You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/concept-easm.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,12 +4,12 @@ description: Learn how to gain comprehensive visibility and insights over extern
4
4
titleSuffix: Defender EASM and External Attack Surface Management (EASM) and Defender for Cloud
5
5
ms.topic: conceptual
6
6
ms.custom: ignite-2022
7
-
ms.date: 09/21/2022
7
+
ms.date: 01/10/2023
8
8
---
9
9
10
10
# What is an external attack surface?
11
11
12
-
An external attack surface is the entire area of an organization or system that is susceptible to an attack from an external source. An organization's attack surface is made up of all the points of access that an unauthorized person could use to enter their system. The larger your attack surface is, the harder it is to protect.
12
+
An external attack surface is the entire area of an organization or system that is susceptible to an attack from an external source. An organization's attack surface is made up of all the points of access that an unauthorized person could use to enter their system. The larger your attack surface is, the harder it's to protect.
13
13
14
14
You can use Defender for Cloud's new integration with Microsoft Defender External Attack Surface Management (Defender EASM), to improve your organization's security posture and reduce the potential risk of being attacked. Defender EASM continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate threats, and extend vulnerability and exposure control beyond the firewall.
15
15
@@ -20,7 +20,7 @@ Defender EASM applies Microsoft’s crawling technology to discover assets that
20
20
- Pinpoint attacker-exposed weaknesses, anywhere and on-demand
21
21
- Gain visibility into third-party attack surfaces
22
22
23
-
EASM collects data for publicly exposed assets (“outside-in”) which can be used by MDC CSPM (“inside-out”) to assist with internet-exposure validation and discovery capabilities to provide better visibility to customers.
23
+
EASM collects data for publicly exposed assets (“outside-in”). That data can be used by MDC CSPM (“inside-out”) to assist with internet-exposure validation and discovery capabilities to provide better visibility to customers.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/github-action.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Configure the Microsoft Security DevOps GitHub action
3
3
description: Learn how to configure the Microsoft Security DevOps GitHub action.
4
-
ms.date: 09/11/2022
4
+
ms.date: 01/09/2023
5
5
ms.topic: how-to
6
6
ms.custom: ignite-2022
7
7
---
@@ -23,6 +23,8 @@ Security DevOps uses the following Open Source tools:
23
23
24
24
## Prerequisites
25
25
26
+
- An Azure subscription If you don’t have an Azure subscription, create a [free account](https://azure.microsoft.com/free/) before you begin.
27
+
26
28
-[Connect your GitHub repositories](quickstart-onboard-github.md).
27
29
28
30
- Follow the guidance to set up [GitHub Advanced Security](https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/managing-security-and-analysis-settings-for-your-organization).
@@ -35,7 +37,7 @@ Security DevOps uses the following Open Source tools:
35
37
36
38
1. Sign in to [GitHub](https://www.github.com).
37
39
38
-
1. Select a repository on which you want to configure the GitHub action.
40
+
1. Select a repository you want to configure the GitHub action to.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/quickstart-automation-alert.md
+18-9Lines changed: 18 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,11 +3,12 @@ title: Create a security automation for specific security alerts by using an Azu
3
3
description: Learn how to create a Microsoft Defender for Cloud automation to trigger a logic app, which will be triggered by specific Defender for Cloud alerts by using an Azure Resource Manager template (ARM template) or Bicep.
4
4
ms.topic: quickstart
5
5
ms.custom: subject-armqs, mode-arm
6
-
ms.date: 08/31/2022
6
+
ms.date: 01/09/2023
7
7
---
8
+
8
9
# Quickstart: Create an automatic response to a specific security alert using an ARM template or Bicep
9
10
10
-
This quickstart describes how to use an Azure Resource Manager template (ARM template) or a Bicep file to create a workflow automation that triggers a logic app when specific security alerts are received by Microsoft Defender for Cloud.
11
+
In this quickstart, you'll learn how to use an Azure Resource Manager template (ARM template) or a Bicep file to create a workflow automation. The workflow automation will trigger a logic app when specific security alerts are received by Microsoft Defender for Cloud.
11
12
12
13
## Prerequisites
13
14
@@ -64,9 +65,13 @@ For other Defender for Cloud quickstart templates, see these [community contribu
64
65
65
66
Use the Azure portal to check the workflow automation has been deployed.
66
67
67
-
1. From the [Azure portal](https://portal.azure.com), open **Microsoft Defender for Cloud**.
68
+
1. Sign in to the [Azure portal](https://portal.azure.com).
69
+
70
+
1. Search for and select **Microsoft Defender for Cloud**.
71
+
72
+
1. Select **filter**.
68
73
69
-
1.From the top menu bar, select the filter icon, and select the specific subscription on which you deployed the new workflow automation.
74
+
1.Select the specific subscription on which you deployed the new workflow automation.
70
75
71
76
1. From Microsoft Defender for Cloud's menu, open **workflow automation** and check for your new automation.
72
77
:::image type="content" source="./media/quickstart-automation-alert/validating-template-run.png" alt-text="List of configured automations." lightbox="./media/quickstart-automation-alert/validating-template-run.png":::
@@ -78,9 +83,13 @@ Use the Azure portal to check the workflow automation has been deployed.
78
83
79
84
When no longer needed, delete the workflow automation using the Azure portal.
80
85
81
-
1. From the [Azure portal](https://portal.azure.com), open **Microsoft Defender for Cloud**.
86
+
1. Sign in to the [Azure portal](https://portal.azure.com).
87
+
88
+
1. Search for and select **Microsoft Defender for Cloud**.
89
+
90
+
1. Select **filter**.
82
91
83
-
1.From the top menu bar, select the filter icon, and select the specific subscription on which you deployed the new workflow automation.
92
+
1.Select the specific subscription on which you deployed the new workflow automation.
84
93
85
94
1. From Microsoft Defender for Cloud's menu, open **workflow automation** and find the automation to be deleted.
86
95
:::image type="content" source="./media/quickstart-automation-alert/deleting-workflow-automation.png" alt-text="Steps for removing a workflow automation." lightbox="./media/quickstart-automation-alert/deleting-workflow-automation.png":::
@@ -130,9 +139,9 @@ For other Defender for Cloud quickstart templates, see these [community contribu
130
139
131
140
You're required to enter the following parameters:
132
141
133
-
- **automationName**: Replace **\<automation-name\>** with the name of the automation. It has a minimum length of 3 characters and a maximum length of 24 characters.
134
-
- **logicAppName**: Replace **\<logic-name\>** with the name of the logic app. It has a minimum length of 3 characters.
135
-
- **logicAppResourceGroupName**: Replace **\<group-name\>** with the name of the resource group in which the resources are located. It has a minimum length of 3 characters.
142
+
- **automationName**: Replace **\<automation-name\>** with the name of the automation. It has a minimum length of three characters and a maximum length of 24 characters.
143
+
- **logicAppName**: Replace **\<logic-name\>** with the name of the logic app. It has a minimum length of three characters.
144
+
- **logicAppResourceGroupName**: Replace **\<group-name\>** with the name of the resource group in which the resources are located. It has a minimum length of three characters.
136
145
- **alertSettings**: Replace **\{alert-settings\}** with the alert settings object used for deploying the automation.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/resource-graph-samples.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,11 @@
1
1
---
2
2
title: Azure Resource Graph sample queries for Microsoft Defender for Cloud
3
3
description: Sample Azure Resource Graph queries for Microsoft Defender for Cloud showing use of resource types and tables to access Microsoft Defender for Cloud related resources and properties.
4
-
ms.date: 07/07/2022
4
+
ms.date: 01/09/2023
5
5
ms.topic: sample
6
6
ms.custom: subject-resourcegraph-sample
7
7
---
8
+
8
9
# Azure Resource Graph sample queries for Microsoft Defender for Cloud
9
10
10
11
This page is a collection of [Azure Resource Graph](../governance/resource-graph/overview.md) sample
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/review-security-recommendations.md
+10-8Lines changed: 10 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,15 +2,17 @@
2
2
title: Improving your security posture with recommendations in Microsoft Defender for Cloud
3
3
description: This document walks you through how to identify security recommendations that will help you improve your security posture.
4
4
ms.topic: how-to
5
-
ms.date: 06/29/2022
5
+
ms.date: 01/10/2023
6
6
---
7
+
7
8
# Find recommendations that can improve your security posture
8
9
9
10
To improve your [secure score](secure-score-security-controls.md), you have to implement the security recommendations for your environment. From the list of recommendations, you can use filters to find the recommendations that have the most impact on your score, or the ones that you were assigned to implement.
10
11
11
12
To get to the list of recommendations:
12
13
13
14
1. Sign in to the [Azure portal](https://portal.azure.com).
15
+
14
16
1. Either:
15
17
- In the Defender for Cloud overview, select **Security posture** and then select **View recommendations** for the environment that you want to improve.
16
18
- Go to **Recommendations** in the Defender for Cloud menu.
@@ -22,7 +24,7 @@ You can learn more by watching this video from the Defender for Cloud in the Fie
22
24
23
25
## Finding recommendations with high impact on your secure score<aname="monitor-recommendations"></a>
24
26
25
-
Your [secure score is calculated](secure-score-security-controls.md?branch=main#how-your-secure-score-is-calculated) based on the security recommendations that you have implemented. In order to increase your score and improve your security posture, you have to find recommendations with unhealthy resources and [remediate those recommendations](implement-security-recommendations.md).
27
+
Your [secure score is calculated](secure-score-security-controls.md?branch=main#how-your-secure-score-is-calculated) based on the security recommendations that you've implemented. In order to increase your score and improve your security posture, you have to find recommendations with unhealthy resources and [remediate those recommendations](implement-security-recommendations.md).
26
28
27
29
The list of recommendations shows the **Potential score increase** that you can achieve when you remediate all of the recommendations in the security control.
28
30
@@ -32,13 +34,13 @@ To find recommendations that can improve your secure score:
32
34
- You can also use the search box and filters above the list of recommendations to find specific recommendations.
33
35
1. Open a security control to see the recommendations that have unhealthy resources.
34
36
35
-
When you [remediate](implement-security-recommendations.md) all of the recommendations in the security control, your secure score increases by the percentage points listed for the control.
37
+
When you [remediate](implement-security-recommendations.md) all of the recommendations in the security control, your secure score increases by the percentage point listed for the control.
36
38
37
39
## Manage the owner and ETA of recommendations that are assigned to you
38
40
39
-
[Security teams can assign a recommendation](governance-rules.md) to a specific person and assign a due date to drive your organization towards increased security. If you have recommendations assigned to you, you are accountable to remediate the resources affected by the recommendations to help your organization be compliant with the security policy.
41
+
[Security teams can assign a recommendation](governance-rules.md) to a specific person and assign a due date to drive your organization towards increased security. If you have recommendations assigned to you, you're accountable to remediate the resources affected by the recommendations to help your organization be compliant with the security policy.
40
42
41
-
Recommendations are listed as **On time** until their due date is passed, when they are changed to **Overdue**. Before the recommendation is overdue, the recommendation does not impact the secure score. The security team can also apply a grace period during which overdue recommendations continue to not impact the secure score.
43
+
Recommendations are listed as **On time** until their due date is passed, when they're changed to **Overdue**. Before the recommendation is overdue, the recommendation doesn't impact the secure score. The security team can also apply a grace period during which overdue recommendations continue to not impact the secure score.
42
44
43
45
To help you plan your work and report on progress, you can set an ETA for the specific resources to show when you plan to have the recommendation resolved by for those resources. You can also change the owner of the recommendation for specific resources so that the person responsible for remediation is assigned to the resource.
44
46
@@ -49,19 +51,19 @@ To change the owner of resources and set the ETA for remediation of recommendati
49
51
1. In the filters for list of recommendations, select **Show my items only**.
50
52
51
53
- The status column indicates the recommendations that are on time, overdue, or completed.
52
-
- The insights column indicates the recommendations that are in a grace period, so they currently do not impact your secure score until they become overdue.
54
+
- The insights column indicates the recommendations that are in a grace period, so they currently don't impact your secure score until they become overdue.
53
55
54
56
1. Select an on time or overdue recommendation.
55
57
1. For the resources that are assigned to you, set the owner of the resource:
56
58
1. Select the resources that are owned by another person, and select **Change owner and set ETA**.
57
59
1. Select **Change owner**, enter the email address of the owner of the resource, and select **Save**.
58
-
The owner of the resource gets a weekly email listing the recommendations that they are assigned to.
60
+
The owner of the resource gets a weekly email listing the recommendations that they're assigned to.
59
61
1. For resources that you own, set an ETA for remediation:
60
62
1. Select resources that you plan to remediate by the same date, and select **Change owner and set ETA**.
61
63
1. Select **Change ETA** and set the date by which you plan to remediate the recommendation for those resources.
62
64
1. Enter a justification for the remediation by that date, and select **Save**.
63
65
64
-
The due date for the recommendation does not change, but the security team can see that you plan to update the resources by the specified ETA date.
66
+
The due date for the recommendation doesn't change, but the security team can see that you plan to update the resources by the specified ETA date.
65
67
66
68
## Review recommendation data in Azure Resource Graph Explorer (ARG)
0 commit comments