You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/tutorial-enable-storage-plan.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ Microsoft Defender for Storage is an Azure-native solution offering an advanced
11
11
12
12
With Microsoft Defender for Storage, organizations can customize their protection and enforce consistent security policies by enabling it on subscriptions and storage accounts with granular control and flexibility.
13
13
14
-
> [!TIP]
14
+
> [!TIP]
15
15
> If you're currently using Microsoft Defender for Storage classic, consider [migrating to the new plan](defender-for-storage-classic-migrate.md), which offers several benefits over the classic plan.
16
16
17
17
## Availability
@@ -26,6 +26,7 @@ With Microsoft Defender for Storage, organizations can customize their protectio
26
26
*Azure DNS Zone is not supported for malware scanning and sensitive data threat detection.
27
27
28
28
## Prerequisites for malware scanning
29
+
29
30
To enable and configure malware scanning, you must have Owner roles (such as Subscription Owner or Storage Account Owner) or specific roles with the necessary data actions. Learn more about the [required permissions](support-matrix-defender-for-storage.md).
30
31
31
32
## Set up and configure Microsoft Defender for Storage
@@ -53,6 +54,3 @@ Enabling Defender for Storage via a policy is recommended because it facilitates
53
54
## Next steps
54
55
55
56
- Learn how to [enable and Configure the Defender for Storage plan at scale with an Azure built-in policy](defender-for-storage-policy-enablement.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/upcoming-changes.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,7 +57,6 @@ In February 2021, the deprecation of the MSCA task was communicated to all custo
57
57
58
58
Customers can get the latest DevOps security tooling from Defender for Cloud through [Microsoft Security DevOps](azure-devops-extension.md) and additional security tooling through [GitHub Advanced Security for Azure DevOps](https://azure.microsoft.com/products/devops/github-advanced-security).
59
59
60
-
61
60
## Update recommendations to align with Azure AI Services resources
62
61
63
62
**Announcement date: February 20, 2024**
@@ -97,7 +96,6 @@ Customers that are still using the API version **2022-09-01-preview** under `Mic
97
96
98
97
Customers currently using Defender for Cloud DevOps security from Azure portal won't be impacted.
99
98
100
-
101
99
For details on the new API version, see [Microsoft Defender for Cloud REST APIs](/rest/api/defenderforcloud/operation-groups).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/update-regulatory-compliance-packages.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,6 @@ ms.custom: ignite-2023
8
8
9
9
# Assign security standards
10
10
11
-
12
11
Defender for Cloud's regulatory standards and benchmarks are represented as [security standards](security-policy-concept.md). Each standard is an initiative defined in Azure Policy.
13
12
14
13
In Defender for Cloud, you assign security standards to specific scopes such as Azure subscriptions, AWS accounts, and GCP projects that have Defender for Cloud enabled.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/workflow-automation.md
+4-8Lines changed: 4 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,11 +18,10 @@ This article describes the workflow automation feature of Microsoft Defender for
18
18
- You must also have write permissions for the target resource.
19
19
- To work with Azure Logic Apps workflows, you must also have the following Logic Apps roles/permissions:
20
20
21
-
-[Logic App Operator](../role-based-access-control/built-in-roles.md#logic-app-operator) permissions are required or Logic App read/trigger access (this role can't create or edit logic apps; only *run* existing ones)
22
-
-[Logic App Contributor](../role-based-access-control/built-in-roles.md#logic-app-contributor) permissions are required for logic app creation and modification.
23
-
24
-
- If you want to use Logic Apps connectors, you might need other credentials to sign in to their respective services (for example, your Outlook/Teams/Slack instances).
21
+
-[Logic App Operator](../role-based-access-control/built-in-roles.md#logic-app-operator) permissions are required or Logic App read/trigger access (this role can't create or edit logic apps; only *run* existing ones)
22
+
-[Logic App Contributor](../role-based-access-control/built-in-roles.md#logic-app-contributor) permissions are required for logic app creation and modification.
25
23
24
+
- If you want to use Logic Apps connectors, you might need other credentials to sign in to their respective services (for example, your Outlook/Teams/Slack instances).
26
25
27
26
## Create a logic app and define when it should automatically run
28
27
@@ -79,7 +78,6 @@ The logic app designer supports the following Defender for Cloud triggers:
79
78
> [!NOTE]
80
79
> If you are using the legacy trigger "When a response to a Microsoft Defender for Cloud alert is triggered", your logic apps will not be launched by the Workflow Automation feature. Instead, use either of the triggers mentioned above.
81
80
82
-
83
81
1. After you've defined your logic app, return to the workflow automation definition pane ("Add workflow automation").
84
82
1. Select **Refresh** to ensure your new logic app is available for selection.
85
83
1. Select your logic app and save the automation. The logic app dropdown only shows those with supporting Defender for Cloud connectors mentioned above.
@@ -92,7 +90,7 @@ To manually run a logic app, open an alert, or a recommendation and select **Tri
92
90
93
91
[](media/workflow-automation/manually-trigger-logic-app.png#lightbox)
94
92
95
-
## Configure workflow automation at scale
93
+
## Configure workflow automation at scale
96
94
97
95
Automating your organization's monitoring and incident response processes can greatly improve the time it takes to investigate and mitigate security incidents.
98
96
@@ -110,9 +108,7 @@ To implement these policies:
110
108
|Workflow automation for security recommendations |[Deploy Workflow Automation for Microsoft Defender for Cloud recommendations](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F73d6ab6c-2475-4850-afd6-43795f3492ef)|73d6ab6c-2475-4850-afd6-43795f3492ef|
111
109
|Workflow automation for regulatory compliance changes|[Deploy Workflow Automation for Microsoft Defender for Cloud regulatory compliance](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F509122b9-ddd9-47ba-a5f1-d0dac20be63c)|509122b9-ddd9-47ba-a5f1-d0dac20be63c|
112
110
113
-
114
111
You can also find these by searching Azure Policy. In Azure Policy, select **Definitions** and search for them by name.
115
-
116
112
117
113
1. From the relevant Azure Policy page, select **Assign**.
118
114
:::image type="content" source="./media/workflow-automation/export-policy-assign.png" alt-text="Assigning the Azure Policy.":::
0 commit comments