You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-storage-introduction.md
+13-32Lines changed: 13 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,18 +1,19 @@
1
1
---
2
-
title: Microsoft Defender for Storage - the benefits and features
2
+
title: Microsoft Defender for Storage - the benefits and features
3
+
titleSuffix: Microsoft Defender for Cloud
3
4
description: Learn about the benefits and features of Microsoft Defender for Storage.
4
-
ms.date: 06/29/2022
5
+
ms.date: 07/12/2022
5
6
ms.topic: overview
6
7
---
7
8
# Overview of Microsoft Defender for Storage
8
9
9
10
**Microsoft Defender for Storage** is an Azure-native layer of security intelligence that detects unusual and potentially harmful attempts to access or exploit your storage accounts. It uses advanced threat detection capabilities and [Microsoft Threat Intelligence](https://go.microsoft.com/fwlink/?linkid=2128684) data to provide contextual security alerts. Those alerts also include steps to mitigate the detected threats and prevent future attacks.
10
11
11
-
You can enable **Microsoft Defender for Storage** at either the subscription level (recommended) or the resource level.
12
+
You can [enable Microsoft Defender for Storage](../storage/common/azure-defender-storage-configure.md#set-up-microsoft-defender-for-cloud) at either the subscription level (recommended) or the resource level.
12
13
13
-
Defender for Storage continually analyzes the telemetry stream generated by the Azure Blob Storage and Azure Files services. When potentially malicious activities are detected, security alerts are generated. These alerts are displayed in Microsoft Defender for Cloud together with the details of the suspicious activity along with the relevant investigation steps, remediation actions, and security recommendations.
14
+
Defender for Storage continually analyzes the telemetry stream generated by the [Azure Blob Storage](https://azure.microsoft.com/services/storage/blobs/) and Azure Files services. When potentially malicious activities are detected, security alerts are generated. These alerts are displayed in Microsoft Defender for Cloud, together with the details of the suspicious activity along with the relevant investigation steps, remediation actions, and security recommendations.
14
15
15
-
Analyzed telemetry of Azure Blob Storage includes operation types such as **Get Blob**, **Put Blob**, **Get Container ACL**, **List Blobs**, and **Get Blob Properties**. Examples of analyzed Azure Files operation types include **Get File**, **Create File**, **List Files**, **Get File Properties**, and **Put Range**.
16
+
Analyzed telemetry of Azure Blob Storage includes operation types such as `Get Blob`, `Put Blob`, `Get Container ACL`, `List Blobs`, and `Get Blob Properties`. Examples of analyzed Azure Files operation types include `Get File`, C`reate File`, `List Files`, `Get File Properties`, and `Put Range`.
16
17
17
18
Defender for Storage doesn't access the Storage account data and has no impact on its performance.
18
19
@@ -28,14 +29,14 @@ You can learn more by watching this video from the Defender for Cloud in the Fie
28
29
|Protected storage types:|[Blob Storage](https://azure.microsoft.com/services/storage/blobs/) (Standard/Premium StorageV2, Block Blobs) <br>[Azure Files](../storage/files/storage-files-introduction.md) (over REST API and SMB)<br>[Azure Data Lake Storage Gen2](../storage/blobs/data-lake-storage-introduction.md) (Standard/Premium accounts with hierarchical namespaces enabled)|
## What are the benefits of Microsoft Defender for Storage?
34
33
35
34
Defender for Storage provides:
36
35
37
36
-**Azure-native security** - With 1-click enablement, Defender for Storage protects data stored in Azure Blob, Azure Files, and Data Lakes. As an Azure-native service, Defender for Storage provides centralized security across all data assets that are managed by Azure and is integrated with other Azure security services such as Microsoft Sentinel.
37
+
38
38
-**Rich detection suite** - Powered by Microsoft Threat Intelligence, the detections in Defender for Storage cover the top storage threats such as unauthenticated access, compromised credentials, social engineering attacks, data exfiltration, privilege abuse, and malicious content.
39
+
39
40
-**Response at scale** - Defender for Cloud's automation tools make it easier to prevent and respond to identified threats. Learn more in [Automate responses to Defender for Cloud triggers](workflow-automation.md).
40
41
41
42
:::image type="content" source="media/defender-for-storage-introduction/defender-for-storage-high-level-overview.png" alt-text="High-level overview of the features of Microsoft Defender for Storage.":::
@@ -62,6 +63,8 @@ Security alerts are triggered for the following scenarios (typically from 1-2 ho
62
63
|**Public visibility**| Potential break-in attempts by scanning containers and pulling potentially sensitive data from publicly accessible containers. |
63
64
|**Phishing campaigns**| When content that's hosted on Azure Storage is identified as part of a phishing attack that's impacting Microsoft 365 users. |
64
65
66
+
You can check out [the full list of Microsoft Defender for Storage alerts](alerts-reference.md#alerts-azurestorage).
67
+
65
68
Alerts include details of the incident that triggered them, and recommendations on how to investigate and remediate threats. Alerts can be exported to Microsoft Sentinel or any other third-party SIEM or any other external tool. Learn more in [Stream alerts to a SIEM, SOAR, or IT Service Management solution](export-to-siem.md).
66
69
67
70
> [!TIP]
@@ -77,27 +80,11 @@ Alerts include details of the incident that triggered them, and recommendations
77
80
> [!TIP]
78
81
> When a file is suspected to contain malware, Defender for Cloud displays an alert and can optionally email the storage owner for approval to delete the suspicious file. To set up this automatic removal of files that hash reputation analysis indicates contain malware, deploy a [workflow automation to trigger on alerts that contain "Potential malware uploaded to a storage account”](https://techcommunity.microsoft.com/t5/azure-security-center/how-to-respond-to-potential-malware-uploaded-to-azure-storage/ba-p/1452005).
79
82
80
-
81
-
## Enable Defender for Storage
82
-
83
-
When you enable this Defender plan on a subscription, all existing Azure Storage accounts will be protected and any storage resources added to that subscription in the future will also be automatically protected.
84
-
85
-
You can enable Defender for Storage in any of several ways, described in [Set up Microsoft Defender for Cloud](../storage/common/azure-defender-storage-configure.md#set-up-microsoft-defender-for-cloud) in the Azure Storage documentation.
86
-
87
83
## FAQ - Microsoft Defender for Storage
88
84
89
-
-[Overview of Microsoft Defender for Storage](#overview-of-microsoft-defender-for-storage)
90
-
-[Availability](#availability)
91
-
-[What are the benefits of Microsoft Defender for Storage?](#what-are-the-benefits-of-microsoft-defender-for-storage)
92
-
-[Security threats in cloud-based storage services](#security-threats-in-cloud-based-storage-services)
93
-
-[What kind of alerts does Microsoft Defender for Storage provide?](#what-kind-of-alerts-does-microsoft-defender-for-storage-provide)
94
-
-[Limitations of hash reputation analysis](#limitations-of-hash-reputation-analysis)
95
-
-[Enable Defender for Storage](#enable-defender-for-storage)
96
-
-[FAQ - Microsoft Defender for Storage](#faq---microsoft-defender-for-storage)
97
-
-[How do I estimate charges at the account level?](#how-do-i-estimate-charges-at-the-account-level)
98
-
-[Can I exclude a specific Azure Storage account from a protected subscription?](#can-i-exclude-a-specific-azure-storage-account-from-a-protected-subscription)
99
-
-[How do I configure automatic responses for security alerts?](#how-do-i-configure-automatic-responses-for-security-alerts)
100
-
-[Next steps](#next-steps)
85
+
-[How do I estimate charges at the account level?](#how-do-i-estimate-charges-at-the-account-level)
86
+
-[Can I exclude a specific Azure Storage account from a protected subscription?](#can-i-exclude-a-specific-azure-storage-account-from-a-protected-subscription)
87
+
-[How do I configure automatic responses for security alerts?](#how-do-i-configure-automatic-responses-for-security-alerts)
101
88
102
89
### How do I estimate charges at the account level?
103
90
@@ -118,15 +105,9 @@ For example, you can set up automation to open tasks or tickets for specific per
118
105
119
106
Use automation for automatic response - to define your own or use ready-made automation from the community (such as removing malicious files upon detection). For more solutions, visit the Microsoft community on GitHub.
120
107
121
-
122
-
123
108
## Next steps
124
109
125
110
In this article, you learned about Microsoft Defender for Storage.
126
111
127
112
> [!div class="nextstepaction"]
128
113
> [Enable Defender for Storage](enable-enhanced-security.md)
129
-
130
-
-[The full list of Microsoft Defender for Storage alerts](alerts-reference.md#alerts-azurestorage)
131
-
-[Stream alerts to a SIEM, SOAR, or IT Service Management solution](export-to-siem.md)
132
-
-[Save Storage telemetry for investigation](../azure-monitor/essentials/diagnostic-settings.md)
0 commit comments