You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/upcoming-changes.md
+24-3Lines changed: 24 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Important upcoming changes
3
3
description: Upcoming changes to Microsoft Defender for Cloud that you might need to be aware of and for which you might need to plan.
4
4
ms.topic: overview
5
-
ms.date: 02/21/2024
5
+
ms.date: 03/05/2024
6
6
---
7
7
8
8
# Important upcoming changes to Microsoft Defender for Cloud
@@ -25,6 +25,7 @@ If you're looking for the latest release notes, you can find them in the [What's
25
25
26
26
| Planned change | Announcement date | Estimated date for change |
27
27
|--|--|--|
28
+
|[Defender for open-source relational databases updates](#defender-for-open-source-relational-databases-updates)| March 6, 2024 | April, 2024 |
28
29
|[Microsoft Security Code Analysis (MSCA) is no longer operational](#microsoft-security-code-analysis-msca-is-no-longer-operational)| February 26, 2024 | February 26, 2024 |
29
30
|[Update recommendations to align with Azure AI Services resources](#update-recommendations-to-align-with-azure-ai-services-resources)| February 20, 2024 | February 28, 2024 |
30
31
|[Deprecation of data recommendation](#deprecation-of-data-recommendation)| February 12, 2024 | March 14, 2024 |
@@ -47,6 +48,26 @@ If you're looking for the latest release notes, you can find them in the [What's
47
48
|[Deprecating two security incidents](#deprecating-two-security-incidents)|| November 2023 |
48
49
|[Defender for Cloud plan and strategy for the Log Analytics agent deprecation](#defender-for-cloud-plan-and-strategy-for-the-log-analytics-agent-deprecation)|| August 2024 |
49
50
51
+
## Defender for open-source relational databases updates
52
+
53
+
**Announcement date: March 6, 2024**
54
+
55
+
**Estimated date for change: April, 2024**
56
+
57
+
**Defender for PostgreSQL Flexible Servers post-GA updates** - The update enables customers to enforce protection for existing PostgreSQL flexible servers at the subscription level, allowing complete flexibility to enable protection on a per-resource basis or for automatic protection of all resources at the subscription level.
58
+
59
+
**Defender for MySQL Flexible Servers Availability and GA** - Defender for Cloud is set to expand its support for Azure open-source relational databases by incorporating MySQL Flexible Servers.
60
+
This release will include:
61
+
62
+
- Alert compatibility with existing alerts for Defender for MySQL Single Servers.
63
+
- Enablement of individual resources.
64
+
- Enablement at the subscription level.
65
+
66
+
If you're already protecting your subscription with Defender for open-source relational databases, your flexible server resources are automatically enabled, protected, and billed.
67
+
Specific billing notifications have been sent via email for affected subscriptions.
68
+
69
+
Learn more about [Microsoft Defender for open-source relational databases](defender-for-databases-introduction.md).
70
+
50
71
## Microsoft Security Code Analysis (MSCA) is no longer operational
51
72
52
73
**Announcement date: February 26, 2024**
@@ -55,7 +76,7 @@ If you're looking for the latest release notes, you can find them in the [What's
55
76
56
77
In February 2021, the deprecation of the MSCA task was communicated to all customers and has been past end of life support since [March 2022](https://devblogs.microsoft.com/premier-developer/microsoft-security-code-analysis/). As of February 26, 2024, MSCA is officially no longer operational.
57
78
58
-
Customers can get the latest DevOps security tooling from Defender for Cloud through [Microsoft Security DevOps](azure-devops-extension.md) and additional security tooling through [GitHub Advanced Security for Azure DevOps](https://azure.microsoft.com/products/devops/github-advanced-security).
79
+
Customers can get the latest DevOps security tooling from Defender for Cloud through [Microsoft Security DevOps](azure-devops-extension.md) and more security tooling through [GitHub Advanced Security for Azure DevOps](https://azure.microsoft.com/products/devops/github-advanced-security).
59
80
60
81
## Update recommendations to align with Azure AI Services resources
61
82
@@ -156,7 +177,7 @@ For more information on the code to cloud security capabilities in Defender CSPM
156
177
157
178
**Estimated date of change: February 2024**
158
179
159
-
In Azure, agentless scanning for VMs uses a built-in role (called [VM scanner operator](/azure/defender-for-cloud/faq-permissions)) with the minimum necessary permissions required to scan and assess your VMs for security issues. To continuously provide relevant scan health and configuration recommendations for VMs with encrypted volumes, an update to this role's permissions is planned. The update includes the addition of the ```Microsoft.Compute/DiskEncryptionSets/read``` permission. This permission solely enables improved identification of encrypted disk usage in VMs. It doesn't provide Defender for Cloud any more capabilities to decrypt or access the content of these encrypted volumes beyond the encryption methods [already supported](/azure/defender-for-cloud/concept-agentless-data-collection#availability) prior to this change. This change is expected to take place during February 2024 and no action is required on your end.
180
+
In Azure, agentless scanning for VMs uses a built-in role (called [VM scanner operator](faq-permissions.yml)) with the minimum necessary permissions required to scan and assess your VMs for security issues. To continuously provide relevant scan health and configuration recommendations for VMs with encrypted volumes, an update to this role's permissions is planned. The update includes the addition of the ```Microsoft.Compute/DiskEncryptionSets/read``` permission. This permission solely enables improved identification of encrypted disk usage in VMs. It doesn't provide Defender for Cloud any more capabilities to decrypt or access the content of these encrypted volumes beyond the encryption methods [already supported](/azure/defender-for-cloud/concept-agentless-data-collection#availability) prior to this change. This change is expected to take place during February 2024 and no action is required on your end.
160
181
161
182
## Deprecation of two recommendations related to PCI
0 commit comments