You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/alerts-schemas.md
+19-15Lines changed: 19 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,26 +1,30 @@
1
1
---
2
-
title: Schemas for the Microsoft Defender for Cloud alerts
2
+
title: Alerts schema
3
3
description: This article describes the different schemas used by Microsoft Defender for Cloud for security alerts.
4
-
ms.topic: conceptual
4
+
ms.topic: concept-article
5
5
ms.author: dacurwin
6
6
author: dcurwin
7
-
ms.date: 11/09/2021
7
+
ms.date: 03/25/2024
8
+
#customer intent: As a reader, I want to understand the different schemas used by Microsoft Defender for Cloud for security alerts so that I can effectively work with the alerts.
8
9
---
9
10
10
-
# Security alerts schemas
11
+
# Alerts schemas
11
12
12
-
If your subscription has Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads) enabled, you receive security alerts when Defender for Cloud detects threats to their resources.
13
13
14
-
You can view these security alerts in Microsoft Defender for Cloud's pages - [overview dashboard](overview-page.md), [alerts](managing-and-responding-alerts.md), [resource health pages](investigate-resource-health.md), or [workload protections dashboard](workload-protections-dashboard.md) - and through external tools such as:
14
+
Defender for Cloud provides alerts that help you identify, understand, and respond to security threats. Alerts are generated when Defender for Cloud detects suspicious activity or a security-related issue in your environment. You can view these alerts in the Defender for Cloud portal, or you can export them to external tools for further analysis and response.
15
+
16
+
You can review security alerts from the [overview dashboard](overview-page.md), [alerts](managing-and-responding-alerts.md) page, [resource health pages](investigate-resource-health.md), or [workload protections dashboard](workload-protections-dashboard.md).
17
+
18
+
The following external tools can be used to consume alerts from Defender for Cloud:
15
19
16
20
-[Microsoft Sentinel](../sentinel/index.yml) - Microsoft's cloud-native SIEM. The Sentinel Connector gets alerts from Microsoft Defender for Cloud and sends them to the [Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md) for Microsoft Sentinel.
17
21
- Third-party SIEMs - Send data to [Azure Event Hubs](../event-hubs/index.yml). Then integrate your Event Hubs data with a third-party SIEM. Learn more in [Stream alerts to a SIEM, SOAR, or IT Service Management solution](export-to-siem.md).
18
22
-[The REST API](/rest/api/defenderforcloud/operation-groups?view=rest-defenderforcloud-2020-01-01&preserve-view=true) - If you're using the REST API to access alerts, see the [online Alerts API documentation](/rest/api/defenderforcloud/alerts).
19
23
20
-
If you're using any programmatic methods to consume the alerts, you need the correct schema to find the fields that are relevant to you. Also, if you're exporting to an Event Hubs or trying to trigger Workflow Automation with generic HTTP connectors, use the schemas to properly parse the JSON objects.
24
+
If you're using any programmatic methods to consume the alerts, you need the correct schema to find the fields that are relevant to you. Also, if you're exporting to an Event Hubs or trying to trigger Workflow Automation with generic HTTP connectors, schemas should be utilized to properly parse the JSON objects.
21
25
22
26
>[!IMPORTANT]
23
-
> The schema is slightly different for each of these scenarios, so make sure you select the relevant tab.
27
+
> Since the schema is different for each of these scenarios, ensure you select the relevant tab.
24
28
25
29
## The schemas
26
30
@@ -148,13 +152,13 @@ The schema and a JSON representation for security alerts sent to MS Graph, are a
148
152
149
153
---
150
154
151
-
## Next steps
152
-
153
-
This article described the schemas that Microsoft Defenders for Cloud's threat protection tools use when sending security alert information.
154
-
155
-
For more information on the ways to access security alerts from outside Defender for Cloud, see:
155
+
## Related articles
156
156
157
+
-[Log Analytics workspaces](../azure-monitor/logs/quick-create-workspace.md) - Azure Monitor stores log data in a Log Analytics workspace, a container that includes data and configuration information
-[Azure Event Hubs](../event-hubs/index.yml) - Microsoft's fully managed, real-time data ingestion service
159
-
-[Continuously export Defender for Cloud data](continuous-export.md)
160
-
-[Log Analytics workspaces](../azure-monitor/logs/quick-create-workspace.md) - Azure Monitor stores log data in a Log Analytics workspace, a container that includes data and configuration information
160
+
161
+
## Next step
162
+
163
+
> [!div class="nextstepaction"]
164
+
> [Continuously export Defender for Cloud data](continuous-export.md)
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/investigate-resource-health.md
+33-17Lines changed: 33 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,14 +2,14 @@
2
2
title: Tutorial - Investigate the health of your resources
3
3
description: 'Tutorial: Learn how to investigate the health of your resources using Microsoft Defender for Cloud.'
4
4
ms.topic: tutorial
5
-
ms.date: 01/24/2023
5
+
ms.date: 02/21/2024
6
6
---
7
7
8
8
# Tutorial: Investigate the health of your resources
9
9
10
10
The resource health page provides a snapshot view of the overall health of a single resource. You can review detailed information about the resource and all recommendations that apply to that resource. Also, if you're using any of the [advanced protection plans of Microsoft Defender for Cloud](defender-for-cloud-introduction.md), you can see outstanding security alerts for that specific resource too.
11
11
12
-
This single page, currently in preview, in Defender for Cloud's portal pages shows:
12
+
This single page, in Defender for Cloud's portal pages shows:
13
13
14
14
1.**Resource information** - The resource group and subscription it's attached to, the geographic location, and more.
15
15
1.**Applied security feature** - Whether a Microsoft Defender plan is enabled for the resource.
@@ -31,21 +31,31 @@ In this tutorial you'll learn how to:
31
31
To step through the features covered in this tutorial:
32
32
33
33
- You need an Azure subscription. If you don’t have an Azure subscription, create a [free account](https://azure.microsoft.com/free/) before you begin.
34
-
- To apply security recommendations, you must be signed in with an account that has the relevant permissions (Resource Group Contributor, Resource Group Owner, Subscription Contributor, or Subscription Owner)
35
-
- To dismiss alerts, you must be signed in with an account that has the relevant permissions (Security Admin, Subscription Contributor, or Subscription Owner)
34
+
35
+
-[Microsoft Defender for Cloud enabled on your subscription](connect-azure-subscription.md).
36
+
37
+
-**To apply security recommendations**: you must be signed in with an account that has the relevant permissions (Resource Group Contributor, Resource Group Owner, Subscription Contributor, or Subscription Owner)
38
+
39
+
-**To dismiss alerts**: you must be signed in with an account that has the relevant permissions (Security Admin, Subscription Contributor, or Subscription Owner)
36
40
37
41
## Access the health information for a resource
38
42
39
43
> [!TIP]
40
44
> In the following screenshots, we're opening a virtual machine, but the resource health page can show you the details for all resource types.
41
45
42
-
To open the resource health page for a resource:
46
+
**To open the resource health page for a resource**:
47
+
48
+
1. Sign in to the [Azure portal](https://portal.azure.com).
49
+
50
+
1. Search for and select **Microsoft Defender for Cloud**.
51
+
52
+
1. Select **Inventory**.
43
53
44
-
1. Select any resource from the [asset inventory page](asset-inventory.md).
54
+
1. Select any resource.
45
55
46
56
:::image type="content" source="media/investigate-resource-health/inventory-select-resource.png" alt-text="Select a resource from the asset inventory to view the resource health page." lightbox="./media/investigate-resource-health/inventory-select-resource.png":::
47
57
48
-
1.Use the left pane of the resource health page for an overview of the subscription, status, and monitoring information about the resource. You can also see whether enhanced security features are enabled for the resource:
58
+
1.Review the left pane of the resource health page for an overview of the subscription, status, and monitoring information about the resource. You can also see whether enhanced security features are enabled for the resource:
49
59
50
60
:::image type="content" source="media/investigate-resource-health/resource-health-left-pane.png" alt-text="The left pane of Microsoft Defender for Cloud's resource health page shows the subscription, status, and monitoring information about the resource. It also includes the total number of outstanding security recommendations and security alerts.":::
51
61
@@ -62,18 +72,24 @@ To open the resource health page for a resource:
62
72
63
73
The resource health page lists the recommendations for which your resource is "unhealthy" and the alerts that are active.
64
74
65
-
- To ensure your resource is hardened according to the policies applied to your subscriptions, fix the issues described in the recommendations:
66
-
1. From the right pane, select a recommendation.
67
-
1. Continue as instructed on screen.
75
+
### Harden a resource
76
+
77
+
To ensure your resource is hardened according to the policies applied to your subscriptions, fix the issues described in the recommendations:
78
+
79
+
1. From the right pane, select a recommendation.
80
+
81
+
1. Continue as instructed on screen.
82
+
83
+
> [!TIP]
84
+
> The instructions for fixing issues raised by security recommendations differ for each of Defender for Cloud's recommendations.
85
+
>
86
+
> To decide which recommendations to resolve first, look at the severity of each one and its [potential impact on your secure score](secure-score-security-controls.md).
87
+
88
+
### Investigate a security alert
68
89
69
-
> [!TIP]
70
-
> The instructions for fixing issues raised by security recommendations differ for each of Defender for Cloud's recommendations.
71
-
>
72
-
> To decide which recommendations to resolve first, look at the severity of each one and its [potential impact on your secure score](secure-score-security-controls.md).
90
+
1. From the right pane, select an alert.
73
91
74
-
- To investigate a security alert:
75
-
1. From the right pane, select an alert.
76
-
1. Follow the instructions in [Respond to security alerts](managing-and-responding-alerts.md#respond-to-a-security-alert).
92
+
1. Follow the instructions in [Respond to security alerts](managing-and-responding-alerts.md#respond-to-a-security-alert).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/sql-azure-vulnerability-assessment-find.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Find vulnerabilities in your Azure SQL databases
3
3
description: Learn how to find software vulnerabilities with the express configuration on Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/sql-information-protection-policy.md
+11-7Lines changed: 11 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,14 @@
1
1
---
2
2
title: SQL information protection policy
3
-
description: Learn how to customize information protection policies in Microsoft Defender for Cloud.
3
+
description: Learn how to customize information protection policies in Microsoft Defender for Cloud to secure your data effectively and meet compliance requirements.
4
4
ms.topic: how-to
5
5
ms.custom: devx-track-azurepowershell
6
6
author: dcurwin
7
7
ms.author: dacurwin
8
-
ms.date: 11/09/2021
8
+
ms.date: 03/25/2024
9
+
#customer intent: As a user, I want to learn how to customize information protection policies in Microsoft Defender for Cloud so that I can secure my data effectively.
9
10
---
11
+
10
12
# SQL information protection policy in Microsoft Defender for Cloud
11
13
12
14
SQL information protection's [data discovery and classification mechanism](/azure/azure-sql/database/data-discovery-and-classification-overview) provides advanced capabilities for discovering, classifying, labeling, and reporting the sensitive data in your databases. It's built into [Azure SQL Database](/azure/azure-sql/database/sql-database-paas-overview), [Azure SQL Managed Instance](/azure/azure-sql/managed-instance/sql-managed-instance-paas-overview), and [Azure Synapse Analytics](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is.md).
@@ -127,11 +129,13 @@ Learn more in [Grant and request tenant-wide visibility](tenant-wide-permissions
127
129
-[Get-AzSqlInformationProtectionPolicy](/powershell/module/az.security/get-azsqlinformationprotectionpolicy): Retrieves the effective tenant SQL information protection policy.
128
130
-[Set-AzSqlInformationProtectionPolicy](/powershell/module/az.security/set-azsqlinformationprotectionpolicy): Sets the effective tenant SQL information protection policy.
129
131
130
-
## Next steps
132
+
## Related articles
133
+
134
+
-[Azure SQL Database Data Discovery and Classification](/azure/azure-sql/database/data-discovery-and-classification-overview)
131
135
132
-
In this article, you learned about defining an information protection policy in Microsoft Defender for Cloud. To learn more about using SQL Information Protection to classify and protect sensitive data in your SQL databases, see [Azure SQL Database Data Discovery and Classification](/azure/azure-sql/database/data-discovery-and-classification-overview).
136
+
-[Microsoft Defender for Clouddata security](data-security.md)
133
137
134
-
For more information on security policies and data security in Defender for Cloud, see the following articles:
138
+
## Next step
135
139
136
-
-[Setting security policies in Microsoft Defender for Cloud](tutorial-security-policy.md): Learn how to configure security policies for your Azure subscriptions and resource groups
137
-
-[Microsoft Defender for Cloud data security](data-security.md): Learn how Defender for Cloud manages and safeguards data
140
+
> [!div class="nextstepaction"]
141
+
> [Setting security policies in Microsoft Defender for Cloud](tutorial-security-policy.md)
0 commit comments