Skip to content

Commit 42cb425

Browse files
Merge pull request #223321 from ElazarK/WI58488-freshness-batch5
Wi58488 freshness batch5
2 parents d3c582f + 2d2e9d8 commit 42cb425

File tree

5 files changed

+37
-23
lines changed

5 files changed

+37
-23
lines changed

articles/defender-for-cloud/concept-easm.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,12 @@ description: Learn how to gain comprehensive visibility and insights over extern
44
titleSuffix: Defender EASM and External Attack Surface Management (EASM) and Defender for Cloud
55
ms.topic: conceptual
66
ms.custom: ignite-2022
7-
ms.date: 09/21/2022
7+
ms.date: 01/10/2023
88
---
99

1010
# What is an external attack surface?
1111

12-
An external attack surface is the entire area of an organization or system that is susceptible to an attack from an external source. An organization's attack surface is made up of all the points of access that an unauthorized person could use to enter their system. The larger your attack surface is, the harder it is to protect.
12+
An external attack surface is the entire area of an organization or system that is susceptible to an attack from an external source. An organization's attack surface is made up of all the points of access that an unauthorized person could use to enter their system. The larger your attack surface is, the harder it's to protect.
1313

1414
You can use Defender for Cloud's new integration with Microsoft Defender External Attack Surface Management (Defender EASM), to improve your organization's security posture and reduce the potential risk of being attacked. Defender EASM continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate threats, and extend vulnerability and exposure control beyond the firewall.
1515

@@ -20,7 +20,7 @@ Defender EASM applies Microsoft’s crawling technology to discover assets that
2020
- Pinpoint attacker-exposed weaknesses, anywhere and on-demand
2121
- Gain visibility into third-party attack surfaces
2222

23-
EASM collects data for publicly exposed assets (“outside-in”) which can be used by MDC CSPM (“inside-out”) to assist with internet-exposure validation and discovery capabilities to provide better visibility to customers.
23+
EASM collects data for publicly exposed assets (“outside-in”). That data can be used by MDC CSPM (“inside-out”) to assist with internet-exposure validation and discovery capabilities to provide better visibility to customers.
2424

2525
## Learn more
2626

articles/defender-for-cloud/github-action.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Configure the Microsoft Security DevOps GitHub action
33
description: Learn how to configure the Microsoft Security DevOps GitHub action.
4-
ms.date: 09/11/2022
4+
ms.date: 01/09/2023
55
ms.topic: how-to
66
ms.custom: ignite-2022
77
---
@@ -23,6 +23,8 @@ Security DevOps uses the following Open Source tools:
2323

2424
## Prerequisites
2525

26+
- An Azure subscription If you don’t have an Azure subscription, create a [free account](https://azure.microsoft.com/free/) before you begin.
27+
2628
- [Connect your GitHub repositories](quickstart-onboard-github.md).
2729

2830
- Follow the guidance to set up [GitHub Advanced Security](https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/managing-security-and-analysis-settings-for-your-organization).
@@ -35,7 +37,7 @@ Security DevOps uses the following Open Source tools:
3537

3638
1. Sign in to [GitHub](https://www.github.com).
3739

38-
1. Select a repository on which you want to configure the GitHub action.
40+
1. Select a repository you want to configure the GitHub action to.
3941

4042
1. Select **Actions**.
4143

articles/defender-for-cloud/quickstart-automation-alert.md

Lines changed: 18 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,12 @@ title: Create a security automation for specific security alerts by using an Azu
33
description: Learn how to create a Microsoft Defender for Cloud automation to trigger a logic app, which will be triggered by specific Defender for Cloud alerts by using an Azure Resource Manager template (ARM template) or Bicep.
44
ms.topic: quickstart
55
ms.custom: subject-armqs, mode-arm
6-
ms.date: 08/31/2022
6+
ms.date: 01/09/2023
77
---
8+
89
# Quickstart: Create an automatic response to a specific security alert using an ARM template or Bicep
910

10-
This quickstart describes how to use an Azure Resource Manager template (ARM template) or a Bicep file to create a workflow automation that triggers a logic app when specific security alerts are received by Microsoft Defender for Cloud.
11+
In this quickstart, you'll learn how to use an Azure Resource Manager template (ARM template) or a Bicep file to create a workflow automation. The workflow automation will trigger a logic app when specific security alerts are received by Microsoft Defender for Cloud.
1112

1213
## Prerequisites
1314

@@ -64,9 +65,13 @@ For other Defender for Cloud quickstart templates, see these [community contribu
6465

6566
Use the Azure portal to check the workflow automation has been deployed.
6667

67-
1. From the [Azure portal](https://portal.azure.com), open **Microsoft Defender for Cloud**.
68+
1. Sign in to the [Azure portal](https://portal.azure.com).
69+
70+
1. Search for and select **Microsoft Defender for Cloud**.
71+
72+
1. Select **filter**.
6873

69-
1. From the top menu bar, select the filter icon, and select the specific subscription on which you deployed the new workflow automation.
74+
1. Select the specific subscription on which you deployed the new workflow automation.
7075

7176
1. From Microsoft Defender for Cloud's menu, open **workflow automation** and check for your new automation.
7277
:::image type="content" source="./media/quickstart-automation-alert/validating-template-run.png" alt-text="List of configured automations." lightbox="./media/quickstart-automation-alert/validating-template-run.png":::
@@ -78,9 +83,13 @@ Use the Azure portal to check the workflow automation has been deployed.
7883

7984
When no longer needed, delete the workflow automation using the Azure portal.
8085

81-
1. From the [Azure portal](https://portal.azure.com), open **Microsoft Defender for Cloud**.
86+
1. Sign in to the [Azure portal](https://portal.azure.com).
87+
88+
1. Search for and select **Microsoft Defender for Cloud**.
89+
90+
1. Select **filter**.
8291

83-
1. From the top menu bar, select the filter icon, and select the specific subscription on which you deployed the new workflow automation.
92+
1. Select the specific subscription on which you deployed the new workflow automation.
8493

8594
1. From Microsoft Defender for Cloud's menu, open **workflow automation** and find the automation to be deleted.
8695
:::image type="content" source="./media/quickstart-automation-alert/deleting-workflow-automation.png" alt-text="Steps for removing a workflow automation." lightbox="./media/quickstart-automation-alert/deleting-workflow-automation.png":::
@@ -130,9 +139,9 @@ For other Defender for Cloud quickstart templates, see these [community contribu
130139
131140
You're required to enter the following parameters:
132141
133-
- **automationName**: Replace **\<automation-name\>** with the name of the automation. It has a minimum length of 3 characters and a maximum length of 24 characters.
134-
- **logicAppName**: Replace **\<logic-name\>** with the name of the logic app. It has a minimum length of 3 characters.
135-
- **logicAppResourceGroupName**: Replace **\<group-name\>** with the name of the resource group in which the resources are located. It has a minimum length of 3 characters.
142+
- **automationName**: Replace **\<automation-name\>** with the name of the automation. It has a minimum length of three characters and a maximum length of 24 characters.
143+
- **logicAppName**: Replace **\<logic-name\>** with the name of the logic app. It has a minimum length of three characters.
144+
- **logicAppResourceGroupName**: Replace **\<group-name\>** with the name of the resource group in which the resources are located. It has a minimum length of three characters.
136145
- **alertSettings**: Replace **\{alert-settings\}** with the alert settings object used for deploying the automation.
137146
138147
> [!NOTE]

articles/defender-for-cloud/resource-graph-samples.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,11 @@
11
---
22
title: Azure Resource Graph sample queries for Microsoft Defender for Cloud
33
description: Sample Azure Resource Graph queries for Microsoft Defender for Cloud showing use of resource types and tables to access Microsoft Defender for Cloud related resources and properties.
4-
ms.date: 07/07/2022
4+
ms.date: 01/09/2023
55
ms.topic: sample
66
ms.custom: subject-resourcegraph-sample
77
---
8+
89
# Azure Resource Graph sample queries for Microsoft Defender for Cloud
910

1011
This page is a collection of [Azure Resource Graph](../governance/resource-graph/overview.md) sample

articles/defender-for-cloud/review-security-recommendations.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,17 @@
22
title: Improving your security posture with recommendations in Microsoft Defender for Cloud
33
description: This document walks you through how to identify security recommendations that will help you improve your security posture.
44
ms.topic: how-to
5-
ms.date: 06/29/2022
5+
ms.date: 01/10/2023
66
---
7+
78
# Find recommendations that can improve your security posture
89

910
To improve your [secure score](secure-score-security-controls.md), you have to implement the security recommendations for your environment. From the list of recommendations, you can use filters to find the recommendations that have the most impact on your score, or the ones that you were assigned to implement.
1011

1112
To get to the list of recommendations:
1213

1314
1. Sign in to the [Azure portal](https://portal.azure.com).
15+
1416
1. Either:
1517
- In the Defender for Cloud overview, select **Security posture** and then select **View recommendations** for the environment that you want to improve.
1618
- Go to **Recommendations** in the Defender for Cloud menu.
@@ -22,7 +24,7 @@ You can learn more by watching this video from the Defender for Cloud in the Fie
2224

2325
## Finding recommendations with high impact on your secure score<a name="monitor-recommendations"></a>
2426

25-
Your [secure score is calculated](secure-score-security-controls.md?branch=main#how-your-secure-score-is-calculated) based on the security recommendations that you have implemented. In order to increase your score and improve your security posture, you have to find recommendations with unhealthy resources and [remediate those recommendations](implement-security-recommendations.md).
27+
Your [secure score is calculated](secure-score-security-controls.md?branch=main#how-your-secure-score-is-calculated) based on the security recommendations that you've implemented. In order to increase your score and improve your security posture, you have to find recommendations with unhealthy resources and [remediate those recommendations](implement-security-recommendations.md).
2628

2729
The list of recommendations shows the **Potential score increase** that you can achieve when you remediate all of the recommendations in the security control.
2830

@@ -32,13 +34,13 @@ To find recommendations that can improve your secure score:
3234
- You can also use the search box and filters above the list of recommendations to find specific recommendations.
3335
1. Open a security control to see the recommendations that have unhealthy resources.
3436

35-
When you [remediate](implement-security-recommendations.md) all of the recommendations in the security control, your secure score increases by the percentage points listed for the control.
37+
When you [remediate](implement-security-recommendations.md) all of the recommendations in the security control, your secure score increases by the percentage point listed for the control.
3638

3739
## Manage the owner and ETA of recommendations that are assigned to you
3840

39-
[Security teams can assign a recommendation](governance-rules.md) to a specific person and assign a due date to drive your organization towards increased security. If you have recommendations assigned to you, you are accountable to remediate the resources affected by the recommendations to help your organization be compliant with the security policy.
41+
[Security teams can assign a recommendation](governance-rules.md) to a specific person and assign a due date to drive your organization towards increased security. If you have recommendations assigned to you, you're accountable to remediate the resources affected by the recommendations to help your organization be compliant with the security policy.
4042

41-
Recommendations are listed as **On time** until their due date is passed, when they are changed to **Overdue**. Before the recommendation is overdue, the recommendation does not impact the secure score. The security team can also apply a grace period during which overdue recommendations continue to not impact the secure score.
43+
Recommendations are listed as **On time** until their due date is passed, when they're changed to **Overdue**. Before the recommendation is overdue, the recommendation doesn't impact the secure score. The security team can also apply a grace period during which overdue recommendations continue to not impact the secure score.
4244

4345
To help you plan your work and report on progress, you can set an ETA for the specific resources to show when you plan to have the recommendation resolved by for those resources. You can also change the owner of the recommendation for specific resources so that the person responsible for remediation is assigned to the resource.
4446

@@ -49,19 +51,19 @@ To change the owner of resources and set the ETA for remediation of recommendati
4951
1. In the filters for list of recommendations, select **Show my items only**.
5052

5153
- The status column indicates the recommendations that are on time, overdue, or completed.
52-
- The insights column indicates the recommendations that are in a grace period, so they currently do not impact your secure score until they become overdue.
54+
- The insights column indicates the recommendations that are in a grace period, so they currently don't impact your secure score until they become overdue.
5355

5456
1. Select an on time or overdue recommendation.
5557
1. For the resources that are assigned to you, set the owner of the resource:
5658
1. Select the resources that are owned by another person, and select **Change owner and set ETA**.
5759
1. Select **Change owner**, enter the email address of the owner of the resource, and select **Save**.
58-
The owner of the resource gets a weekly email listing the recommendations that they are assigned to.
60+
The owner of the resource gets a weekly email listing the recommendations that they're assigned to.
5961
1. For resources that you own, set an ETA for remediation:
6062
1. Select resources that you plan to remediate by the same date, and select **Change owner and set ETA**.
6163
1. Select **Change ETA** and set the date by which you plan to remediate the recommendation for those resources.
6264
1. Enter a justification for the remediation by that date, and select **Save**.
6365

64-
The due date for the recommendation does not change, but the security team can see that you plan to update the resources by the specified ETA date.
66+
The due date for the recommendation doesn't change, but the security team can see that you plan to update the resources by the specified ETA date.
6567

6668
## Review recommendation data in Azure Resource Graph Explorer (ARG)
6769

0 commit comments

Comments
 (0)