You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/continuous-export.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: dacurwin
6
6
ms.topic: how-to
7
7
ms.date: 06/19/2023
8
8
---
9
-
# Continuously export Microsoft Defender for Cloud data
9
+
# Continuously export Microsoft Defender for Cloud data
10
10
11
11
Microsoft Defender for Cloud generates detailed security alerts and recommendations. To analyze the information in these alerts and recommendations, you can export them to Azure Log Analytics, Event Hubs, or to another [SIEM, SOAR, or IT classic deployment model solution](export-to-siem.md). You can stream the alerts and recommendations as they're generated or define a schedule to send periodic snapshots of all of the new data.
12
12
@@ -122,7 +122,7 @@ Automating your organization's monitoring and incident response processes can gr
122
122
123
123
To deploy your continuous export configurations across your organization, use the supplied Azure Policy 'DeployIfNotExist' policies to create and configure continuous export procedures.
124
124
125
-
**To implement these policies**
125
+
**To implement these policies**:
126
126
127
127
1. Select the policy you want to apply from this table:
128
128
@@ -136,7 +136,7 @@ To deploy your continuous export configurations across your organization, use th
> 2. From the Azure Policy menu, select **Definitions** and search for them by name.
139
+
> 1. From the Azure Policy menu, select **Definitions** and search for them by name.
140
140
141
141
1. From the relevant Azure Policy page, select **Assign**.
142
142
:::image type="content" source="./media/continuous-export/export-policy-assign.png" alt-text="Assigning the Azure Policy.":::
@@ -182,7 +182,7 @@ To export data to an Azure Event Hubs or Log Analytics workspace in a different
182
182
1. In the tenant that has the Azure Event Hubs or Log Analytics workspace, [invite a user](../active-directory/external-identities/what-is-b2b.md#easily-invite-guest-users-from-the-azure-portal) from the tenant that hosts the continuous export configuration, or alternatively configure Azure Lighthouse for the source and destination tenant.
183
183
1. If using Microsoft Entra B2B Guest access, ensure that the user accepts the invitation to access the tenant as a guest.
184
184
1. If you're using a Log Analytics Workspace, assign the user in the workspace tenant one of these roles: Owner, Contributor, Log Analytics Contributor, Sentinel Contributor, or Monitoring Contributor.
185
-
1. Create and submit the request to the Azure REST API to configure the required resources. You'll need to manage the bearer tokens in both the context of the local (workspace) and the remote (continuous export) tenant.
185
+
1. Create and submit the request to the Azure REST API to configure the required resources. You'll need to manage the bearer tokens in both the context of the local (workspace) and the remote (continuous export) tenant.
186
186
187
187
## Continuously export to an event hub behind a firewall
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/custom-dashboards-azure-workbooks.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -256,8 +256,8 @@ To move workbooks that you've built in other Azure services into your Microsoft
256
256
257
257
1. Enter the required details for saving the workbook:
258
258
1. A name for the workbook
259
-
2. The desired region
260
-
3. Subscription, resource group, and sharing as appropriate.
259
+
1. The desired region
260
+
1. Subscription, resource group, and sharing as appropriate.
261
261
262
262
You'll find your saved workbook in the **Recently modified workbooks** category.
263
263
@@ -268,5 +268,3 @@ This article described Defender for Cloud's integrated Azure Workbooks page with
268
268
- Learn more about [Azure Workbooks](../azure-monitor/visualize/workbooks-overview.md)
269
269
270
270
- The built-in workbooks pull their data from Defender for Cloud's recommendations. Learn about the many security recommendations in [Security recommendations - a reference guide](recommendations-reference.md)
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-apis-posture.md
+10-8Lines changed: 10 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.date: 11/02/2023
9
9
---
10
10
# Investigate API findings, recommendations, and alerts
11
11
12
-
This article describes how to investigate API security findings, alerts, and security posture recommendations for APIs protected by [Microsoft Defender for APIs](defender-for-apis-introduction.md).
12
+
This article describes how to investigate API security findings, alerts, and security posture recommendations for APIs protected by [Microsoft Defender for APIs](defender-for-apis-introduction.md).
13
13
14
14
## Before you start
15
15
@@ -35,14 +35,16 @@ This article describes how to investigate API security findings, alerts, and sec
35
35
:::image type="content" source="media/defender-for-apis-posture/resource-health.png" alt-text="Screenshot that shows the health of an endpoint." lightbox="media/defender-for-apis-posture/resource-health.png":::
36
36
37
37
## Remediate recommendations using Workflow Automation
38
-
You can remediate recommendations generated by Defender for APIs using workflow automations.
38
+
39
+
You can remediate recommendations generated by Defender for APIs using workflow automations.
40
+
39
41
1. In an eligible recommendation, select one or more unhealthy resources.
40
-
2. Select **Trigger logic app**.
41
-
3. Confirm the **Selected subscription**.
42
-
4. Select a relevant logic app from the list.
43
-
5. Select **Trigger**.
42
+
1. Select **Trigger logic app**.
43
+
1. Confirm the **Selected subscription**.
44
+
1. Select a relevant logic app from the list.
45
+
1. Select **Trigger**.
44
46
45
-
You can browse the [Microsoft Defender for Cloud GitHub](https://github.com/Azure/Microsoft-Defender-for-Cloud/tree/main/Workflow%20automation/Defender%20for%20API) repository for available workflow automation.
47
+
You can browse the [Microsoft Defender for Cloud GitHub](https://github.com/Azure/Microsoft-Defender-for-Cloud/tree/main/Workflow%20automation/Defender%20for%20API) repository for available workflow automation.
46
48
47
49
## Create sample security alerts
48
50
@@ -59,7 +61,7 @@ In Defender CSPM, [Cloud Security Graph](concept-attack-path.md) collects data t
59
61
When the Defender CSPM plan is enabled together with Defender for APIs, you can use Cloud Security Explorer to identify, review and analyze API security risks across your organization.
60
62
61
63
1. In the Defender for Cloud portal, select **Cloud Security Explorer**.
62
-
1. In **What would you like to search?** select the **APIs** category.
64
+
1. In **What would you like to search?** select the **APIs** category.
63
65
1. Review the search results so that you can review, prioritize, and fix any API issues.
64
66
1. Alternatively, you can select one of the templated API queries to see high risk issues like **Internet exposed API endpoints with sensitive data** or **APIs communicating over unencrypted protocols with unauthenticated API endpoints**
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/iac-template-mapping.md
+18-16Lines changed: 18 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,8 @@ ms.topic: how-to
6
6
ms.custom: ignite-2023
7
7
---
8
8
9
-
# Map Infrastructure as Code Templates to Cloud Resources
9
+
# Map Infrastructure as Code templates to cloud resources
10
+
10
11
Mapping Infrastructure as Code (IaC) templates to cloud resources ensures consistent, secure, and auditable infrastructure provisioning. It enables rapid response to security threats and a security-by-design approach. If there are misconfigurations in runtime resources, this mapping allows remediation at the template level, ensuring no drift and facilitating deployment via CI/CD methodology.
11
12
12
13
## Prerequisites
@@ -18,26 +19,27 @@ To allow Microsoft Defender for Cloud to map Infrastructure as Code template to
- Configure your Azure Pipelines to run [Microsoft Security DevOps Azure DevOps extension](azure-devops-extension.md).
20
21
- Tag your supported Infrastructure as Code templates and your cloud resources. (Open-source tools like [Yor_trace](https://github.com/bridgecrewio/yor) can be used to automatically tag Infrastructure as Code templates)
> Microsoft Defender for Cloud will only use the following tags from Infrastructure as Code templates for mapping:
28
+
27
29
> - yor_trace
28
30
> - mapping_tag
29
31
30
-
## See the mapping between your IaC template and your cloud resources
32
+
## See the mapping between your IaC template and your cloud resources
31
33
32
34
To see the mapping between your IaC template and your cloud resources in the [Cloud Security Explorer](how-to-manage-cloud-security-explorer.md):
33
35
34
36
1. Sign in to the [Azure portal](https://portal.azure.com/).
35
-
2. Go to **Microsoft Defender for Cloud** > **Cloud Security Explorer**.
36
-
3. Search for and select all your cloud resources from the drop-down menu.
37
-
4. Select + to add other filters to your query.
38
-
5. Add the subfilter **Provisioned by** from the category **Identity & Access**.
39
-
6. Select **Code repositories** from the category **DevOps**.
40
-
7. After building your query, select **Search** to run the query.
37
+
1. Go to **Microsoft Defender for Cloud** > **Cloud Security Explorer**.
38
+
1. Search for and select all your cloud resources from the drop-down menu.
39
+
1. Select + to add other filters to your query.
40
+
1. Add the subfilter **Provisioned by** from the category **Identity & Access**.
41
+
1. Select **Code repositories** from the category **DevOps**.
42
+
1. After building your query, select **Search** to run the query.
41
43
42
44
Alternatively, you can use the built-in template named “Cloud resources provisioned by IaC templates with high severity misconfigurations”.
43
45
@@ -50,11 +52,11 @@ Alternatively, you can use the built-in template named “Cloud resources provis
50
52
51
53
To create sample IaC mapping tags within your code repositories, follow these steps:
52
54
53
-
1. Add an **IaC template with tags** to your repository. To use an example template, see [here](https://github.com/microsoft/security-devops-azdevops/tree/main/samples/IaCMapping).
54
-
2. Select **save**to commit directly to the main branch or create a new branch for this commit.
55
-
3. Include the **Microsoft Security DevOps** task in your Azure pipeline.
56
-
4. Verify that the **pipeline logs** show a finding saying **“An IaC tag(s) was found on this resource”**. This means that Defender for Cloud successfully discovered tags.
55
+
1. Add an **IaC template with tags** to your repository. To use an example template, see [here](https://github.com/microsoft/security-devops-azdevops/tree/main/samples/IaCMapping).
56
+
1. Select **save**to commit directly to the main branch or create a new branch for this commit.
57
+
1. Include the **Microsoft Security DevOps** task in your Azure pipeline.
58
+
1. Verify that the **pipeline logs** show a finding saying **“An IaC tag(s) was found on this resource”**. This means that Defender for Cloud successfully discovered tags.
57
59
58
60
## Next steps
59
61
60
-
- Learn more about [DevOps security in Defender for Cloud](defender-for-devops-introduction.md).
62
+
- Learn more about [DevOps security in Defender for Cloud](defender-for-devops-introduction.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/iac-vulnerabilities.md
+21-23Lines changed: 21 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,5 @@
1
1
---
2
2
title: Discover misconfigurations in Infrastructure as Code
3
-
4
3
description: Learn how to use DevOps security in Defender for Cloud to discover misconfigurations in Infrastructure as Code (IaC)
5
4
ms.date: 01/24/2023
6
5
ms.topic: how-to
@@ -20,9 +19,9 @@ Once you have set up the Microsoft Security DevOps GitHub action or Azure DevOps
20
19
21
20
## Configure IaC scanning and view the results in GitHub
22
21
23
-
1. Sign in to [GitHub](https://www.github.com).
22
+
1. Sign in to [GitHub](https://www.github.com).
24
23
25
-
1. Navigate to **`your repository's home page`** > **.github/workflows** > **msdevopssec.yml** that was created in the [prerequisites](github-action.md#configure-the-microsoft-security-devops-github-action-1).
24
+
1. Navigate to **`your repository's home page`** > **.github/workflows** > **msdevopssec.yml** that was created in the [prerequisites](github-action.md#configure-the-microsoft-security-devops-github-action-1).
26
25
27
26
1. Select **Edit file**.
28
27
@@ -35,26 +34,26 @@ Once you have set up the Microsoft Security DevOps GitHub action or Azure DevOps
35
34
categories: 'IaC'
36
35
```
37
36
38
-
> [!NOTE]
37
+
> [!NOTE]
39
38
> Categories are case sensitive.
40
39
:::image type="content" source="media/tutorial-iac-vulnerabilities/add-to-yaml.png" alt-text="Screenshot that shows the information that needs to be added to the yaml file.":::
41
40
42
-
1. Select **Start Commit**
41
+
1. Select **Start Commit**.
43
42
44
43
1. Select **Commit changes**.
45
44
46
-
:::image type="content" source="media/tutorial-iac-vulnerabilities/commit-change.png" alt-text="Screenshot that shows where to select commit change on the githib page.":::
45
+
:::image type="content" source="media/tutorial-iac-vulnerabilities/commit-change.png" alt-text="Screenshot that shows where to select commit change on the GitHub page.":::
47
46
48
47
1. (Optional) Add an IaC template to your repository. Skip if you already have an IaC template in your repository.
49
48
50
49
For example, [commit an IaC template to deploy a basic Linux web application](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.web/webapp-basic-linux) to your repository.
51
50
52
51
1. Select `azuredeploy.json`.
53
-
52
+
54
53
:::image type="content" source="media/tutorial-iac-vulnerabilities/deploy-json.png" alt-text="Screenshot that shows where the azuredeploy.json file is located.":::
55
54
56
-
1. Select **Raw**
57
-
55
+
1. Select **Raw**.
56
+
58
57
1. Copy all the information in the file.
59
58
60
59
```json
@@ -129,33 +128,32 @@ Once you have set up the Microsoft Security DevOps GitHub action or Azure DevOps
129
128
]
130
129
}
131
130
```
132
-
131
+
133
132
1. On GitHub, navigate to your repository.
134
-
133
+
135
134
1. **Select Add file** > **Create new file**.
136
-
135
+
137
136
:::image type="content" source="media/tutorial-iac-vulnerabilities/create-file.png" alt-text="Screenshot that shows you where to navigate to, to create a new file." lightbox="media/tutorial-iac-vulnerabilities/create-file.png":::
138
137
139
138
1. Enter a name for the file.
140
-
139
+
141
140
1. Paste the copied information into the file.
142
-
141
+
143
142
1. Select **Commit new file**.
144
-
143
+
145
144
The file is now added to your repository.
146
145
147
146
:::image type="content" source="media/tutorial-iac-vulnerabilities/file-added.png" alt-text="Screenshot that shows that the new file you created has been added to your repository.":::
148
147
149
-
150
148
1. Confirm the Microsoft Security DevOps scan completed:
151
-
1. Select **Actions**.
152
-
2. Select the workflow to see the results.
149
+
1. Select **Actions**.
150
+
1. Select the workflow to see the results.
153
151
154
152
1. Navigate to **Security** > **Code scanning alerts** to view the results of the scan (filter by tool as needed to see just the IaC findings).
155
153
156
154
## Configure IaC scanning and view the results in Azure DevOps
157
155
158
-
**To view the results of the IaC scan in Azure DevOps**
156
+
**To view the results of the IaC scan in Azure DevOps**:
159
157
160
158
1. Sign in to [Azure DevOps](https://dev.azure.com/).
161
159
@@ -176,19 +174,19 @@ Once you have set up the Microsoft Security DevOps GitHub action or Azure DevOps
176
174
177
175
:::image type="content" source="media/tutorial-iac-vulnerabilities/addition-to-yaml.png" alt-text="Screenshot showing you where to add this line to the YAML file.":::
178
176
179
-
1. Select **Save**.
177
+
1. Select **Save**.
180
178
181
179
1. (Optional) Add an IaC template to your repository. Skip if you already have an IaC template in your repository.
182
180
183
-
1. Select **Save** to commit directly to the main branch or Create a new branch for this commit.
181
+
1. Select **Save** to commit directly to the main branch or Create a new branch for this commit.
184
182
185
-
1. Select **Pipeline** > **`Your created pipeline`** to view the results of the IaC scan.
183
+
1. Select **Pipeline** > **`Your created pipeline`** to view the results of the IaC scan.
186
184
187
185
1. Select any result to see the details.
188
186
189
187
## View details and remediation information on IaC rules included with Microsoft Security DevOps
190
188
191
-
The IaC scanning tools that are included with Microsoft Security DevOps, are [Template Analyzer](https://github.com/Azure/template-analyzer) (which contains [PSRule](https://aka.ms/ps-rule-azure)) and [Terrascan](https://github.com/tenable/terrascan).
189
+
The IaC scanning tools that are included with Microsoft Security DevOps, are [Template Analyzer](https://github.com/Azure/template-analyzer) (which contains [PSRule](https://aka.ms/ps-rule-azure)) and [Terrascan](https://github.com/tenable/terrascan).
192
190
193
191
Template Analyzer runs rules on ARM and Bicep templates. You can learn more about [Template Analyzer's rules and remediation details](https://github.com/Azure/template-analyzer/blob/main/docs/built-in-rules.md#built-in-rules).
0 commit comments