Skip to content

Commit 4269d86

Browse files
committed
Review
1 parent 1ab04ab commit 4269d86

File tree

1 file changed

+12
-7
lines changed

1 file changed

+12
-7
lines changed

articles/purview/how-to-integrate-with-azure-security-products.md

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: aashishr
55
ms.author: aashishr
66
ms.service: purview
77
ms.topic: how-to
8-
ms.date: 01/23/2022
8+
ms.date: 03/23/2023
99
---
1010
# Integrate Microsoft Purview with Azure security products
1111

@@ -20,7 +20,9 @@ Classifications and labels applied to data resources in Microsoft Purview are in
2020
To take advantage of this [enrichment in Microsoft Defender for Cloud](../security-center/information-protection.md), no more steps are needed in Microsoft Purview. Start exploring the security enrichments with Microsoft Defender for Cloud's [Inventory page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/25) where you can see the list of data sources with classifications and sensitivity labels.
2121

2222
### Supported data sources
23+
2324
The integration supports data sources in Azure and AWS; sensitive data discovered in these resources is shared with Microsoft Defender for Cloud:
25+
2426
- [Azure Blob Storage](./register-scan-azure-blob-storage-source.md)
2527
- [Azure Cosmos DB](./register-scan-azure-cosmos-database.md)
2628
- [Azure Data Explorer](./register-scan-azure-data-explorer.md)
@@ -36,14 +38,16 @@ The integration supports data sources in Azure and AWS; sensitive data discovere
3638
- [Amazon S3](./register-scan-amazon-s3.md)
3739

3840
### Known issues
39-
1. Data sensitivity information is currently not shared for sources hosted inside virtual machines - like SAP, Erwin, and Teradata.
40-
2. Data sensitivity information is currently not shared for Amazon RDS.
41-
3. Data sensitivity information is currently not shared for Azure PaaS data sources registered using a connection string.
42-
5. Unregistering the data source in Microsoft Purview doesn't remove the data sensitivity enrichment in Microsoft Defender for Cloud.
43-
6. Deleting the Microsoft Purview account will persist the data sensitivity enrichment for 30 days in Microsoft Defender for Cloud.
44-
7. Custom classifications defined in the Microsoft Purview compliance portal or Microsoft Purview governance portal aren't shared with Microsoft Defender for Cloud.
41+
42+
- Data sensitivity information is currently not shared for sources hosted inside virtual machines - like SAP, Erwin, and Teradata.
43+
- Data sensitivity information is currently not shared for Amazon RDS.
44+
- Data sensitivity information is currently not shared for Azure PaaS data sources registered using a connection string.
45+
- Unregistering the data source in Microsoft Purview doesn't remove the data sensitivity enrichment in Microsoft Defender for Cloud.
46+
- Deleting the Microsoft Purview account will persist the data sensitivity enrichment for 30 days in Microsoft Defender for Cloud.
47+
- Custom classifications defined in the Microsoft Purview compliance portal or Microsoft Purview governance portal aren't shared with Microsoft Defender for Cloud.
4548

4649
### FAQ
50+
4751
#### **Why don't I see the AWS data source I have scanned with Microsoft Purview in Microsoft Defender for Cloud?**
4852

4953
Data sources must be onboarded to Microsoft Defender for Cloud as well. Learn more about how to [connect your AWS accounts](../security-center/quickstart-onboard-aws.md) and see your AWS data sources in Microsoft Defender for Cloud.
@@ -67,4 +71,5 @@ Customize the Microsoft Purview workbook and analytics rules to best suit the ne
6771
For more information, see [Tutorial: Integrate Microsoft Sentinel and Microsoft Purview](../sentinel/purview-solution.md).
6872

6973
## Next steps
74+
7075
- [Experiences in Microsoft Defender for Cloud enriched using sensitivity from Microsoft Purview](../security-center/information-protection.md)

0 commit comments

Comments
 (0)