Skip to content

Commit 563e68c

Browse files
authored
Merge pull request #258481 from rayne-wiselman/rayne-ignite-PR4
Rayne ignite pr4
2 parents 5f1fbc7 + def5976 commit 563e68c

29 files changed

+375
-400
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -110,10 +110,6 @@
110110
- name: Investigate and respond to security alerts
111111
displayName: triage, security, alerts, investigate,
112112
href: tutorial-security-incident.md
113-
- name: Improve your regulatory compliance
114-
displayName: regulatory, compliance, remediate, assessment, reports,
115-
certificates, export, workflow, automation
116-
href: regulatory-compliance-dashboard.md
117113
- name: Manage security policies
118114
displayName: security, policies, edit, disable
119115
href: tutorial-security-policy.md
@@ -345,26 +341,30 @@
345341
displayName: gcp, assessment, standards, built-in, compliance, standard, custom,
346342
assessment, query
347343
href: how-to-manage-gcp-assessments-standards.md
348-
- name: Review your security recommendations
344+
- name: Prevent misconfigurations with Enforce/Deny
345+
displayName: recommendations, enforce, deny
346+
href: prevent-misconfigurations.md
347+
- name: Disable a recommendation
348+
displayName: recommendation, disable, security, policy,
349+
href: tutorial-security-policy.md#disable-a-security-recommendation
350+
- name: Investigate and remediate security posture
351+
items:
352+
- name: Review security recommendations
349353
displayName: security, recommendations, owner, azure, resource, graph, azure
350354
resource graph, csv report
351355
href: review-security-recommendations.md
356+
- name: Review exempted resources
357+
href: review-exemptions.md
352358
- name: Remediate recommendations
353359
displayName: remediation, steps, recommendations, fix, actions, activity log
354360
href: implement-security-recommendations.md
355-
- name: Improve your security posture with recommendation governance
361+
- name: Drive remediation with governance rules
356362
displayName: security, posture, recommendation, governance, automated, rules,
357363
owners, status, progress
358364
href: governance-rules.md
359-
- name: Prevent misconfigurations with Enforce/Deny
360-
displayName: recommendations, enforce, deny
361-
href: prevent-misconfigurations.md
362-
- name: Automate responses to recommendations
365+
- name: Automate remediation responses
363366
displayName: workflow, triggers, logic app, automation, policies, breaking change
364367
href: workflow-automation.md
365-
- name: Disable a recommendation
366-
displayName: recommendation, disable, security, policy,
367-
href: tutorial-security-policy.md#disable-a-security-recommendation
368368
- name: Built-in security protections
369369
items:
370370
- name: Leverage Purview to protect sensitive data
@@ -667,7 +667,7 @@
667667
href: powershell-sample-vulnerability-assessment-baselines.md
668668
- name: Express configuration PowerShell wrapper module
669669
href: express-configuration-sql-commands.md
670-
- name: Example express configuration PowerShell commands reference
670+
- name: Example - express configuration
671671
href: express-configuration-powershell-commands.md
672672
- name: Azure CLI examples
673673
href: express-configuration-azure-commands.md

articles/defender-for-cloud/agentless-container-registry-vulnerability-assessment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Container vulnerability assessment powered by MDVM (Microsoft Defender Vulnerabi
2929
| [Azure registry container images should have vulnerabilities resolved (powered by Microsoft Defender Vulnerability Management)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/PhoenixContainerRegistryRecommendationDetailsBlade/assessmentKey/c0b7cfc6-3172-465a-b378-53c7ff2cc0d5) | Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. Resolving vulnerabilities can greatly improve your security posture, ensuring images are safe to use prior to deployment. | c0b7cfc6-3172-465a-b378-53c7ff2cc0d5 |
3030
| [Azure running container images should have vulnerabilities resolved (powered by Microsoft Defender Vulnerability Management)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/ContainersRuntimeRecommendationDetailsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5)  | Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. This recommendation provides visibility to vulnerable images currently running in your Kubernetes clusters. Remediating vulnerabilities in container images that are currently running is key to improving your security posture, significantly reducing the attack surface for your containerized workloads. | c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5 |
3131

32-
- **Query vulnerability information via the Azure Resource Graph** - Ability to query vulnerability information via the [Azure Resource Graph](/azure/governance/resource-graph/overview#how-resource-graph-complements-azure-resource-manager). Learn how to [query recommendations via ARG](review-security-recommendations.md#review-recommendation-data-in-azure-resource-graph-arg).
32+
- **Query vulnerability information via the Azure Resource Graph** - Ability to query vulnerability information via the [Azure Resource Graph](/azure/governance/resource-graph/overview#how-resource-graph-complements-azure-resource-manager). Learn how to [query recommendations via ARG](review-security-recommendations.md).
3333
- **Query scan results via REST API** - Learn how to query scan results via [REST API](subassessment-rest-api.md).
3434
- **Support for exemptions** - Learn how to [create exemption rules for a management group, resource group, or subscription](disable-vulnerability-findings-containers.md).
3535
- **Support for disabling vulnerabilities** - Learn how to [disable vulnerabilities on images](disable-vulnerability-findings-containers.md).

articles/defender-for-cloud/defender-for-cloud-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Defender for Cloud includes Foundational CSPM capabilities for free. You can als
4545
| [Data-aware Security Posture](concept-data-security-posture.md) | Data-aware security posture automatically discovers datastores containing sensitive data, and helps reduce risk of data breaches. | [Enable data-aware security posture](data-security-posture-enable.md) | Defender CSPM or Defender for Storage |
4646
| [Attack path analysis](concept-attack-path.md#what-is-attack-path-analysis) | Model traffic on your network to identify potential risks before you implement changes to your environment. | [Build queries to analyze paths](how-to-manage-attack-path.md) | Defender CSPM |
4747
| [Cloud Security Explorer](concept-attack-path.md#what-is-cloud-security-explorer) | A map of your cloud environment that lets you build queries to find security risks. | [Build queries to find security risks](how-to-manage-cloud-security-explorer.md) | Defender CSPM |
48-
| [Security governance](governance-rules.md#building-an-automated-process-for-improving-security-with-governance-rules) | Drive security improvements through your organization by assigning tasks to resource owners and tracking progress in aligning your security state with your security policy. | [Define governance rules](governance-rules.md#defining-governance-rules-to-automatically-set-the-owner-and-due-date-of-recommendations) | Defender CSPM |
48+
| [Security governance](governance-rules.md) | Drive security improvements through your organization by assigning tasks to resource owners and tracking progress in aligning your security state with your security policy. | [Define governance rules](governance-rules.md) | Defender CSPM |
4949
| [Microsoft Entra Permissions Management](../active-directory/cloud-infrastructure-entitlement-management/index.yml) | Provide comprehensive visibility and control over permissions for any identity and any resource in Azure, AWS, and GCP. | [Review your Permission Creep Index (CPI)](other-threat-protections.md#entra-permission-management-formerly-cloudknox) | Defender CSPM |
5050

5151
## Protect cloud workloads

articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Container vulnerability assessment powered by Qualys has the following capabilit
3434
| [Azure registry container images should have vulnerabilities resolved (powered by Qualys)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/ContainerRegistryRecommendationDetailsBlade/assessmentKey/dbd0cb49-b563-45e7-9724-889e799fa648)| Container image vulnerability assessment scans your registry for security vulnerabilities and exposes detailed findings for each image. Resolving the vulnerabilities can greatly improve your containers security posture and protect them from attacks. | dbd0cb49-b563-45e7-9724-889e799fa648 |
3535
| [Azure running container images should have vulnerabilities resolved - (powered by Qualys)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/KubernetesRuntimeVisibilityRecommendationDetailsBlade/assessmentKey/41503391-efa5-47ee-9282-4eff6131462c)| Container image vulnerability assessment scans container images running on your Kubernetes clusters for security vulnerabilities and exposes detailed findings for each image. Resolving the vulnerabilities can greatly improve your containers security posture and protect them from attacks. | 41503391-efa5-47ee-9282-4eff6131462c |
3636

37-
- **Query vulnerability information via the Azure Resource Graph** - Ability to query vulnerability information via the [Azure Resource Graph](/azure/governance/resource-graph/overview#how-resource-graph-complements-azure-resource-manager). Learn how to [query recommendations via the ARG](review-security-recommendations.md#review-recommendation-data-in-azure-resource-graph-arg).
37+
- **Query vulnerability information via the Azure Resource Graph** - Ability to query vulnerability information via the [Azure Resource Graph](/azure/governance/resource-graph/overview#how-resource-graph-complements-azure-resource-manager). Learn how to [query recommendations via the ARG](review-security-recommendations.md).
3838

3939
- **Query vulnerability information via sub-assessment API** - You can get scan results via REST API. See the [subassessment list](/rest/api/defenderforcloud/sub-assessments/get).
4040
- **Support for exemptions** - Learn how to [create exemption rules for a management group, resource group, or subscription](disable-vulnerability-findings-containers.md).

articles/defender-for-cloud/exempt-resource.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: dcurwin
88
ms.date: 10/29/2023
99
---
1010

11-
# Exempt resources from recommendations in Defender for Cloud
11+
# Exempt resources from recommendations
1212

1313

1414
When you investigate security recommendations in Microsoft Defender for Cloud, you usually review the list of affected resources. Occasionally, a resource will be listed that you feel shouldn't be included. Or a recommendation will show in a scope where you feel it doesn't belong. For example, a resource might have been remediated by a process not tracked by Defender for Cloud, or a recommendation might be inappropriate for a specific subscription. Or perhaps your organization has decided to accept the risks related to the specific resource or recommendation.
@@ -21,12 +21,12 @@ In such cases, you can create an exemption to:
2121

2222
For the scope you need, you can create an exemption rule to:
2323

24-
- Mark a specific **recommendation** or as "mitigated" or "risk accepted" for one or more subscriptions, or for an entire management group.
24+
- Mark a specific **recommendation** as "mitigated" or "risk accepted" for one or more subscriptions, or for an entire management group.
2525
- Mark **one or more resources** as "mitigated" or "risk accepted" for a specific recommendation.
2626

2727
## Before you start
2828

29-
This feature is in preview. [!INCLUDE [Legalese](../../includes/defender-for-cloud-preview-legal-text.md)]. This is a premium Azure Policy capability that's offered at no more cost for customers with Microsoft Defender for Cloud's enhanced security features enabled. For other users, charges might apply in the future. [Review Azure cloud support](support-matrix-cloud-environment.md).
29+
This feature is in preview. [!INCLUDE [Legalese](../../includes/defender-for-cloud-preview-legal-text.md)] This is a premium Azure Policy capability that's offered at no additional cost for customers with Microsoft Defender for Cloud's enhanced security features enabled. For other users, charges might apply in the future.
3030

3131
- You need the following permissions to make exemptions:
3232
- **Owner** or **Security Admin** or **Resource Policy Contributor** to create an exemption
@@ -43,7 +43,7 @@ To create an exemption rule:
4343

4444
1. In the Defender for Cloud portal, open the **Recommendations** page, and select the recommendation you want to exempt.
4545

46-
1. From the toolbar at the top of the page, select **Exempt**.
46+
1. In **Take action**, select **Exempt**.
4747

4848
:::image type="content" source="media/exempt-resource/exempting-recommendation.png" alt-text="Create an exemption rule for a recommendation to be exempted from a subscription or management group.":::
4949

@@ -74,10 +74,9 @@ After creating the exemption it can take up to 30 minutes to take effect. After
7474
- If you've exempted specific resources, they'll be listed in the **Not applicable** tab of the recommendation details page.
7575
- If you've exempted a recommendation, it will be hidden by default on Defender for Cloud's recommendations page. This is because the default options of the **Recommendation status** filter on that page are to exclude **Not applicable** recommendations. The same is true if you exempt all recommendations in a security control.
7676

77-
:::image type="content" source="media/exempt-resource/recommendations-filters-hiding-not-applicable.png" alt-text="Screenshot showing default filters on Microsoft Defender for Cloud's recommendations page hide the not applicable recommendations and security controls." lightbox="media/exempt-resource/recommendations-filters-hiding-not-applicable.png":::
7877

7978

8079

8180
## Next steps
8281

83-
[Review recommendations](review-security-recommendations.md) in Defender for Cloud.
82+
[Review exempted resources](review-exemptions.md) in Defender for Cloud.

0 commit comments

Comments
 (0)