You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/release-notes.md
+12-1Lines changed: 12 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Release notes for Microsoft Defender for Cloud
3
3
description: A description of what's new and changed in Microsoft Defender for Cloud
4
4
ms.topic: overview
5
-
ms.date: 01/23/2023
5
+
ms.date: 01/29/2023
6
6
---
7
7
8
8
# What's new in Microsoft Defender for Cloud?
@@ -24,6 +24,7 @@ Updates in January include:
24
24
-[Cleanup of deleted Azure Arc machines in connected AWS and GCP accounts](#cleanup-of-deleted-azure-arc-machines-in-connected-aws-and-gcp-accounts)
25
25
-[Allow continuous export to Event Hub behind a firewall](#allow-continuous-export-to-event-hubs-behind-a-firewall)
26
26
-[The name of the Secure score control Protect your applications with Azure advanced networking solutions has been changed](#the-name-of-the-secure-score-control-protect-your-applications-with-azure-advanced-networking-solutions-has-been-changed)
27
+
-[The policy Vulnerability Assessment settings for SQL server should contain an email address to receive scan reports has been deprecated](#the-policy-vulnerability-assessment-settings-for-sql-server-should-contain-an-email-address-to-receive-scan-reports-has-been-deprecated)
27
28
28
29
### New version of the recommendation to find missing system updates (Preview)
29
30
@@ -58,6 +59,12 @@ The secure score control, `Protect your applications with Azure advanced network
58
59
59
60
The updated name is reflected on Azure Resource Graph (ARG), Secure Score Controls API and the `Download CSV report`.
60
61
62
+
### The policy Vulnerability Assessment settings for SQL server should contain an email address to receive scan reports has been deprecated
63
+
64
+
The policy [`Vulnerability Assessment settings for SQL server should contain an email address to receive scan reports`](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F057d6cfe-9c4f-4a6d-bc60-14420ea1f1a9) has been deprecated.
65
+
66
+
The Defender for SQL vulnerability assessment email report is still available and existing email configurations have not changed.
67
+
61
68
## December 2022
62
69
63
70
Updates in December include:
@@ -408,3 +415,7 @@ Defender for Container's vulnerability assessment (VA) now includes detailed pac
408
415
This detailed package information is available for new scans of images.
409
416
410
417
:::image type="content" source="media/release-notes/mdc-container-va-package-information.png" alt-text="Screenshot of the package information for container vulnerabilities." lightbox="media/release-notes/mdc-container-va-package-information.png":::
418
+
419
+
## Next steps
420
+
421
+
For past changes to Defender for Cloud, see [Archive for what's new in Defender for Cloud?](release-notes-archive.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/upcoming-changes.md
+1-10Lines changed: 1 addition & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Important changes coming to Microsoft Defender for Cloud
3
3
description: Upcoming changes to Microsoft Defender for Cloud that you might need to be aware of and for which you might need to plan
4
4
ms.topic: overview
5
-
ms.date: 01/22/2023
5
+
ms.date: 01/29/2023
6
6
---
7
7
8
8
# Important upcoming changes to Microsoft Defender for Cloud
@@ -20,7 +20,6 @@ If you're looking for the latest release notes, you'll find them in the [What's
20
20
|--|--|
21
21
|[Recommendation to find vulnerabilities in running container images to be released for General Availability (GA)](#recommendation-to-find-vulnerabilities-in-running-container-images-to-be-released-for-general-availability-ga)| January 2023 |
22
22
|[Recommendation to enable diagnostic logs for Virtual Machine Scale Sets to be deprecated](#recommendation-to-enable-diagnostic-logs-for-virtual-machine-scale-sets-to-be-deprecated)| January 2023 |
23
-
|[The policy Vulnerability Assessment settings for SQL server should contain an email address to receive scan reports is set to be deprecated](#the-policy-vulnerability-assessment-settings-for-sql-server-should-contain-an-email-address-to-receive-scan-reports-is-set-to-be-deprecated)| January 2023 |
24
23
|[Deprecation and improvement of selected alerts for Windows and Linux Servers](#deprecation-and-improvement-of-selected-alerts-for-windows-and-linux-servers)| April 2023 |
25
24
26
25
### Recommendation to enable diagnostic logs for Virtual Machine Scale Sets to be deprecated
@@ -35,14 +34,6 @@ The related [policy definition](https://portal.azure.com/#view/Microsoft_Azure_P
35
34
|--|--|--|
36
35
| Diagnostic logs in Virtual Machine Scale Sets should be enabled | Enable logs and retain them for up to a year, enabling you to recreate activity trails for investigation purposes when a security incident occurs or your network is compromised. | Low |
37
36
38
-
### The policy Vulnerability Assessment settings for SQL server should contain an email address to receive scan reports is set to be deprecated
39
-
40
-
**Estimated date for change: January 2023**
41
-
42
-
The policy [`Vulnerability Assessment settings for SQL server should contain an email address to receive scan reports`](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F057d6cfe-9c4f-4a6d-bc60-14420ea1f1a9) is set to be deprecated.
43
-
44
-
The Defender for SQL vulnerability assessment email report will still be available and existing email configurations won't change after the policy is deprecated.
45
-
46
37
### Recommendation to find vulnerabilities in running container images to be released for General Availability (GA)
0 commit comments