Skip to content

Commit 3c95d57

Browse files
authored
Merge pull request #263931 from dcurwin/fix-formatting-jan23-2024
Fix formatting
2 parents ea849a9 + a01757d commit 3c95d57

10 files changed

+107
-90
lines changed

articles/defender-for-cloud/continuous-export.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: dacurwin
66
ms.topic: how-to
77
ms.date: 06/19/2023
88
---
9-
# Continuously export Microsoft Defender for Cloud data
9+
# Continuously export Microsoft Defender for Cloud data
1010

1111
Microsoft Defender for Cloud generates detailed security alerts and recommendations. To analyze the information in these alerts and recommendations, you can export them to Azure Log Analytics, Event Hubs, or to another [SIEM, SOAR, or IT classic deployment model solution](export-to-siem.md). You can stream the alerts and recommendations as they're generated or define a schedule to send periodic snapshots of all of the new data.
1212

@@ -122,7 +122,7 @@ Automating your organization's monitoring and incident response processes can gr
122122

123123
To deploy your continuous export configurations across your organization, use the supplied Azure Policy 'DeployIfNotExist' policies to create and configure continuous export procedures.
124124

125-
**To implement these policies**
125+
**To implement these policies**:
126126

127127
1. Select the policy you want to apply from this table:
128128

@@ -136,7 +136,7 @@ To deploy your continuous export configurations across your organization, use th
136136
>
137137
> 1. Open Azure Policy.
138138
> :::image type="content" source="./media/continuous-export/opening-azure-policy.png" alt-text="Accessing Azure Policy.":::
139-
> 2. From the Azure Policy menu, select **Definitions** and search for them by name.
139+
> 1. From the Azure Policy menu, select **Definitions** and search for them by name.
140140
141141
1. From the relevant Azure Policy page, select **Assign**.
142142
:::image type="content" source="./media/continuous-export/export-policy-assign.png" alt-text="Assigning the Azure Policy.":::
@@ -182,7 +182,7 @@ To export data to an Azure Event Hubs or Log Analytics workspace in a different
182182
1. In the tenant that has the Azure Event Hubs or Log Analytics workspace, [invite a user](../active-directory/external-identities/what-is-b2b.md#easily-invite-guest-users-from-the-azure-portal) from the tenant that hosts the continuous export configuration, or alternatively configure Azure Lighthouse for the source and destination tenant.
183183
1. If using Microsoft Entra B2B Guest access, ensure that the user accepts the invitation to access the tenant as a guest.
184184
1. If you're using a Log Analytics Workspace, assign the user in the workspace tenant one of these roles: Owner, Contributor, Log Analytics Contributor, Sentinel Contributor, or Monitoring Contributor.
185-
1. Create and submit the request to the Azure REST API to configure the required resources. You'll need to manage the bearer tokens in both the context of the local (workspace) and the remote (continuous export) tenant.
185+
1. Create and submit the request to the Azure REST API to configure the required resources. You'll need to manage the bearer tokens in both the context of the local (workspace) and the remote (continuous export) tenant.
186186

187187
## Continuously export to an event hub behind a firewall
188188

articles/defender-for-cloud/custom-dashboards-azure-workbooks.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -256,8 +256,8 @@ To move workbooks that you've built in other Azure services into your Microsoft
256256

257257
1. Enter the required details for saving the workbook:
258258
1. A name for the workbook
259-
2. The desired region
260-
3. Subscription, resource group, and sharing as appropriate.
259+
1. The desired region
260+
1. Subscription, resource group, and sharing as appropriate.
261261

262262
You'll find your saved workbook in the **Recently modified workbooks** category.
263263

@@ -268,5 +268,3 @@ This article described Defender for Cloud's integrated Azure Workbooks page with
268268
- Learn more about [Azure Workbooks](../azure-monitor/visualize/workbooks-overview.md)
269269

270270
- The built-in workbooks pull their data from Defender for Cloud's recommendations. Learn about the many security recommendations in [Security recommendations - a reference guide](recommendations-reference.md)
271-
272-

articles/defender-for-cloud/defender-for-apis-posture.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.date: 11/02/2023
99
---
1010
# Investigate API findings, recommendations, and alerts
1111

12-
This article describes how to investigate API security findings, alerts, and security posture recommendations for APIs protected by [Microsoft Defender for APIs](defender-for-apis-introduction.md).
12+
This article describes how to investigate API security findings, alerts, and security posture recommendations for APIs protected by [Microsoft Defender for APIs](defender-for-apis-introduction.md).
1313

1414
## Before you start
1515

@@ -35,14 +35,16 @@ This article describes how to investigate API security findings, alerts, and sec
3535
:::image type="content" source="media/defender-for-apis-posture/resource-health.png" alt-text="Screenshot that shows the health of an endpoint." lightbox="media/defender-for-apis-posture/resource-health.png":::
3636

3737
## Remediate recommendations using Workflow Automation
38-
You can remediate recommendations generated by Defender for APIs using workflow automations.
38+
39+
You can remediate recommendations generated by Defender for APIs using workflow automations.
40+
3941
1. In an eligible recommendation, select one or more unhealthy resources.
40-
2. Select **Trigger logic app**.
41-
3. Confirm the **Selected subscription**.
42-
4. Select a relevant logic app from the list.
43-
5. Select **Trigger**.
42+
1. Select **Trigger logic app**.
43+
1. Confirm the **Selected subscription**.
44+
1. Select a relevant logic app from the list.
45+
1. Select **Trigger**.
4446

45-
You can browse the [Microsoft Defender for Cloud GitHub](https://github.com/Azure/Microsoft-Defender-for-Cloud/tree/main/Workflow%20automation/Defender%20for%20API) repository for available workflow automation.
47+
You can browse the [Microsoft Defender for Cloud GitHub](https://github.com/Azure/Microsoft-Defender-for-Cloud/tree/main/Workflow%20automation/Defender%20for%20API) repository for available workflow automation.
4648

4749
## Create sample security alerts
4850

@@ -59,7 +61,7 @@ In Defender CSPM, [Cloud Security Graph](concept-attack-path.md) collects data t
5961
When the Defender CSPM plan is enabled together with Defender for APIs, you can use Cloud Security Explorer to identify, review and analyze API security risks across your organization.
6062

6163
1. In the Defender for Cloud portal, select **Cloud Security Explorer**.
62-
1. In **What would you like to search?** select the **APIs** category.
64+
1. In **What would you like to search?** select the **APIs** category.
6365
1. Review the search results so that you can review, prioritize, and fix any API issues.
6466
1. Alternatively, you can select one of the templated API queries to see high risk issues like **Internet exposed API endpoints with sensitive data** or **APIs communicating over unencrypted protocols with unauthenticated API endpoints**
6567

articles/defender-for-cloud/iac-template-mapping.md

Lines changed: 18 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,8 @@ ms.topic: how-to
66
ms.custom: ignite-2023
77
---
88

9-
# Map Infrastructure as Code Templates to Cloud Resources
9+
# Map Infrastructure as Code templates to cloud resources
10+
1011
Mapping Infrastructure as Code (IaC) templates to cloud resources ensures consistent, secure, and auditable infrastructure provisioning. It enables rapid response to security threats and a security-by-design approach. If there are misconfigurations in runtime resources, this mapping allows remediation at the template level, ensuring no drift and facilitating deployment via CI/CD methodology.
1112

1213
## Prerequisites
@@ -18,26 +19,27 @@ To allow Microsoft Defender for Cloud to map Infrastructure as Code template to
1819
- [Defender Cloud Security Posture Management (CSPM)](tutorial-enable-cspm-plan.md) enabled.
1920
- Configure your Azure Pipelines to run [Microsoft Security DevOps Azure DevOps extension](azure-devops-extension.md).
2021
- Tag your supported Infrastructure as Code templates and your cloud resources. (Open-source tools like [Yor_trace](https://github.com/bridgecrewio/yor) can be used to automatically tag Infrastructure as Code templates)
21-
- Supported cloud platforms: AWS, Azure, GCP.
22-
- Supported source code management systems: Azure DevOps.
23-
- Supported template languages: Azure Resource Manager, Bicep, CloudFormation, Terraform.
22+
- Supported cloud platforms: AWS, Azure, GCP.
23+
- Supported source code management systems: Azure DevOps.
24+
- Supported template languages: Azure Resource Manager, Bicep, CloudFormation, Terraform.
2425

2526
> [!NOTE]
2627
> Microsoft Defender for Cloud will only use the following tags from Infrastructure as Code templates for mapping:
28+
2729
> - yor_trace
2830
> - mapping_tag
2931
30-
## See the mapping between your IaC template and your cloud resources
32+
## See the mapping between your IaC template and your cloud resources
3133

3234
To see the mapping between your IaC template and your cloud resources in the [Cloud Security Explorer](how-to-manage-cloud-security-explorer.md):
3335

3436
1. Sign in to the [Azure portal](https://portal.azure.com/).
35-
2. Go to **Microsoft Defender for Cloud** > **Cloud Security Explorer**.
36-
3. Search for and select all your cloud resources from the drop-down menu.
37-
4. Select + to add other filters to your query.
38-
5. Add the subfilter **Provisioned by** from the category **Identity & Access**.
39-
6. Select **Code repositories** from the category **DevOps**.
40-
7. After building your query, select **Search** to run the query.
37+
1. Go to **Microsoft Defender for Cloud** > **Cloud Security Explorer**.
38+
1. Search for and select all your cloud resources from the drop-down menu.
39+
1. Select + to add other filters to your query.
40+
1. Add the subfilter **Provisioned by** from the category **Identity & Access**.
41+
1. Select **Code repositories** from the category **DevOps**.
42+
1. After building your query, select **Search** to run the query.
4143

4244
Alternatively, you can use the built-in template named “Cloud resources provisioned by IaC templates with high severity misconfigurations”.
4345

@@ -50,11 +52,11 @@ Alternatively, you can use the built-in template named “Cloud resources provis
5052

5153
To create sample IaC mapping tags within your code repositories, follow these steps:
5254

53-
1. Add an **IaC template with tags** to your repository. To use an example template, see [here](https://github.com/microsoft/security-devops-azdevops/tree/main/samples/IaCMapping).
54-
2. Select **save** to commit directly to the main branch or create a new branch for this commit.
55-
3. Include the **Microsoft Security DevOps** task in your Azure pipeline.
56-
4. Verify that the **pipeline logs** show a finding saying **“An IaC tag(s) was found on this resource”**. This means that Defender for Cloud successfully discovered tags.
55+
1. Add an **IaC template with tags** to your repository. To use an example template, see [here](https://github.com/microsoft/security-devops-azdevops/tree/main/samples/IaCMapping).
56+
1. Select **save** to commit directly to the main branch or create a new branch for this commit.
57+
1. Include the **Microsoft Security DevOps** task in your Azure pipeline.
58+
1. Verify that the **pipeline logs** show a finding saying **“An IaC tag(s) was found on this resource”**. This means that Defender for Cloud successfully discovered tags.
5759

5860
## Next steps
5961

60-
- Learn more about [DevOps security in Defender for Cloud](defender-for-devops-introduction.md).
62+
- Learn more about [DevOps security in Defender for Cloud](defender-for-devops-introduction.md).

articles/defender-for-cloud/iac-vulnerabilities.md

Lines changed: 21 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
---
22
title: Discover misconfigurations in Infrastructure as Code
3-
43
description: Learn how to use DevOps security in Defender for Cloud to discover misconfigurations in Infrastructure as Code (IaC)
54
ms.date: 01/24/2023
65
ms.topic: how-to
@@ -20,9 +19,9 @@ Once you have set up the Microsoft Security DevOps GitHub action or Azure DevOps
2019

2120
## Configure IaC scanning and view the results in GitHub
2221

23-
1. Sign in to [GitHub](https://www.github.com).
22+
1. Sign in to [GitHub](https://www.github.com).
2423

25-
1. Navigate to **`your repository's home page`** > **.github/workflows** > **msdevopssec.yml** that was created in the [prerequisites](github-action.md#configure-the-microsoft-security-devops-github-action-1).
24+
1. Navigate to **`your repository's home page`** > **.github/workflows** > **msdevopssec.yml** that was created in the [prerequisites](github-action.md#configure-the-microsoft-security-devops-github-action-1).
2625

2726
1. Select **Edit file**.
2827

@@ -35,26 +34,26 @@ Once you have set up the Microsoft Security DevOps GitHub action or Azure DevOps
3534
categories: 'IaC'
3635
```
3736
38-
> [!NOTE]
37+
> [!NOTE]
3938
> Categories are case sensitive.
4039
:::image type="content" source="media/tutorial-iac-vulnerabilities/add-to-yaml.png" alt-text="Screenshot that shows the information that needs to be added to the yaml file.":::
4140
42-
1. Select **Start Commit**
41+
1. Select **Start Commit**.
4342
4443
1. Select **Commit changes**.
4544
46-
:::image type="content" source="media/tutorial-iac-vulnerabilities/commit-change.png" alt-text="Screenshot that shows where to select commit change on the githib page.":::
45+
:::image type="content" source="media/tutorial-iac-vulnerabilities/commit-change.png" alt-text="Screenshot that shows where to select commit change on the GitHub page.":::
4746
4847
1. (Optional) Add an IaC template to your repository. Skip if you already have an IaC template in your repository.
4948
5049
For example, [commit an IaC template to deploy a basic Linux web application](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.web/webapp-basic-linux) to your repository.
5150
5251
1. Select `azuredeploy.json`.
53-
52+
5453
:::image type="content" source="media/tutorial-iac-vulnerabilities/deploy-json.png" alt-text="Screenshot that shows where the azuredeploy.json file is located.":::
5554

56-
1. Select **Raw**
57-
55+
1. Select **Raw**.
56+
5857
1. Copy all the information in the file.
5958

6059
```json
@@ -129,33 +128,32 @@ Once you have set up the Microsoft Security DevOps GitHub action or Azure DevOps
129128
]
130129
}
131130
```
132-
131+
133132
1. On GitHub, navigate to your repository.
134-
133+
135134
1. **Select Add file** > **Create new file**.
136-
135+
137136
:::image type="content" source="media/tutorial-iac-vulnerabilities/create-file.png" alt-text="Screenshot that shows you where to navigate to, to create a new file." lightbox="media/tutorial-iac-vulnerabilities/create-file.png":::
138137

139138
1. Enter a name for the file.
140-
139+
141140
1. Paste the copied information into the file.
142-
141+
143142
1. Select **Commit new file**.
144-
143+
145144
The file is now added to your repository.
146145

147146
:::image type="content" source="media/tutorial-iac-vulnerabilities/file-added.png" alt-text="Screenshot that shows that the new file you created has been added to your repository.":::
148147

149-
150148
1. Confirm the Microsoft Security DevOps scan completed:
151-
1. Select **Actions**.
152-
2. Select the workflow to see the results.
149+
1. Select **Actions**.
150+
1. Select the workflow to see the results.
153151

154152
1. Navigate to **Security** > **Code scanning alerts** to view the results of the scan (filter by tool as needed to see just the IaC findings).
155153

156154
## Configure IaC scanning and view the results in Azure DevOps
157155

158-
**To view the results of the IaC scan in Azure DevOps**
156+
**To view the results of the IaC scan in Azure DevOps**:
159157

160158
1. Sign in to [Azure DevOps](https://dev.azure.com/).
161159

@@ -176,19 +174,19 @@ Once you have set up the Microsoft Security DevOps GitHub action or Azure DevOps
176174

177175
:::image type="content" source="media/tutorial-iac-vulnerabilities/addition-to-yaml.png" alt-text="Screenshot showing you where to add this line to the YAML file.":::
178176

179-
1. Select **Save**.
177+
1. Select **Save**.
180178

181179
1. (Optional) Add an IaC template to your repository. Skip if you already have an IaC template in your repository.
182180

183-
1. Select **Save** to commit directly to the main branch or Create a new branch for this commit.
181+
1. Select **Save** to commit directly to the main branch or Create a new branch for this commit.
184182

185-
1. Select **Pipeline** > **`Your created pipeline`** to view the results of the IaC scan.
183+
1. Select **Pipeline** > **`Your created pipeline`** to view the results of the IaC scan.
186184

187185
1. Select any result to see the details.
188186

189187
## View details and remediation information on IaC rules included with Microsoft Security DevOps
190188

191-
The IaC scanning tools that are included with Microsoft Security DevOps, are [Template Analyzer](https://github.com/Azure/template-analyzer) (which contains [PSRule](https://aka.ms/ps-rule-azure)) and [Terrascan](https://github.com/tenable/terrascan).
189+
The IaC scanning tools that are included with Microsoft Security DevOps, are [Template Analyzer](https://github.com/Azure/template-analyzer) (which contains [PSRule](https://aka.ms/ps-rule-azure)) and [Terrascan](https://github.com/tenable/terrascan).
192190

193191
Template Analyzer runs rules on ARM and Bicep templates. You can learn more about [Template Analyzer's rules and remediation details](https://github.com/Azure/template-analyzer/blob/main/docs/built-in-rules.md#built-in-rules).
194192

0 commit comments

Comments
 (0)