You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/alert-validation.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -158,7 +158,7 @@ You can also learn more about defending your Kubernetes nodes and clusters with
158
158
159
159
### Simulate alerts for App Service
160
160
161
-
You can simulate alerts for resources running on [App Service](https://learn.microsoft.com/azure/app-service/overview).
161
+
You can simulate alerts for resources running on [App Service](/azure/app-service/overview).
162
162
163
163
1. Create a new website and wait 24 hours for it to be registered with Defender for Cloud, or use an existing web site.
164
164
@@ -167,7 +167,7 @@ You can simulate alerts for resources running on [App Service](https://learn.mic
167
167
168
168
:::image type="content" source="media/alert-validation/copy-default-domain.png" alt-text="Screenshot showing where to copy the default domain." lightbox="media/alert-validation/copy-default-domain.png":::
169
169
170
-
1. Copy the website name into the URL: **https://<website name>.azurewebsites.net/This_Will_Generate_ASC_Alert**.
170
+
1. Copy the website name into the URL: `https://<website name>.azurewebsites.net/This_Will_Generate_ASC_Alert`.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/azure-devops-extension.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -124,9 +124,9 @@ The pipeline will run for a few minutes and save the results.
124
124
125
125
## Learn more
126
126
127
-
- Learn how to [create your first pipeline](/azure/devops/pipelines/create-first-pipeline?view=azure-devops&tabs=java%2Ctfs-2018-2%2Cbrowser).
127
+
- Learn how to [create your first pipeline](/azure/devops/pipelines/create-first-pipeline).
128
128
129
-
- Learn how to [deploy pipelines to Azure](/azure/devops/pipelines/overview-azure?toc=%2Fazure%2Fdevops%2Fcross-service%2Ftoc.json&bc=%2Fazure%2Fdevops%2Fcross-service%2Fbreadcrumb%2Ftoc.json&view=azure-devops).
129
+
- Learn how to [deploy pipelines to Azure](/azure/devops/pipelines/overview-azure).
-**Scanning OS packages** - container vulnerability assessment has the ability to scan vulnerabilities in packages installed by the OS package manager in Linux. See the [full list of the supported OS and their versions](support-agentless-containers-posture.md#registries-and-images).
81
81
-**Language specific packages** – support for language specific packages and files, and their dependencies installed or copied without the OS package manager. See the [complete list of supported languages](support-agentless-containers-posture.md#registries-and-images).
82
-
-**Image scanning in Azure Private Link** - Azure container vulnerability assessment provides the ability to scan images in container registries that are accessible via Azure Private Links. This capability requires access to trusted services and authentication with the registry. Learn how to [connect privately to an Azure container registry using Azure Private Link](https://learn.microsoft.com/azure/container-registry/container-registry-private-link#set-up-private-endpoint---portal-recommended).
82
+
-**Image scanning in Azure Private Link** - Azure container vulnerability assessment provides the ability to scan images in container registries that are accessible via Azure Private Links. This capability requires access to trusted services and authentication with the registry. Learn how to [connect privately to an Azure container registry using Azure Private Link](/azure/container-registry/container-registry-private-link#set-up-private-endpoint---portal-recommended).
83
83
-**Gaining intel for existing exploits of a vulnerability** - While vulnerability reporting tools can report the ever growing volume of vulnerabilities, the capacity to efficiently remediate them remains a challenge;teams. These tools typically prioritize their remediation processes according to the severity of the vulnerability. MDVM provides additional context on the risk related with each vulnerability, leveraging intelligent assessment and risk-based prioritization against industry security benchmarks, based on three data sources: [exploit DB](https://www.exploit-db.com/), [CISA KEV](https://www.cisa.gov/known-exploited-vulnerabilities-catalog), and [MSRC](https://www.microsoft.com/msrc?SilentAuth=1&wa=wsignin1.0)
84
84
-**Reporting** - Defender for Containers powered by Microsoft Defender Vulnerability Management (MDVM) reports the vulnerabilities as the following recommendation:
85
85
86
86
| Recommendation | Description |
87
87
|--|--|
88
88
| Container registry images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management) | Container image vulnerability assessment scans your registry for security vulnerabilities and exposes detailed findings for each image. Resolving the vulnerabilities can greatly improve your containers' security posture and protect them from attacks. |
89
89
90
-
-**Query vulnerability information via the Azure Resource Graph** - Ability to query vulnerability information via the [Azure Resource Graph](https://learn.microsoft.com/azure/governance/resource-graph/overview#how-resource-graph-complements-azure-resource-manager). Learn how to [query recommendations via the ARG](review-security-recommendations.md#review-recommendation-data-in-azure-resource-graph-arg).
91
-
-**Query vulnerability information via sub-assessment API** - You can get scan results via REST API. See the [sub-assessment list](https://learn.microsoft.com/rest/api/defenderforcloud/sub-assessments/get?tabs=HTTP).
90
+
-**Query vulnerability information via the Azure Resource Graph** - Ability to query vulnerability information via the [Azure Resource Graph](/azure/governance/resource-graph/overview#how-resource-graph-complements-azure-resource-manager). Learn how to [query recommendations via the ARG](review-security-recommendations.md#review-recommendation-data-in-azure-resource-graph-arg).
91
+
-**Query vulnerability information via sub-assessment API** - You can get scan results via REST API. See the [sub-assessment list](/rest/api/defenderforcloud/sub-assessments/get?tabs=HTTP).
Learn more about [Configuring deployment credentials for Azure App Service](../app-service/deploy-configure-credentials.md) and [Get publish settings from Azure and import into Visual Studio](/visualstudio/deployment/tutorial-import-publish-settings-azure?view=vs-2019).
213
+
Learn more about [Configuring deployment credentials for Azure App Service](../app-service/deploy-configure-credentials.md) and [Get publish settings from Azure and import into Visual Studio](/visualstudio/deployment/tutorial-import-publish-settings-azure).
214
214
215
215
### CSCAN-AZURE0100
216
216
217
217
Azure DevOps Personal Access Token
218
218
219
219
**Sample**: `URL="org.visualstudio.com/proj"; PAT = "ntpi2ch67ci2vjzcohglogyygwo5fuyl365n2zdowwxhsys6jnoa"` <br> `URL="dev.azure.com/org/proj"; PAT = "ntpi2ch67ci2vjzcohglogyygwo5fuyl365n2zdowwxhsys6jnoa"`
220
220
221
-
Learn more about [Using personal access tokens](/azure/devops/organizations/accounts/use-personal-access-tokens-to-authenticate?view=azure-devops&tabs=Windows).
221
+
Learn more about [Using personal access tokens](/azure/devops/organizations/accounts/use-personal-access-tokens-to-authenticate).
Learn more about [Getting your function access keys](../azure-functions/functions-how-to-use-azure-function-app-settings.md#get-your-function-access-keys) and [Function access keys](https://learn.microsoft.com/azure/azure-functions/functions-bindings-http-webhook-trigger?tabs=in-process%2Cfunctionsv2&pivots=programming-language-csharp#authorization-keys)
237
+
Learn more about [Getting your function access keys](../azure-functions/functions-how-to-use-azure-function-app-settings.md#get-your-function-access-keys) and [Function access keys](/azure/azure-functions/functions-bindings-http-webhook-trigger?tabs=in-process%2Cfunctionsv2&pivots=programming-language-csharp#authorization-keys)
Learn more about [Getting your function access keys](../azure-functions/functions-how-to-use-azure-function-app-settings.md#get-your-function-access-keys) and [Function access keys](https://learn.microsoft.com/azure/azure-functions/functions-bindings-http-webhook-trigger?tabs=in-process%2Cfunctionsv2&pivots=programming-language-csharp#authorization-keys).
245
+
Learn more about [Getting your function access keys](../azure-functions/functions-how-to-use-azure-function-app-settings.md#get-your-function-access-keys) and [Function access keys](/azure/azure-functions/functions-bindings-http-webhook-trigger?tabs=in-process%2Cfunctionsv2&pivots=programming-language-csharp#authorization-keys).
Learn more about [HttpRequestHeaders.Authorization Property](/dotnet/api/system.net.http.headers.httprequestheaders.authorization?view=netframework-4.8).
446
+
Learn more about [HttpRequestHeaders.Authorization Property](/dotnet/api/system.net.http.headers.httprequestheaders.authorization).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-cloud-glossary.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -146,7 +146,7 @@ This glossary provides a brief description of important terms and concepts for t
146
146
147
147
| Term | Description | Learn more |
148
148
|--|--|--|
149
-
|**SAS**| Shared access signature that provides secure delegated access to resources in your storage account.|[Storage SAS Overview (https://learn.microsoft.com/azure/storage/common/storage-sas-overview)|
149
+
|**SAS**| Shared access signature that provides secure delegated access to resources in your storage account.|[Storage SAS Overview](/azure/storage/common/storage-sas-overview)|
150
150
|**SaaS**| Software as a service (SaaS) allows users to connect to and use cloud-based apps over the Internet. Common examples are email, calendaring, and office tools (such as Microsoft Office 365). SaaS provides a complete software solution that you purchase on a pay-as-you-go basis from a cloud service provider.|[What is SaaS?](https://azure.microsoft.com/resources/cloud-computing-dictionary/what-is-saas/)|
151
151
|**Secure Score**|Defender for Cloud continually assesses your cross-cloud resources for security issues. It then aggregates all the findings into a single score that represents your current security situation: the higher the score, the lower the identified risk level.|[Security posture for Microsoft Defender for Cloud](secure-score-security-controls.md)|
152
152
|**Security Alerts**|Security alerts are the notifications generated by Defender for Cloud and Defender for Cloud plans when threats are identified in your cloud, hybrid, or on-premises environment.|[What are security alerts?](../defender-for-cloud/alerts-overview.md#what-are-security-alerts)|
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-devops-introduction.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,7 @@ Defender for DevOps uses a central console to empower security teams with the ab
21
21
Defender for DevOps helps unify, strengthen and manage multi-pipeline DevOps security.
22
22
23
23
## Availability
24
+
24
25
> [!Note]
25
26
> During the preview, the maximum number of GitHub repositories that can be onboarded to Microsoft Defender for Cloud is 2,000. If you try to connect more than 2,000 GitHub repositories, only the first 2,000 repositories, sorted alphabetically, will be onboarded.
26
27
>
@@ -87,7 +88,7 @@ On this part of the screen you see:
87
88
88
89
- Learn about [security in DevOps](/devops/operate/security-in-devops).
89
90
90
-
- You can learn about [securing Azure Pipelines](/azure/devops/pipelines/security/overview?view=azure-devops).
91
+
- You can learn about [securing Azure Pipelines](/azure/devops/pipelines/security/overview).
91
92
92
93
- Learn about [security hardening practices for GitHub Actions](https://docs.github.com/actions/security-guides/security-hardening-for-github-actions).
0 commit comments