Skip to content

Commit 486652d

Browse files
authored
Merge pull request #171233 from memildin/asc-melvyn-mde-linux
TVM public preview
2 parents 9fa6306 + edf55e1 commit 486652d

File tree

7 files changed

+122
-9
lines changed

7 files changed

+122
-9
lines changed

articles/security-center/TOC.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@
137137
href: apply-security-baseline.md
138138
- name: Vulnerability scanning
139139
items:
140-
- name: Scan your machines with the integrated VA scanner
140+
- name: Scan your machines with the integrated Qualys scanner
141141
displayName: qualys, vulnerability, arc, hybrid
142142
href: deploy-vulnerability-assessment-vm.md
143143
- name: Scan your VMs with a BYOL VA solution
@@ -163,6 +163,9 @@
163163
- name: Define lists of safe applications for machines
164164
displayName: aac, whitelist, allowlist, reviewgroup, adaptive application controls
165165
href: security-center-adaptive-application.md
166+
- name: Review applications and software installed on your machines
167+
displayName: inventory, apps, software inventory, mde, tvm
168+
href: asset-inventory.md#access-a-software-inventory
166169
- name: Track changes to files and registries
167170
items:
168171
- name: Overview of file integrity monitoring

articles/security-center/asset-inventory.md

Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -126,6 +126,73 @@ Using the [Kusto Query Language (KQL)](/azure/data-explorer/kusto/query/), asset
126126

127127
1. If you've defined some filters and left the page open, Security Center won't update the results automatically. Any changes to resources won't impact the displayed results unless you manually reload the page or select **Refresh**.
128128

129+
## Access a software inventory
130+
131+
If you've enabled the integration with Microsoft Defender for Endpoint and enabled Azure Defender for servers, you'll have access to the software inventory.
132+
133+
:::image type="content" source="media/deploy-vulnerability-assessment-tvm/software-inventory.png" alt-text="If you've enabled the threat and vulnerability solution, Security Center's asset inventory offers a filter to select resources by their installed software.":::
134+
135+
> [!NOTE]
136+
> The "Blank" option shows machines without Microsoft Defender for Endpoint (or without Azure Defender for servers).
137+
138+
As well as the filters in the asset inventory page, you can explore the software inventory data from Azure Resource Graph Explorer.
139+
140+
Examples of using Azure Resource Graph Explorer to access and explore software inventory data:
141+
142+
1. Open **Azure Resource Graph Explorer**.
143+
144+
:::image type="content" source="./media/security-center-identity-access/opening-resource-graph-explorer.png" alt-text="Launching Azure Resource Graph Explorer** recommendation page" :::
145+
146+
1. Select the following subscription scope: securityresources/softwareinventories
147+
148+
1. Enter any of the following queries (or customize them or write your own!) and select **Run query**.
149+
150+
- To generate a basic list of installed software:
151+
152+
```kusto
153+
securityresources
154+
| where type == "microsoft.security/softwareinventories"
155+
| project id, Vendor=properties.vendor, Software=properties.softwareName, Version=properties.version
156+
```
157+
158+
- To filter by version numbers:
159+
160+
```kusto
161+
securityresources
162+
| where type == "microsoft.security/softwareinventories"
163+
| project id, Vendor=properties.vendor, Software=properties.softwareName, Version=tostring(properties. version)
164+
| where Software=="windows_server_2019" and parse_version(Version)<=parse_version("10.0.17763.1999")
165+
```
166+
167+
- To find machines with a combination of software products:
168+
169+
```kusto
170+
securityresources
171+
| where type == "microsoft.security/softwareinventories"
172+
| extend vmId = properties.azureVmId
173+
| where properties.softwareName == "apache_http_server" or properties.softwareName == "mysql"
174+
| summarize count() by tostring(vmId)
175+
| where count_ > 1
176+
```
177+
178+
- Combination of a software product with another ASC recommendation:
179+
180+
(In this example – machines having MySQL installed and exposed management ports)
181+
182+
```kusto
183+
securityresources
184+
| where type == "microsoft.security/softwareinventories"
185+
| extend vmId = tolower(properties.azureVmId)
186+
| where properties.softwareName == "mysql"
187+
| join (
188+
securityresources
189+
| where type == "microsoft.security/assessments"
190+
| where properties.displayName == "Management ports should be closed on your virtual machines" and properties.status.code == "Unhealthy"
191+
| extend vmId = tolower(properties.resourceDetails.Id)
192+
) on vmId
193+
```
194+
195+
129196
130197
## FAQ - Inventory
131198

articles/security-center/defender-for-servers-introduction.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure Defender for servers - the benefits and features
33
description: Learn about the benefits and features of Azure Defender for servers.
44
author: memildin
55
ms.author: memildin
6-
ms.date: 08/09/2021
6+
ms.date: 09/05/2021
77
ms.topic: overview
88
ms.service: security-center
99
manager: rkarlin
@@ -28,13 +28,15 @@ The threat detection and protection capabilities provided with Azure Defender fo
2828
When Defender for Endpoint detects a threat, it triggers an alert. The alert is shown in Security Center. From Security Center, you can also pivot to the Defender for Endpoint console, and perform a detailed investigation to uncover the scope of the attack. Learn more about Microsoft Defender for Endpoint.
2929

3030
> [!IMPORTANT]
31-
> The **Microsoft Defender for Endpoint** sensor is automatically enabled on Windows machines that use Security Center.
31+
> Security Center’s integration with Microsoft Defender for Endpoint (MDE) is enabled by default. So when you enable Azure Defender, you give consent for MDE and Azure Defender for servers to share the necessary data to provide security alerts for your endpoints.
3232
>
33-
> We're currently offering the sensor for Linux machines in preview. Learn more in [Protect your endpoints with Security Center's integrated EDR solution: Microsoft Defender for Endpoint](security-center-wdatp.md).
33+
> We're currently offering the sensor for Linux machines in preview. Learn more in [Protect your endpoints with Security Center's integrated EDR solution: Microsoft Defender for Endpoint](security-center-wdatp.md).
3434
35-
- **Vulnerability assessment scanning for VMs** - Azure Defender for servers includes a vulnerability scanner powered by Qualys.
35+
- **Vulnerability assessment tools for machines** - Azure Defender for servers includes a choice of vulnerability discovery and management tools for your machines. From Security Center's settings pages, you can select which of these tools to deploy to your machines and the discovered vulnerabilities will be shown in a security recommendation.
3636

37-
Qualys' scanner is one of the leading tools for real-time identification of vulnerabilities in your Azure and hybrid virtual machines. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center. For more information, see [Azure Defender's integrated vulnerability assessment solution for Azure and hybrid machines](deploy-vulnerability-assessment-vm.md).
37+
- **Microsoft threat and vulnerability management** - Discover vulnerabilities and misconfigurations in real time with Microsoft Defender for Endpoint, and without the need of additional agents or periodic scans. [Threat and vulnerability management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt) prioritizes vulnerabilities based on the threat landscape, detections in your organization, sensitive information on vulnerable devices, and business context.
38+
39+
- **Vulnerability scanner powered by Qualys** - Qualys' scanner is one of the leading tools for real-time identification of vulnerabilities in your Azure and hybrid virtual machines. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center. Learn more in [Azure Defender's integrated Qualys scanner for Azure and hybrid machines](deploy-vulnerability-assessment-vm.md).
3840

3941
- **Just-in-time (JIT) virtual machine (VM) access** - Threat actors actively hunt accessible machines with open management ports, like RDP or SSH. All of your virtual machines are potential targets for an attack. When a VM is successfully compromised, it's used as the entry point to attack further resources within your environment.
4042

@@ -52,6 +54,7 @@ The threat detection and protection capabilities provided with Azure Defender fo
5254

5355
Adaptive Network Hardening provides recommendations to further harden the NSG rules. It uses a machine learning algorithm that factors in actual traffic, known trusted configuration, threat intelligence, and other indicators of compromise, and then provides recommendations to allow traffic only from specific IP/port tuples. For more information, see [Improve your network security posture with adaptive network hardening](security-center-adaptive-network-hardening.md).
5456

57+
5558
- **Docker host hardening** - Azure Security Center identifies unmanaged containers hosted on IaaS Linux VMs, or other Linux machines running Docker containers. Security Center continuously assesses the configurations of these containers. It then compares them with the Center for Internet Security (CIS) Docker Benchmark. Security Center includes the entire ruleset of the CIS Docker Benchmark and alerts you if your containers don't satisfy any of the controls. For more information, see [Harden your Docker hosts](harden-docker-hosts.md).
5659

5760
- **Fileless attack detection** - Fileless attacks inject malicious payloads into memory to avoid detection by disk-based scanning techniques. The attacker’s payload then persists within the memory of compromised processes and performs a wide range of malicious activities.

articles/security-center/deploy-vulnerability-assessment-vm.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Security Center's integrated vulnerability assessment solution for Azure and hybrid machines
3-
description: Install a vulnerability assessment solution on your Azure machines to get recommendations in Azure Security Center that can help you protect your Azure and virtual machines
3+
description: Install a vulnerability assessment solution on your Azure machines to get recommendations in Azure Security Center that can help you protect your Azure and hybrid machines
44
services: security-center
55
author: memildin
66
manager: rkarlin
@@ -24,6 +24,8 @@ Use this recommendation to deploy the vulnerability assessment solution to your
2424

2525
Deploy the vulnerability assessment solution that best meets your needs and budget:
2626

27+
- **Microsoft Defender for Endpoint's threat and vulnerability management tools** - Discover vulnerabilities and misconfigurations in real time with sensors, and without the need of agents or periodic scans. It prioritizes vulnerabilities based on the threat landscape, detections in your organization, sensitive information on vulnerable devices, and business context.
28+
2729
- **Integrated vulnerability assessment solution (powered by Qualys)** - Azure Defender includes vulnerability scanning for your machines at no extra cost. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center. This page provides details of this scanner and instructions for how to deploy it.
2830

2931
> [!TIP]
Loading
123 KB
Loading

articles/security-center/release-notes.md

Lines changed: 40 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: memildin
55
manager: rkarlin
66
ms.service: security-center
77
ms.topic: reference
8-
ms.date: 10/03/2021
8+
ms.date: 10/06/2021
99
ms.author: memildin
1010

1111
---
@@ -26,8 +26,46 @@ To learn about *planned* changes that are coming soon to Security Center, see [I
2626

2727
Updates in October include:
2828

29+
- [Microsoft Threat and Vulnerability Management added as vulnerability assessment solution (in preview)](#microsoft-threat-and-vulnerability-management-added-as-vulnerability-assessment-solution-in-preview)
30+
- [Vulnerability assessment solutions can now be auto enabled (in preview)](#vulnerability-assessment-solutions-can-now-be-auto-enabled-in-preview)
31+
- [Software inventory filters added to asset inventory (in preview)](#software-inventory-filters-added-to-asset-inventory-in-preview)
2932
- [Changed prefix of some alert types from "ARM_" to "VM_"](#changed-prefix-of-some-alert-types-from-arm_-to-vm_)
3033

34+
35+
### Microsoft Threat and Vulnerability Management added as vulnerability assessment solution (in preview)
36+
37+
We've extended the integration between [Azure Defender for servers](defender-for-servers-introduction.md) and Microsoft Defender for Endpoint, to support a new vulnerability assessment provide for your machines: [Microsoft threat and vulnerability management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt).
38+
39+
Use **threat and vulnerability management** to discover vulnerabilities and misconfigurations in near real time with the [integration with Microsoft Defender for Endpoint](security-center-wdatp.md) enabled, and without the need of additional agents or periodic scans. Threat and vulnerability management prioritizes vulnerabilities based on the threat landscape and detections in your organization.
40+
41+
Use the security recommendation "[A vulnerability assessment solution should be enabled on your virtual machines](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/ffff0522-1e88-47fc-8382-2a80ba848f5d)" to surface the vulnerabilities detected by threat and vulnerability management for your [supported machines](/microsoft-365/security/defender-endpoint/tvm-supported-os?view=o365-worldwide).
42+
43+
To automatically surface the vulnerabilities, without the need to manually remediate the recommendation, see [Vulnerability assessment solutions can now be auto enabled (in preview)](#vulnerability-assessment-solutions-can-now-be-auto-enabled-in-preview).
44+
45+
46+
### Vulnerability assessment solutions can now be auto enabled (in preview)
47+
48+
Security Center's auto provisioning page now includes the option to automatically enabled a vulnerability assessment solution to Azure virtual machines and Azure Arc machines on subscriptions protected by [Azure Defender for servers](defender-for-servers-introduction.md).
49+
50+
Also, if the [integration with Microsoft Defender for Endpoint](security-center-wdatp.md) is enabled, you'll have a choice of vulnerability assessment solutions:
51+
52+
- (**NEW**) The Microsoft threat and vulnerability management module of Microsoft Defender for Endpoint (see [the release note](#microsoft-threat-and-vulnerability-management-added-as-vulnerability-assessment-solution-in-preview))
53+
- The integrated Qualys agent
54+
55+
:::image type="content" source="media/deploy-vulnerability-assessment-tvm/auto-provision-vulnerability-assessment-agent.png" alt-text="Configure auto provisioning of Microsoft's threat and vulnerability management from Azure Security Center.":::
56+
57+
Your chosen solution will be automatically enabled on supported machines.
58+
59+
### Software inventory filters added to asset inventory (in preview)
60+
61+
The [asset inventory](asset-inventory.md) page now includes a filter to select machines running specific software - and even specify the versions of interest.
62+
63+
Additionally, you can query the software inventory data in **Azure Resource Graph Explorer**.
64+
65+
For full details, including sample Kusto queries for Azure Resource Graph, see [Access a software inventory](asset-inventory.md#access-a-software-inventory).
66+
67+
:::image type="content" source="media/deploy-vulnerability-assessment-tvm/software-inventory.png" alt-text="If you've enabled the threat and vulnerability solution, Security Center's asset inventory offers a filter to select resources by their installed software.":::
68+
3169
### Changed prefix of some alert types from "ARM_" to "VM_"
3270

3371
In July 2021, we announced a [logical reorganization of Azure Defender for Resource Manager alerts](release-notes.md#logical-reorganization-of-azure-defender-for-resource-manager-alerts)
@@ -67,7 +105,7 @@ Learn more about the [Azure Defender for Resource Manager](defender-for-resource
67105

68106
In September, the following update was released:
69107

70-
### Two new recommendations to audit OS configurations for Azure security baseline compliance
108+
### Two new recommendations to audit OS configurations for Azure security baseline compliance (in preview)
71109

72110
The following two recommendations have been released to assess your machines' compliance with the [Windows security baseline](../governance/policy/samples/guest-configuration-baseline-windows.md) and the [Linux security baseline](../governance/policy/samples/guest-configuration-baseline-linux.md):
73111

0 commit comments

Comments
 (0)