Skip to content

Commit 4a22fa3

Browse files
authored
Merge pull request #226493 from bmansheim/pm-feedback-overview
Initial overview section from release branch
2 parents 12b04d7 + bf264f2 commit 4a22fa3

File tree

57 files changed

+643
-856
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

57 files changed

+643
-856
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 32 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -383,7 +383,7 @@
383383
{
384384
"source_path_from_root": "/articles/security-center/defender-for-cloud-introduction.md",
385385
"redirect_url": "/azure/defender-for-cloud/defender-for-cloud-introduction",
386-
"redirect_document_id": true
386+
"redirect_document_id": false
387387
},
388388
{
389389
"source_path_from_root": "/articles/security-center/defender-for-container-registries-cicd.md",
@@ -473,7 +473,7 @@
473473
{
474474
"source_path_from_root": "/articles/security-center/enable-data-collection.md",
475475
"redirect_url": "/azure/defender-for-cloud/enable-data-collection",
476-
"redirect_document_id": true
476+
"redirect_document_id": false
477477
},
478478
{
479479
"source_path_from_root": "/articles/security-center/enable-enhanced-security.md",
@@ -508,7 +508,7 @@
508508
{
509509
"source_path_from_root": "/articles/security-center/get-started.md",
510510
"redirect_url": "/azure/defender-for-cloud/get-started",
511-
"redirect_document_id": true
511+
"redirect_document_id": false
512512
},
513513
{
514514
"source_path_from_root": "/articles/security-center/harden-docker-hosts.md",
@@ -553,7 +553,7 @@
553553
{
554554
"source_path_from_root": "/articles/security-center/os-coverage.md",
555555
"redirect_url": "/azure/defender-for-cloud/os-coverage",
556-
"redirect_document_id": true
556+
"redirect_document_id": false
557557
},
558558
{
559559
"source_path_from_root": "/articles/security-center/other-threat-protections.md",
@@ -568,7 +568,7 @@
568568
{
569569
"source_path_from_root": "/articles/security-center/permissions.md",
570570
"redirect_url": "/azure/defender-for-cloud/permissions",
571-
"redirect_document_id": true
571+
"redirect_document_id": false
572572
},
573573
{
574574
"source_path_from_root": "/articles/security-center/protect-network-resources.md",
@@ -653,7 +653,7 @@
653653
{
654654
"source_path_from_root": "/articles/security-center/supported-machines-endpoint-solutions-clouds.md",
655655
"redirect_url": "/azure/defender-for-cloud/supported-machines-endpoint-solutions-clouds-containers",
656-
"redirect_document_id": true
656+
"redirect_document_id": false
657657
},
658658
{
659659
"source_path_from_root": "/articles/security-center/tutorial-protect-resources.md",
@@ -779,6 +779,31 @@
779779
"source_path_from_root": "/articles/defender-for-cloud/security-center-planning-and-operations-guide.md",
780780
"redirect_url": "/azure/defender-for-cloud/defender-for-cloud-planning-and-operations-guide",
781781
"redirect_document_id": true
782+
},
783+
{
784+
"source_path_from_root": "/articles/defender-for-cloud/enhanced-security-features-overview.md",
785+
"redirect_url": "/azure/defender-for-cloud/defender-for-cloud-introduction",
786+
"redirect_document_id": true
787+
},
788+
{
789+
"source_path_from_root": "/articles/defender-for-cloud/os-coverage.md",
790+
"redirect_url": "/azure/defender-for-cloud/monitoring-components",
791+
"redirect_document_id": false
792+
},
793+
{
794+
"source_path_from_root": "/articles/defender-for-cloud/features-paas.md",
795+
"redirect_url": "/azure/defender-for-cloud/support-matrix-defender-for-cloud",
796+
"redirect_document_id": true
797+
},
798+
{
799+
"source_path_from_root": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds-containers.md",
800+
"redirect_url": "/azure/defender-for-cloud/support-matrix-defender-for-containers",
801+
"redirect_document_id": true
802+
},
803+
{
804+
"source_path_from_root": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds-servers.md",
805+
"redirect_url": "/azure/defender-for-cloud/support-matrix-defender-for-servers",
806+
"redirect_document_id": true
782807
}
783-
]
808+
]
784809
}

articles/azure-monitor/logs/cost-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ In some scenarios, combining this data can result in cost savings. Typically, th
141141
- [LinuxAuditLog](/azure/azure-monitor/reference/tables/linuxauditlog)
142142
- [SysmonEvent](/azure/azure-monitor/reference/tables/sysmonevent)
143143
- [ProtectionStatus](/azure/azure-monitor/reference/tables/protectionstatus)
144-
- [Update](/azure/azure-monitor/reference/tables/update) and [UpdateSummary](/azure/azure-monitor/reference/tables/updatesummary) when the Update Management solution isn't running in the workspace or solution targeting is enabled. See [What data types are included in the 500-MB data daily allowance?](../../defender-for-cloud/enhanced-security-features-overview.md#what-data-types-are-included-in-the-500-mb-data-daily-allowance).
144+
- [Update](/azure/azure-monitor/reference/tables/update) and [UpdateSummary](/azure/azure-monitor/reference/tables/updatesummary) when the Update Management solution isn't running in the workspace or solution targeting is enabled. See [What data types are included in the 500-MB data daily allowance?](../../defender-for-cloud/plan-defender-for-servers-data-workspace.md#log-analytics-pricing-faq).
145145

146146
The count of monitored servers is calculated on an hourly granularity. The daily data allocation contributions from each monitored server are aggregated at the workspace level. If the workspace is in the legacy Per Node pricing tier, the Microsoft Defender for Cloud and Log Analytics allocations are combined and applied jointly to all billable ingested data.
147147

articles/defender-for-cloud/TOC.yml

Lines changed: 40 additions & 49 deletions
Original file line numberDiff line numberDiff line change
@@ -7,32 +7,24 @@
77
- name: What is Microsoft Defender for Cloud?
88
displayName: Defender for cloud, servers, storage, sql, containers, app service, key vault, resource manager, dns, open-source relational databases, Azure cosmos db, db, Azure, defender
99
href: defender-for-cloud-introduction.md
10-
- name: What are the enhanced security features?
11-
displayName: azure defender
12-
href: enhanced-security-features-overview.md
1310
- name: What's new?
1411
displayName: changelog, news, release notes
1512
href: release-notes.md
1613
- name: Important upcoming changes
1714
displayName: release notes, changelog, news
1815
href: upcoming-changes.md
19-
- name: Availability
16+
- name: Common questions
2017
items:
21-
- name: Supported platforms for servers
22-
displayName: coverage, supported platforms, cloud services, virtual machines
23-
href: os-coverage.md
24-
- name: Servers coverage by OS, machine type, and cloud
25-
displayName: coverage, machines, windows, linux, multicloud, supported features, endpoint protections
26-
href: supported-machines-endpoint-solutions-clouds-servers.md
27-
- name: Defender for Containers feature availability
28-
displayName: Containers, features availability, environment information
29-
href: supported-machines-endpoint-solutions-clouds-containers.md
30-
- name: Feature coverage for Azure PaaS resources
31-
displayName: Paas, resources
32-
href: features-paas.md
33-
- name: User roles and permissions
34-
displayName: RBAC, permissions, roles, contributor, security, reader, admin, owner
35-
href: permissions.md
18+
- name: General questions
19+
href: faq-general.yml
20+
- name: Permissions questions
21+
href: faq-permissions.yml
22+
- name: Data collection and agent questions
23+
href: faq-data-collection-agents.yml
24+
- name: Azure Virtual Machines questions
25+
href: faq-vms.yml
26+
- name: Azure Log Analytics questions
27+
href: faq-azure-monitor-logs.yml
3628

3729
- name: Quickstarts
3830
items:
@@ -98,6 +90,19 @@
9890

9991
- name: Concepts
10092
items:
93+
- name: Interoperability and permissions
94+
items:
95+
- name: User roles and permissions
96+
href: permissions.md
97+
- name: Azure cloud support
98+
displayName: coverage, supported platforms, cloud services, roles, permissions
99+
href: support-matrix-defender-for-cloud.md
100+
- name: Defender for Servers support matrices
101+
displayName: coverage, machines, windows, linux, multicloud, supported features, endpoint protections
102+
href: support-matrix-defender-for-servers.md
103+
- name: Defender for Containers support matrices
104+
displayName: Containers, features availability, environment information
105+
href: support-matrix-defender-for-containers.md
101106
- name: Protect multicloud resources
102107
items:
103108
- name: The Defender for Cloud multicloud solution
@@ -165,25 +170,23 @@
165170
- name: Reference list of attack paths and cloud security graph components
166171
displayName: attack, paths, security, graph, components
167172
href: attack-path-reference.md
168-
- name: Protect servers
173+
- name: Plan Defender for Servers deployment
169174
items:
170-
- name: Plan Defender for Servers deployment
171-
items:
172-
- name: Get started
173-
displayName: VM, JIT, plan 1, plan 2, plans, vulnerability assessment, threat management, defender for endpoint, vulnerability scanner, Qualys, FIM, File integrity monitoring, adaptive application controls, adaptive network hardening, docker, fileless attack detection, auditd, simulate alerts
174-
href: plan-defender-for-servers.md
175-
- name: Review data residency and workspace design
176-
href: plan-defender-for-servers-data-workspace.md
177-
- name: Determine roles and access
178-
href: plan-defender-for-servers-roles.md
179-
- name: Select a plan
180-
href: plan-defender-for-servers-select-plan.md
181-
- name: Review agents and extensions
182-
href: plan-defender-for-servers-agents.md
183-
- name: Scale a Defender for Servers deployment
184-
href: plan-defender-for-servers-scale.md
185-
- name: Common questions
186-
href: faq-defender-for-servers.yml
175+
- name: Get started
176+
displayName: VM, JIT, plan 1, plan 2, plans, vulnerability assessment, threat management, defender for endpoint, vulnerability scanner, Qualys, FIM, File integrity monitoring, adaptive application controls, adaptive network hardening, docker, fileless attack detection, auditd, simulate alerts
177+
href: plan-defender-for-servers.md
178+
- name: Review data residency and workspace design
179+
href: plan-defender-for-servers-data-workspace.md
180+
- name: Determine roles and access
181+
href: plan-defender-for-servers-roles.md
182+
- name: Select a plan
183+
href: plan-defender-for-servers-select-plan.md
184+
- name: Review agents and extensions
185+
href: plan-defender-for-servers-agents.md
186+
- name: Scale a Defender for Servers deployment
187+
href: plan-defender-for-servers-scale.md
188+
- name: Common questions
189+
href: faq-defender-for-servers.yml
187190
- name: Protect cloud workloads
188191
items:
189192
- name: Agentless scanning
@@ -579,18 +582,6 @@
579582
href: /rest/api/defenderforcloud/
580583
- name: Security baseline
581584
href: /security/benchmark/azure/baselines/security-center-security-baseline?toc=/azure/defender-for-cloud/TOC.json
582-
- name: FAQ for Microsoft Defender for Cloud
583-
items:
584-
- name: General questions
585-
href: faq-general.yml
586-
- name: Permissions questions
587-
href: faq-permissions.yml
588-
- name: Data collection and agent questions
589-
href: faq-data-collection-agents.yml
590-
- name: Virtual Machines questions
591-
href: faq-vms.yml
592-
- name: Existing users of Azure Log Analytics
593-
href: faq-azure-monitor-logs.yml
594585
- name: Azure Policy built-ins
595586
displayName: samples, policy
596587
href: policy-reference.md

articles/defender-for-cloud/adaptive-application-controls.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,11 @@ description: This document helps you use adaptive application control in Microso
44
author: bmansheim
55
ms.author: benmansheim
66
ms.topic: how-to
7-
ms.date: 01/08/2023
7+
ms.date: 02/06/2023
88

99
---
1010
# Use adaptive application controls to reduce your machines' attack surfaces
1111

12-
1312
Learn about the benefits of Microsoft Defender for Cloud's adaptive application controls and how you can enhance your security with this data-driven, intelligent feature.
1413

1514
## What are adaptive application controls?
@@ -97,7 +96,7 @@ Select the recommendation, or open the adaptive application controls page to vie
9796
> [!TIP]
9897
> Both application lists include the option to restrict a specific application to certain users. Adopt the principle of least privilege whenever possible.
9998
>
100-
> Applications are defined by their publishers; if an application doesn't have publisher information (it's unsigned), a path rule is created for the full path of the specific application.
99+
> Applications are defined by their publishers. If an application doesn't have publisher information (it's unsigned), a path rule is created for the full path of the specific application.
101100
102101
1. To apply the rule, select **Audit**.
103102

@@ -176,21 +175,21 @@ To remediate the issues:
176175

177176
1. To investigate further, select a group.
178177

179-
:::image type="content" source="./media/adaptive-application/recent-alerts.png" alt-text="Screenshot showing selecting a group the group settings page for adaptive application controls." lightbox="./media/adaptive-application/recent-alerts.png":::
178+
:::image type="content" source="media/adaptive-application/recent-alerts.png" alt-text="Screenshot showing recent alerts.":::
180179

181180
1. For further details, and the list of affected machines, select an alert.
182181

183182
The security alerts page shows more details of the alerts and provides a **Take action** link with recommendations of how to mitigate the threat.
184183

185-
:::image type="content" source="media/adaptive-application/adaptive-application-alerts-start-time.png" alt-text="Screenshot showing the start time of adaptive application controls alerts is the time that adaptive application controls created the alert.":::
184+
:::image type="content" source="media/adaptive-application/adaptive-application-alerts-start-time.png" alt-text="Screenshot of the start time of adaptive application controls alerts showing that the time is when adaptive application controls created the alert.":::
186185

187186
> [!NOTE]
188187
> Adaptive application controls calculates events once every twelve hours. The "activity start time" shown in the security alerts page is the time that adaptive application controls created the alert, **not** the time that the suspicious process was active.
189188
190189

191190
## Move a machine from one group to another
192191

193-
When you move a machine from one group to another, the application control policy applied to it changes to the settings of the group that you moved it to. You can also move a machine from a configured group to a non-configured group; doing so removes any application control rules that were applied to the machine.
192+
When you move a machine from one group to another, the application control policy applied to it changes to the settings of the group that you moved it to. You can also move a machine from a configured group to a non-configured group, which removes any application control rules that were applied to the machine.
194193

195194
1. Open the **Workload protections dashboard** and from the advanced protection area, select **Adaptive application controls**.
196195

@@ -212,13 +211,13 @@ When you move a machine from one group to another, the application control polic
212211

213212
To manage your adaptive application controls programmatically, use our REST API.
214213

215-
The relevant API documentation is available in [the Adaptive application Controls section of Defender for Cloud's API docs](https://learn.microsoft.com/rest/api/defenderforcloud/adaptive-application-controls).
214+
The relevant API documentation is available in [the Adaptive application Controls section of Defender for Cloud's API docs](/rest/api/defenderforcloud/adaptive-application-controls).
216215

217216
Some of the functions available from the REST API include:
218217

219218
* **List** retrieves all your group recommendations and provides a JSON with an object for each group.
220219

221-
* **Get** retrieves the JSON with the full recommendation data (list of machines, publisher/path rules, etc.).
220+
* **Get** retrieves the JSON with the full recommendation data (that is, list of machines, publisher/path rules, and so on).
222221

223222
* **Put** configures your rule (use the JSON you retrieved with **Get** as the body for this request).
224223

articles/defender-for-cloud/alerts-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ This article describes security alerts and notifications in Microsoft Defender f
1414
## What are security alerts?
1515
Security alerts are the notifications generated by Defender for Cloud and Defender for Cloud plans when threats are identified in your cloud, hybrid, or on-premises environment.
1616

17-
- Security alerts are triggered by advanced detections in Defender for Cloud, and are available when you enable [enhanced security features](enhanced-security-features-overview.md).
17+
- Security alerts are triggered by advanced detections in Defender for Cloud, and are available when you enable Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads).
1818
- Each alert provides details of affected resources, issues, and remediation recommendations.
1919
- Defender for Cloud classifies alerts and prioritizes them by severity in the Defender for Cloud portal.
2020
- Alerts data is retained for 90 days.

articles/defender-for-cloud/alerts-schemas.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.date: 11/09/2021
99

1010
# Security alerts schemas
1111

12-
If your subscription has enhanced security features enabled, you'll receive security alerts when Defender for Cloud detects threats to their resources.
12+
If your subscription has Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads) enabled, you'll receive security alerts when Defender for Cloud detects threats to their resources.
1313

1414
You can view these security alerts in Microsoft Defender for Cloud's pages - [overview dashboard](overview-page.md), [alerts](tutorial-security-incident.md), [resource health pages](investigate-resource-health.md), or [workload protections dashboard](workload-protections-dashboard.md) - and through external tools such as:
1515

articles/defender-for-cloud/alerts-suppression-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ This page explains how you can use alerts suppression rules to suppress false po
1515
|Aspect|Details|
1616
|----|:----|
1717
|Release state:|General availability (GA)|
18-
|Pricing:|Free<br>(Security alerts are generated by [Defender plans](enable-enhanced-security.md))|
18+
|Pricing:|Free<br>(Most security alerts are only available with [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads))|
1919
|Required roles and permissions:|**Security admin** and **Owner** can create/delete rules.<br>**Security reader** and **Reader** can view rules.|
2020
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National (Azure Government, Azure China 21Vianet)|
2121

articles/defender-for-cloud/asset-inventory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ The asset inventory page of Microsoft Defender for Cloud shows the [security pos
1212

1313
Use this view and its filters to address such questions as:
1414

15-
- Which of my subscriptions with [Defender plans](defender-for-cloud-introduction.md#cwp---identify-unique-workload-security-requirements) enabled have outstanding recommendations?
15+
- Which of my subscriptions with [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads) enabled have outstanding recommendations?
1616
- Which of my machines with the tag 'Production' are missing the Log Analytics agent?
1717
- How many of my machines tagged with a specific tag have outstanding recommendations?
1818
- Which machines in a specific resource group have a known vulnerability (using a CVE number)?

articles/defender-for-cloud/auto-deploy-azure-monitoring-agent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ When you auto-provision the Log Analytics agent in Defender for Cloud, you can c
107107

108108
If you want to collect security events when you auto-provision the Azure Monitor Agent, you can create a [Data Collection Rule](../azure-monitor/essentials/data-collection-rule-overview.md) to collect the required events.
109109

110-
Like for Log Analytics workspaces, Defender for Cloud users are eligible for [500-MB of free data](enhanced-security-features-overview.md#faq---pricing-and-billing) daily on defined data types that include security events.
110+
Like for Log Analytics workspaces, Defender for Cloud users are eligible for [500-MB of free data](plan-defender-for-servers-data-workspace.md#log-analytics-pricing-faq) daily on defined data types that include security events.
111111

112112
## Next steps
113113

0 commit comments

Comments
 (0)