You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/purview/how-to-integrate-with-azure-security-products.md
+12-7Lines changed: 12 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: aashishr
5
5
ms.author: aashishr
6
6
ms.service: purview
7
7
ms.topic: how-to
8
-
ms.date: 01/23/2022
8
+
ms.date: 03/23/2023
9
9
---
10
10
# Integrate Microsoft Purview with Azure security products
11
11
@@ -20,7 +20,9 @@ Classifications and labels applied to data resources in Microsoft Purview are in
20
20
To take advantage of this [enrichment in Microsoft Defender for Cloud](../security-center/information-protection.md), no more steps are needed in Microsoft Purview. Start exploring the security enrichments with Microsoft Defender for Cloud's [Inventory page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/25) where you can see the list of data sources with classifications and sensitivity labels.
21
21
22
22
### Supported data sources
23
+
23
24
The integration supports data sources in Azure and AWS; sensitive data discovered in these resources is shared with Microsoft Defender for Cloud:
-[Azure Data Explorer](./register-scan-azure-data-explorer.md)
@@ -36,14 +38,16 @@ The integration supports data sources in Azure and AWS; sensitive data discovere
36
38
-[Amazon S3](./register-scan-amazon-s3.md)
37
39
38
40
### Known issues
39
-
1. Data sensitivity information is currently not shared for sources hosted inside virtual machines - like SAP, Erwin, and Teradata.
40
-
2. Data sensitivity information is currently not shared for Amazon RDS.
41
-
3. Data sensitivity information is currently not shared for Azure PaaS data sources registered using a connection string.
42
-
5. Unregistering the data source in Microsoft Purview doesn't remove the data sensitivity enrichment in Microsoft Defender for Cloud.
43
-
6. Deleting the Microsoft Purview account will persist the data sensitivity enrichment for 30 days in Microsoft Defender for Cloud.
44
-
7. Custom classifications defined in the Microsoft Purview compliance portal or Microsoft Purview governance portal aren't shared with Microsoft Defender for Cloud.
41
+
42
+
- Data sensitivity information is currently not shared for sources hosted inside virtual machines - like SAP, Erwin, and Teradata.
43
+
- Data sensitivity information is currently not shared for Amazon RDS.
44
+
- Data sensitivity information is currently not shared for Azure PaaS data sources registered using a connection string.
45
+
- Unregistering the data source in Microsoft Purview doesn't remove the data sensitivity enrichment in Microsoft Defender for Cloud.
46
+
- Deleting the Microsoft Purview account will persist the data sensitivity enrichment for 30 days in Microsoft Defender for Cloud.
47
+
- Custom classifications defined in the Microsoft Purview compliance portal or Microsoft Purview governance portal aren't shared with Microsoft Defender for Cloud.
45
48
46
49
### FAQ
50
+
47
51
#### **Why don't I see the AWS data source I have scanned with Microsoft Purview in Microsoft Defender for Cloud?**
48
52
49
53
Data sources must be onboarded to Microsoft Defender for Cloud as well. Learn more about how to [connect your AWS accounts](../security-center/quickstart-onboard-aws.md) and see your AWS data sources in Microsoft Defender for Cloud.
@@ -67,4 +71,5 @@ Customize the Microsoft Purview workbook and analytics rules to best suit the ne
67
71
For more information, see [Tutorial: Integrate Microsoft Sentinel and Microsoft Purview](../sentinel/purview-solution.md).
68
72
69
73
## Next steps
74
+
70
75
-[Experiences in Microsoft Defender for Cloud enriched using sensitivity from Microsoft Purview](../security-center/information-protection.md)
0 commit comments