Skip to content

Commit 4a42181

Browse files
Merge pull request #268087 from AlizaBernstein/WI-214918-upcoming-change-postgresql-mysql-flexible-servers
WI-214918-upcoming-change-postgresql-mysql-flexible-servers
2 parents d00c80a + 192f388 commit 4a42181

File tree

1 file changed

+24
-3
lines changed

1 file changed

+24
-3
lines changed

articles/defender-for-cloud/upcoming-changes.md

Lines changed: 24 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Important upcoming changes
33
description: Upcoming changes to Microsoft Defender for Cloud that you might need to be aware of and for which you might need to plan.
44
ms.topic: overview
5-
ms.date: 02/21/2024
5+
ms.date: 03/05/2024
66
---
77

88
# Important upcoming changes to Microsoft Defender for Cloud
@@ -25,6 +25,7 @@ If you're looking for the latest release notes, you can find them in the [What's
2525

2626
| Planned change | Announcement date | Estimated date for change |
2727
|--|--|--|
28+
| [Defender for open-source relational databases updates](#defender-for-open-source-relational-databases-updates) | March 6, 2024 | April, 2024 |
2829
| [Microsoft Security Code Analysis (MSCA) is no longer operational](#microsoft-security-code-analysis-msca-is-no-longer-operational) | February 26, 2024 | February 26, 2024 |
2930
| [Update recommendations to align with Azure AI Services resources](#update-recommendations-to-align-with-azure-ai-services-resources) | February 20, 2024 | February 28, 2024 |
3031
| [Deprecation of data recommendation](#deprecation-of-data-recommendation) | February 12, 2024 | March 14, 2024 |
@@ -47,6 +48,26 @@ If you're looking for the latest release notes, you can find them in the [What's
4748
| [Deprecating two security incidents](#deprecating-two-security-incidents) | | November 2023 |
4849
| [Defender for Cloud plan and strategy for the Log Analytics agent deprecation](#defender-for-cloud-plan-and-strategy-for-the-log-analytics-agent-deprecation) | | August 2024 |
4950

51+
## Defender for open-source relational databases updates
52+
53+
**Announcement date: March 6, 2024**
54+
55+
**Estimated date for change: April, 2024**
56+
57+
**Defender for PostgreSQL Flexible Servers post-GA updates** - The update enables customers to enforce protection for existing PostgreSQL flexible servers at the subscription level, allowing complete flexibility to enable protection on a per-resource basis or for automatic protection of all resources at the subscription level.
58+
59+
**Defender for MySQL Flexible Servers Availability and GA** - Defender for Cloud is set to expand its support for Azure open-source relational databases by incorporating MySQL Flexible Servers.
60+
This release will include:
61+
62+
- Alert compatibility with existing alerts for Defender for MySQL Single Servers.
63+
- Enablement of individual resources.
64+
- Enablement at the subscription level.
65+
66+
If you're already protecting your subscription with Defender for open-source relational databases, your flexible server resources are automatically enabled, protected, and billed.
67+
Specific billing notifications have been sent via email for affected subscriptions.
68+
69+
Learn more about [Microsoft Defender for open-source relational databases](defender-for-databases-introduction.md).
70+
5071
## Microsoft Security Code Analysis (MSCA) is no longer operational
5172

5273
**Announcement date: February 26, 2024**
@@ -55,7 +76,7 @@ If you're looking for the latest release notes, you can find them in the [What's
5576

5677
In February 2021, the deprecation of the MSCA task was communicated to all customers and has been past end of life support since [March 2022](https://devblogs.microsoft.com/premier-developer/microsoft-security-code-analysis/). As of February 26, 2024, MSCA is officially no longer operational.
5778

58-
Customers can get the latest DevOps security tooling from Defender for Cloud through [Microsoft Security DevOps](azure-devops-extension.md) and additional security tooling through [GitHub Advanced Security for Azure DevOps](https://azure.microsoft.com/products/devops/github-advanced-security).
79+
Customers can get the latest DevOps security tooling from Defender for Cloud through [Microsoft Security DevOps](azure-devops-extension.md) and more security tooling through [GitHub Advanced Security for Azure DevOps](https://azure.microsoft.com/products/devops/github-advanced-security).
5980

6081
## Update recommendations to align with Azure AI Services resources
6182

@@ -156,7 +177,7 @@ For more information on the code to cloud security capabilities in Defender CSPM
156177

157178
**Estimated date of change: February 2024**
158179

159-
In Azure, agentless scanning for VMs uses a built-in role (called [VM scanner operator](/azure/defender-for-cloud/faq-permissions)) with the minimum necessary permissions required to scan and assess your VMs for security issues. To continuously provide relevant scan health and configuration recommendations for VMs with encrypted volumes, an update to this role's permissions is planned. The update includes the addition of the ```Microsoft.Compute/DiskEncryptionSets/read``` permission. This permission solely enables improved identification of encrypted disk usage in VMs. It doesn't provide Defender for Cloud any more capabilities to decrypt or access the content of these encrypted volumes beyond the encryption methods [already supported](/azure/defender-for-cloud/concept-agentless-data-collection#availability) prior to this change. This change is expected to take place during February 2024 and no action is required on your end.
180+
In Azure, agentless scanning for VMs uses a built-in role (called [VM scanner operator](faq-permissions.yml)) with the minimum necessary permissions required to scan and assess your VMs for security issues. To continuously provide relevant scan health and configuration recommendations for VMs with encrypted volumes, an update to this role's permissions is planned. The update includes the addition of the ```Microsoft.Compute/DiskEncryptionSets/read``` permission. This permission solely enables improved identification of encrypted disk usage in VMs. It doesn't provide Defender for Cloud any more capabilities to decrypt or access the content of these encrypted volumes beyond the encryption methods [already supported](/azure/defender-for-cloud/concept-agentless-data-collection#availability) prior to this change. This change is expected to take place during February 2024 and no action is required on your end.
160181

161182
## Deprecation of two recommendations related to PCI
162183

0 commit comments

Comments
 (0)