You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/asset-inventory.md
+67Lines changed: 67 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -126,6 +126,73 @@ Using the [Kusto Query Language (KQL)](/azure/data-explorer/kusto/query/), asset
126
126
127
127
1. If you've defined some filters and left the page open, Security Center won't update the results automatically. Any changes to resources won't impact the displayed results unless you manually reload the page or select **Refresh**.
128
128
129
+
## Access a software inventory
130
+
131
+
If you've enabled the integration with Microsoft Defender for Endpoint and enabled Azure Defender for servers, you'll have access to the software inventory.
132
+
133
+
:::image type="content" source="media/deploy-vulnerability-assessment-tvm/software-inventory.png" alt-text="If you've enabled the threat and vulnerability solution, Security Center's asset inventory offers a filter to select resources by their installed software.":::
134
+
135
+
> [!NOTE]
136
+
> The "Blank" option shows machines without Microsoft Defender for Endpoint (or without Azure Defender for servers).
137
+
138
+
As well as the filters in the asset inventory page, you can explore the software inventory data from Azure Resource Graph Explorer.
139
+
140
+
Examples of using Azure Resource Graph Explorer to access and explore software inventory data:
Copy file name to clipboardExpand all lines: articles/security-center/defender-for-servers-introduction.md
+8-5Lines changed: 8 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Azure Defender for servers - the benefits and features
3
3
description: Learn about the benefits and features of Azure Defender for servers.
4
4
author: memildin
5
5
ms.author: memildin
6
-
ms.date: 08/09/2021
6
+
ms.date: 09/05/2021
7
7
ms.topic: overview
8
8
ms.service: security-center
9
9
manager: rkarlin
@@ -28,13 +28,15 @@ The threat detection and protection capabilities provided with Azure Defender fo
28
28
When Defender for Endpoint detects a threat, it triggers an alert. The alert is shown in Security Center. From Security Center, you can also pivot to the Defender for Endpoint console, and perform a detailed investigation to uncover the scope of the attack. Learn more about Microsoft Defender for Endpoint.
29
29
30
30
> [!IMPORTANT]
31
-
> The **Microsoft Defender for Endpoint** sensor is automatically enabled on Windows machines that use Security Center.
31
+
> Security Center’s integration with Microsoft Defender for Endpoint (MDE) is enabled by default. So when you enable Azure Defender, you give consent for MDE and Azure Defender for servers to share the necessary data to provide security alerts for your endpoints.
32
32
>
33
-
> We're currently offering the sensor for Linux machines in preview. Learn more in [Protect your endpoints with Security Center's integrated EDR solution: Microsoft Defender for Endpoint](security-center-wdatp.md).
33
+
> We're currently offering the sensor for Linux machines in preview. Learn more in [Protect your endpoints with Security Center's integrated EDR solution: Microsoft Defender for Endpoint](security-center-wdatp.md).
34
34
35
-
-**Vulnerability assessment scanning for VMs** - Azure Defender for servers includes a vulnerability scanner powered by Qualys.
35
+
-**Vulnerability assessment tools for machines** - Azure Defender for servers includes a choice of vulnerability discovery and management tools for your machines. From Security Center's settings pages, you can select which of these tools to deploy to your machines and the discovered vulnerabilities will be shown in a security recommendation.
36
36
37
-
Qualys' scanner is one of the leading tools for real-time identification of vulnerabilities in your Azure and hybrid virtual machines. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center. For more information, see [Azure Defender's integrated vulnerability assessment solution for Azure and hybrid machines](deploy-vulnerability-assessment-vm.md).
37
+
-**Microsoft threat and vulnerability management** - Discover vulnerabilities and misconfigurations in real time with Microsoft Defender for Endpoint, and without the need of additional agents or periodic scans. [Threat and vulnerability management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt) prioritizes vulnerabilities based on the threat landscape, detections in your organization, sensitive information on vulnerable devices, and business context.
38
+
39
+
-**Vulnerability scanner powered by Qualys** - Qualys' scanner is one of the leading tools for real-time identification of vulnerabilities in your Azure and hybrid virtual machines. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center. Learn more in [Azure Defender's integrated Qualys scanner for Azure and hybrid machines](deploy-vulnerability-assessment-vm.md).
38
40
39
41
-**Just-in-time (JIT) virtual machine (VM) access** - Threat actors actively hunt accessible machines with open management ports, like RDP or SSH. All of your virtual machines are potential targets for an attack. When a VM is successfully compromised, it's used as the entry point to attack further resources within your environment.
40
42
@@ -52,6 +54,7 @@ The threat detection and protection capabilities provided with Azure Defender fo
52
54
53
55
Adaptive Network Hardening provides recommendations to further harden the NSG rules. It uses a machine learning algorithm that factors in actual traffic, known trusted configuration, threat intelligence, and other indicators of compromise, and then provides recommendations to allow traffic only from specific IP/port tuples. For more information, see [Improve your network security posture with adaptive network hardening](security-center-adaptive-network-hardening.md).
54
56
57
+
55
58
-**Docker host hardening** - Azure Security Center identifies unmanaged containers hosted on IaaS Linux VMs, or other Linux machines running Docker containers. Security Center continuously assesses the configurations of these containers. It then compares them with the Center for Internet Security (CIS) Docker Benchmark. Security Center includes the entire ruleset of the CIS Docker Benchmark and alerts you if your containers don't satisfy any of the controls. For more information, see [Harden your Docker hosts](harden-docker-hosts.md).
56
59
57
60
-**Fileless attack detection** - Fileless attacks inject malicious payloads into memory to avoid detection by disk-based scanning techniques. The attacker’s payload then persists within the memory of compromised processes and performs a wide range of malicious activities.
Copy file name to clipboardExpand all lines: articles/security-center/deploy-vulnerability-assessment-vm.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Security Center's integrated vulnerability assessment solution for Azure and hybrid machines
3
-
description: Install a vulnerability assessment solution on your Azure machines to get recommendations in Azure Security Center that can help you protect your Azure and virtual machines
3
+
description: Install a vulnerability assessment solution on your Azure machines to get recommendations in Azure Security Center that can help you protect your Azure and hybrid machines
4
4
services: security-center
5
5
author: memildin
6
6
manager: rkarlin
@@ -24,6 +24,8 @@ Use this recommendation to deploy the vulnerability assessment solution to your
24
24
25
25
Deploy the vulnerability assessment solution that best meets your needs and budget:
26
26
27
+
-**Microsoft Defender for Endpoint's threat and vulnerability management tools** - Discover vulnerabilities and misconfigurations in real time with sensors, and without the need of agents or periodic scans. It prioritizes vulnerabilities based on the threat landscape, detections in your organization, sensitive information on vulnerable devices, and business context.
28
+
27
29
-**Integrated vulnerability assessment solution (powered by Qualys)** - Azure Defender includes vulnerability scanning for your machines at no extra cost. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center. This page provides details of this scanner and instructions for how to deploy it.
Copy file name to clipboardExpand all lines: articles/security-center/release-notes.md
+40-2Lines changed: 40 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: memildin
5
5
manager: rkarlin
6
6
ms.service: security-center
7
7
ms.topic: reference
8
-
ms.date: 10/03/2021
8
+
ms.date: 10/06/2021
9
9
ms.author: memildin
10
10
11
11
---
@@ -26,8 +26,46 @@ To learn about *planned* changes that are coming soon to Security Center, see [I
26
26
27
27
Updates in October include:
28
28
29
+
-[Microsoft Threat and Vulnerability Management added as vulnerability assessment solution (in preview)](#microsoft-threat-and-vulnerability-management-added-as-vulnerability-assessment-solution-in-preview)
30
+
-[Vulnerability assessment solutions can now be auto enabled (in preview)](#vulnerability-assessment-solutions-can-now-be-auto-enabled-in-preview)
31
+
-[Software inventory filters added to asset inventory (in preview)](#software-inventory-filters-added-to-asset-inventory-in-preview)
29
32
-[Changed prefix of some alert types from "ARM_" to "VM_"](#changed-prefix-of-some-alert-types-from-arm_-to-vm_)
30
33
34
+
35
+
### Microsoft Threat and Vulnerability Management added as vulnerability assessment solution (in preview)
36
+
37
+
We've extended the integration between [Azure Defender for servers](defender-for-servers-introduction.md) and Microsoft Defender for Endpoint, to support a new vulnerability assessment provide for your machines: [Microsoft threat and vulnerability management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt).
38
+
39
+
Use **threat and vulnerability management** to discover vulnerabilities and misconfigurations in near real time with the [integration with Microsoft Defender for Endpoint](security-center-wdatp.md) enabled, and without the need of additional agents or periodic scans. Threat and vulnerability management prioritizes vulnerabilities based on the threat landscape and detections in your organization.
40
+
41
+
Use the security recommendation "[A vulnerability assessment solution should be enabled on your virtual machines](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/ffff0522-1e88-47fc-8382-2a80ba848f5d)" to surface the vulnerabilities detected by threat and vulnerability management for your [supported machines](/microsoft-365/security/defender-endpoint/tvm-supported-os?view=o365-worldwide).
42
+
43
+
To automatically surface the vulnerabilities, without the need to manually remediate the recommendation, see [Vulnerability assessment solutions can now be auto enabled (in preview)](#vulnerability-assessment-solutions-can-now-be-auto-enabled-in-preview).
44
+
45
+
46
+
### Vulnerability assessment solutions can now be auto enabled (in preview)
47
+
48
+
Security Center's auto provisioning page now includes the option to automatically enabled a vulnerability assessment solution to Azure virtual machines and Azure Arc machines on subscriptions protected by [Azure Defender for servers](defender-for-servers-introduction.md).
49
+
50
+
Also, if the [integration with Microsoft Defender for Endpoint](security-center-wdatp.md) is enabled, you'll have a choice of vulnerability assessment solutions:
51
+
52
+
- (**NEW**) The Microsoft threat and vulnerability management module of Microsoft Defender for Endpoint (see [the release note](#microsoft-threat-and-vulnerability-management-added-as-vulnerability-assessment-solution-in-preview))
53
+
- The integrated Qualys agent
54
+
55
+
:::image type="content" source="media/deploy-vulnerability-assessment-tvm/auto-provision-vulnerability-assessment-agent.png" alt-text="Configure auto provisioning of Microsoft's threat and vulnerability management from Azure Security Center.":::
56
+
57
+
Your chosen solution will be automatically enabled on supported machines.
58
+
59
+
### Software inventory filters added to asset inventory (in preview)
60
+
61
+
The [asset inventory](asset-inventory.md) page now includes a filter to select machines running specific software - and even specify the versions of interest.
62
+
63
+
Additionally, you can query the software inventory data in **Azure Resource Graph Explorer**.
64
+
65
+
For full details, including sample Kusto queries for Azure Resource Graph, see [Access a software inventory](asset-inventory.md#access-a-software-inventory).
66
+
67
+
:::image type="content" source="media/deploy-vulnerability-assessment-tvm/software-inventory.png" alt-text="If you've enabled the threat and vulnerability solution, Security Center's asset inventory offers a filter to select resources by their installed software.":::
68
+
31
69
### Changed prefix of some alert types from "ARM_" to "VM_"
32
70
33
71
In July 2021, we announced a [logical reorganization of Azure Defender for Resource Manager alerts](release-notes.md#logical-reorganization-of-azure-defender-for-resource-manager-alerts)
@@ -67,7 +105,7 @@ Learn more about the [Azure Defender for Resource Manager](defender-for-resource
67
105
68
106
In September, the following update was released:
69
107
70
-
### Two new recommendations to audit OS configurations for Azure security baseline compliance
108
+
### Two new recommendations to audit OS configurations for Azure security baseline compliance (in preview)
71
109
72
110
The following two recommendations have been released to assess your machines' compliance with the [Windows security baseline](../governance/policy/samples/guest-configuration-baseline-windows.md) and the [Linux security baseline](../governance/policy/samples/guest-configuration-baseline-linux.md):
0 commit comments