension as described above in [Deploying the Qualys built-in vulnerability scanner](#deploying-the-qualys-built-in-vulnerability-scanner).
188+
1. When the VM's status is "Running", deploy the extension as described above in [Deploying the Qualys built-in vulnerability scanner](#deploying-the-qualys-built-in-vulnerability-scanner).
189+
190+
183191

184192
### Why does my VM show as "not applicable" in the recommendation?
185193
The recommendation details page for the **"Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)"** recommendation groups your VMs in one or more of the following lists: **Healthy resources**, **Unhealthy resources**, and **Not applicable resources**.

articles/security-center/release-notes.md

Lines changed: 51 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.devlang: na
1010
ms.topic: conceptual
1111
ms.tgt_pltfrm: na
1212
ms.workload: na
13-
ms.date: 05/11/2020
13+
ms.date: 05/15/2020
1414
ms.author: memildin
1515

1616
---
@@ -28,6 +28,52 @@ This page is updated regularly, so revisit it often. If you're looking for items
2828

2929
## May 2020
3030

31+
32+
### Alert suppression rules (preview)
33+
34+
This new feature (currently in preview) helps reduce alert fatigue. Use rules to automatically hide alerts that are known to be innocuous or related to normal activities in your organization. This lets you focus on the most relevant threats.
35+
36+
Alerts that match your enabled suppression rules will still be generated, but their state will be set to dismissed. You can see the state in the Azure portal or however you access your Security Center security alerts.
37+
38+
Suppression rules define the criteria for which alerts should be automatically dismissed. Typically, you'd use a suppression rule to:
39+
40+
- suppress alerts that you've identified as false positives
41+
42+
- suppress alerts that are being triggered too often to be useful
43+
44+
[Learn more about suppressing alerts from Azure Security Center's threat protection](alerts-suppression-rules.md).
45+
46+
47+
### Virtual machine vulnerability assessment is now generally available
48+
49+
Security Center's standard tier now includes a built-in vulnerability assessment for virtual machines for no additional fee. This extension is powered by Qualys but reports its findings directly back to Security Center. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center.
50+
51+
The new solution can continuously scan your virtual machines to find vulnerabilities and present the findings in Security Center.
52+
53+
To deploy the solution, use the new security recommendation:
54+
55+
"Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)"
56+
57+
[Learn more](built-in-vulnerability-assessment.md).
58+
59+
60+
61+
### Alert suppression rules (preview)
62+
63+
This new feature (currently in preview) helps reduce alert fatigue. Use rules to automatically hide alerts that are known to be innocuous or related to normal activities in your organization. This lets you focus on the most relevant threats.
64+
65+
Alerts that match your enabled suppression rules will still be generated, but their state will be set to dismissed. You can see the state in the Azure portal or however you access your Security Center security alerts.
66+
67+
Suppression rules define the criteria for which alerts should be automatically dismissed. Typically, you'd use a suppression rule to:
68+
69+
- suppress alerts that you've identified as false positives
70+
71+
- suppress alerts that are being triggered too often to be useful
72+
73+
[Learn more about suppressing alerts from Azure Security Center's threat protection](alerts-suppression-rules.md).
74+
75+
76+
3177
### Changes to just-in-time (JIT) virtual machine (VM) access
3278

3379
Security Center includes an optional feature to protect the management ports of your VMs. This provides a defense against the most common form of brute force attacks.
@@ -78,7 +124,7 @@ The recommendations are:
78124
Learn more about security controls in [Enhanced secure score (preview) in Azure Security Center](secure-score-security-controls.md).
79125

80126

81-
### Custom policies with custom metadata generally available
127+
### Custom policies with custom metadata are now generally available
82128

83129
Custom policies are now part of the Security Center recommendations experience, secure score, and the regulatory compliance standards dashboard. This feature is now generally available and allows you to extend your organization's security assessment coverage in Security Center.
84130

@@ -91,7 +137,7 @@ We've now also added the option to edit the custom recommendation metadata. Meta
91137

92138
## April 2020
93139

94-
### Dynamic compliance packages now generally available
140+
### Dynamic compliance packages are now generally available
95141

96142
The Azure Security Center regulatory compliance dashboard now includes **dynamic compliance packages** (now generally available) to track additional industry and regulatory standards.
97143

@@ -193,7 +239,7 @@ These recommendations will no longer appear in the Security Center list of recom
193239

194240
## February 2020
195241

196-
### Fileless attack detection for Linux is now in preview
242+
### Fileless attack detection for Linux (preview)
197243

198244
As attackers increasing employ stealthier methods to avoid detection, Azure Security Center is extending fileless attack detection for Linux, in addition to Windows. Fileless attacks exploit software vulnerabilities, inject malicious payloads into benign system processes, and hide in memory. These techniques:
199245

@@ -205,7 +251,7 @@ To counter this threat, Azure Security Center released fileless attack detection
205251

206252
## January 2020
207253

208-
### Enhanced secure score
254+
### Enhanced secure score (preview)
209255

210256
An enhanced version of the secure score feature of Azure Security Center is now available in preview. In this version, multiple recommendations are grouped into Security Controls that better reflect your vulnerable attack surfaces (for example, restrict access to management ports).
211257

articles/security-center/security-center-vulnerability-assessment-recommendations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.author: memildin
1717
---
1818
# Vulnerability assessments for your Azure Virtual Machines
1919

20-
A core component of every cyber risk and security program is the identification and analysis of vulnerabilities. Azure Security Center's Standard pricing tier includes vulnerability scanning for your virtual machines at no extra cost. Additionally, Security Center can automatically deploy this tool for you. This feature is currently in preview.
20+
A core component of every cyber risk and security program is the identification and analysis of vulnerabilities. Azure Security Center's Standard pricing tier includes vulnerability scanning for your virtual machines at no extra cost. Additionally, Security Center can automatically deploy this tool for you.
2121

2222
Security Center presents one of two recommendations if it doesn't find a vulnerability assessment solution installed on a VM:
2323

@@ -28,4 +28,4 @@ Security Center presents one of two recommendations if it doesn't find a vulnera
2828
Security Center also offers vulnerability analysis for your:
2929

3030
* SQL databases - see [Explore vulnerability assessment reports in the vulnerability assessment dashboard](security-center-iaas-advanced-data.md#explore-vulnerability-assessment-reports)
31-
* Azure Container Registry images - see [Azure Container Registry integration with Security Center (Preview)](azure-container-registry-integration.md)
31+
* Azure Container Registry images - see [Azure Container Registry integration with Security Center](azure-container-registry-integration.md)

0 commit comments

Comments
 (0)