Skip to content

Commit 5aadc39

Browse files
Merge pull request #88273 from memildin/asc-melvyn-test
Asc melvyn test
2 parents 682ebf7 + 49b3375 commit 5aadc39

File tree

70 files changed

+306
-357
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

70 files changed

+306
-357
lines changed
840 KB
Loading

articles/security-center/quick-onboard-azure-stack.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ services: security-center
55
documentationcenter: na
66
author: pipposera
77
manager: dsavage
8-
editor: ''
98

109
ms.assetid: 8982348a-0624-40c7-8a1e-642a523c7f6b
1110
ms.service: security-center

articles/security-center/quick-onboard-linux-computer.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,8 @@ title: Azure Security Center Quickstart - Onboard your Linux computers to Securi
33
description: This quickstart shows you how to onboard your Linux computers to Security Center.
44
services: security-center
55
documentationcenter: na
6-
author: rkarlin
7-
manager: barbkess
8-
editor: ''
6+
author: memildin
7+
manager: rkarlin
98

109
ms.assetid: 61e95a87-39c5-48f5-aee6-6f90ddcd336e
1110
ms.service: security-center
@@ -15,7 +14,7 @@ ms.custom: mvc
1514
ms.tgt_pltfrm: na
1615
ms.workload: na
1716
ms.date: 12/02/2018
18-
ms.author: rkarlin
17+
ms.author: memildin
1918

2019
---
2120
# Quickstart: Onboard Linux computers to Azure Security Center
@@ -80,7 +79,7 @@ To remove the agent:
8079
`sudo sh ./omsagent-<version>.universal.x64.sh --purge`
8180

8281
## Next steps
83-
In this quick start, you provisioned the agent on a Linux computer. To learn more about how to use Security Center, continue to the tutorial for configuring a security policy and assessing the security of your resources.
82+
In this quickstart, you provisioned the agent on a Linux computer. To learn more about how to use Security Center, continue to the tutorial for configuring a security policy and assessing the security of your resources.
8483

8584
> [!div class="nextstepaction"]
8685
> [Tutorial: Define and assess security policies](tutorial-security-policy.md)

articles/security-center/quick-onboard-windows-computer.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,8 @@ title: Azure Security Center Quickstart - Onboard your Windows computers to Secu
33
description: This quickstart shows you how to provision the Microsoft Monitoring Agent on a Windows computer.
44
services: security-center
55
documentationcenter: na
6-
author: rkarlin
7-
manager: barbkess
8-
editor: ''
6+
author: memildin
7+
manager: rkarlin
98

109
ms.assetid: 61e95a87-39c5-48f5-aee6-6f90ddcd336e
1110
ms.service: security-center
@@ -15,7 +14,7 @@ ms.custom: mvc
1514
ms.tgt_pltfrm: na
1615
ms.workload: na
1716
ms.date: 12/3/2018
18-
ms.author: rkarlin
17+
ms.author: memildin
1918

2019
---
2120
# Quickstart: Onboard Windows computers to Azure Security Center

articles/security-center/security-center-adaptive-application.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,8 @@ title: Adaptive application controls in Azure Security Center | Microsoft Docs
33
description: This document helps you to use adaptive application control in Azure Security Center to whitelist applications running in Azure VMs.
44
services: security-center
55
documentationcenter: na
6-
author: monhaber
7-
manager: barbkess
8-
editor: ''
6+
author: memildin
7+
manager: rkarlin
98

109
ms.assetid: 9268b8dd-a327-4e36-918e-0c0b711e99d2
1110
ms.service: security-center
@@ -14,14 +13,14 @@ ms.topic: conceptual
1413
ms.tgt_pltfrm: na
1514
ms.workload: na
1615
ms.date: 05/02/2019
17-
ms.author: v-mohabe
16+
ms.author: memildin
1817

1918
---
2019
# Adaptive application controls in Azure Security Center
2120
Learn how to configure application control in Azure Security Center using this walkthrough.
2221

2322
## What are adaptive application controls in Security Center?
24-
Adaptive application control is an intelligent, automated end-to-end application whitelisting solution from Azure Security Center. It helps you control which applications can run on your Azure and non-Azure VMs (Windows and Linux), which, among other benefits, helps harden your VMs against malware. Security Center uses machine learning to analyze the applications running on your VMs and helps you apply the specific whitelisting rules using this intelligence. This capability greatly simplifies the process of configuring and maintaining application whitelisting policies, enabling you to:
23+
Adaptive application control is an intelligent, automated, end-to-end solution from Azure Security Center which helps you control which applications can run on your Azure and non-Azure VMs (Windows and Linux). Among other benefits, this helps harden your VMs against malware. Security Center uses machine learning to analyze the applications running on your VMs and creates an allow list from this intelligence. This capability greatly simplifies the process of configuring and maintaining application allow list policies, enabling you to:
2524

2625
- Block or alert on attempts to run malicious applications, including those that might otherwise be missed by antimalware solutions.
2726
- Comply with your organization's security policy that dictates the use of only licensed software.
@@ -34,7 +33,7 @@ Adaptive application control is an intelligent, automated end-to-end application
3433
> For Non-Azure and Linux VMs, adaptive application controls are supported in audit mode only.
3534
3635
## How to enable adaptive application controls?
37-
Adaptive application controls help you define a set of applications that are allowed to run on configured groups of VMs. This feature is available for both Azure and non-Azure Windows (all versions, classic, or Azure Resource Manager) and Linux VMs and servers. The following steps can be used to configure application whitelisting in Security Center:
36+
Adaptive application controls help you define a set of applications that are allowed to run on configured groups of VMs. This feature is available for both Azure and non-Azure Windows (all versions, classic, or Azure Resource Manager) and Linux VMs and servers. Use the following steps to configure your application allow lists:
3837

3938
1. Open the **Security Center** dashboard.
4039
2. In the left pane, select **Adaptive application controls** located under **Advanced cloud defense**.
@@ -81,11 +80,11 @@ The **Groups of VMs** section contains three tabs:
8180

8281
- **NAME**: the certificate information or the full path of an application
8382
- **FILE TYPES**: the application file type. This can be EXE, Script, MSI, or any permutation of these types.
84-
- **EXPLOITABLE**: a warning icon indicates if a specific application could be used by an attacker to bypass an application whitelisting solution. It is recommended to review these applications prior to their approval.
83+
- **EXPLOITABLE**: a warning icon indicates if a specific application could be used by an attacker to bypass an application allow list. It is recommended to review these applications prior to their approval.
8584
- **USERS**: users that are recommended to be allowed to run an application
8685

8786
5. Once you finish your selections, select **Create**. <br>
88-
After you select Create, Azure Security Center automatically creates the appropriate rules on top of the built-in application whitelisting solution available on Windows servers (AppLocker).
87+
After you select Create, Azure Security Center automatically creates the appropriate rules on top of the built-in application allow list solution available on Windows servers (AppLocker).
8988

9089
> [!NOTE]
9190
> - Security Center relies on a minimum of two weeks of data in order to create a baseline and populate the unique recommendations per group of VMs. New customers of Security Center standard tier should expect a behavior in which at first their groups of VMs appear under the *no recommendation* tab.
@@ -95,15 +94,15 @@ The **Groups of VMs** section contains three tabs:
9594
9695
### Editing and monitoring a group configured with application control
9796

98-
1. To edit and monitor a group configured with an application whitelisting policy, return to the **Adaptive application controls** page and select **CONFIGURED** under **Groups of VMs**:
97+
1. To edit and monitor a group configured with an application allow list policy, return to the **Adaptive application controls** page and select **CONFIGURED** under **Groups of VMs**:
9998

10099
![Groups](./media/security-center-adaptive-application/security-center-adaptive-application-fig5.png)
101100

102101
The list includes:
103102

104103
- **Group Name**: the name of the subscription and group
105104
- **VMs and Computers**: the number of virtual machines in the group
106-
- **Mode**: Audit mode will log attempts to run non-whitelisted applications; Enforce will not allow non-whitelisted applications to run
105+
- **Mode**: Audit mode will log attempts to run applications that aren't on the allow list; Enforce will not allow applications to run unless they are on the allow list
107106
- **Alerts**: any current violations
108107

109108
2. Click on a group to make changes in the **Edit application control policy** page.
@@ -120,7 +119,7 @@ The **Groups of VMs** section contains three tabs:
120119
> - As previously mentioned, by default a new application control policy is always configured in *Audit* mode.
121120
>
122121
123-
4. Under **Policy extension**, add any application path that you want to allow. After you add these paths, Security Center updates the application whitelisting policy on the VMs within the selected group of VMS and creates the appropriate rules for these applications, in addition to the rules that are already in place.
122+
4. Under **Policy extension**, add any application path that you want to allow. After you add these paths, Security Center updates the application allow list policy on the VMs within the selected group of VMS and creates the appropriate rules for these applications, in addition to the rules that are already in place.
124123

125124
5. Review the current violations listed in the **Recent alerts** section. Click on each line to be redirected to the **Alerts** page within Azure Security Center, and view all the alerts that were detected by Azure Security Center on the associated VMs.
126125
- **Alerts**: any violations that were logged.

articles/security-center/security-center-adaptive-network-hardening.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,17 +3,17 @@ title: Adaptive Network Hardening in Azure Security Center | Microsoft Docs
33
description: " Learn how to enable Adaptive Network Hardening in Azure Security Center. "
44
services: security-center
55
documentationcenter: na
6-
author: monhaber
7-
manager: barbkess
8-
editor: monhaber
6+
author: memildin
7+
manager: rkarlin
8+
99
ms.assetid: 09d62d23-ab32-41f0-a5cf-8d80578181dd
1010
ms.service: security-center
1111
ms.devlang: na
1212
ms.topic: conceptual
1313
ms.tgt_pltfrm: na
1414
ms.workload: na
1515
ms.date: 05/24/2019
16-
ms.author: "v-mohabe"
16+
ms.author: memildin
1717
---
1818
# Adaptive Network Hardening in Azure Security Center
1919
Learn how to configure Adaptive Network Hardening in Azure Security Center.

articles/security-center/security-center-alert-validation.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,16 @@ title: Alert validation (EICAR test file) in Azure Security Center | Microsoft D
33
description: This document helps you to validate the security alerts in Azure Security Center.
44
services: security-center
55
documentationcenter: na
6-
author: rkarlin
7-
manager: barbkess
8-
editor: ''
9-
6+
author: memildin
7+
manager: rkarlin
108
ms.assetid: f8f17a55-e672-4d86-8ba9-6c3ce2e71a57
119
ms.service: security-center
1210
ms.devlang: na
1311
ms.topic: conceptual
1412
ms.tgt_pltfrm: na
1513
ms.workload: na
16-
ms.date: 7/02/2019
17-
ms.author: rkarlin
14+
ms.date: 07/02/2019
15+
ms.author: memildin
1816

1917
---
2018
# Alert validation (EICAR test file) in Azure Security Center

articles/security-center/security-center-alerts-cloud-smart.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,17 +3,17 @@ title: Cloud smart alert correlation in Azure Security Center (incidents) | Micr
33
description: This topic explains how fusion uses cloud smart alert correlation to generate security incidents in Azure Security Center.
44
services: security-center
55
documentationcenter: na
6-
author: monhaber
6+
author: memildin
77
manager: rkarlin
8-
editor: ''
8+
99
ms.assetid: e9d5a771-bfbe-458c-9a9b-a10ece895ec1
1010
ms.service: security-center
1111
ms.devlang: na
1212
ms.topic: conceptual
1313
ms.tgt_pltfrm: na
1414
ms.workload: na
15-
ms.date: 7/02/2019
16-
ms.author: "v-mohabe"
15+
ms.date: 07/02/2019
16+
ms.author: memildin
1717
---
1818
# Cloud smart alert correlation in Azure Security Center (incidents)
1919

articles/security-center/security-center-alerts-compute.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,17 +3,16 @@ title: Threat detection for cloud native compute in Azure Security Center | Micr
33
description: This topic presents the cloud native compute alerts available in Azure Security Center.
44
services: security-center
55
documentationcenter: na
6-
author: monhaber
6+
author: memildin
77
manager: rkarlin
8-
editor: ''
98
ms.assetid: 5aa5efcf-9f6f-4aa1-9f72-d651c6a7c9cd
109
ms.service: security-center
1110
ms.devlang: na
1211
ms.topic: conceptual
1312
ms.tgt_pltfrm: na
1413
ms.workload: na
1514
ms.date: 7/02/2019
16-
ms.author: "v-mohabe"
15+
ms.author: memildin
1716
---
1817
# Threat detection for cloud native compute in Azure Security Center
1918

articles/security-center/security-center-alerts-data-services.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,17 +3,14 @@ title: Threat detection for data services in Azure Security Center | Microsoft D
33
description: This topic presents the data services alerts available in Azure Security Center.
44
services: security-center
55
documentationcenter: na
6-
author: monhaber
6+
author: memildin
77
manager: rkarlin
8-
editor: ''
8+
99
ms.assetid: da960861-0b6c-4d80-932d-898cdebb4f83
1010
ms.service: security-center
11-
ms.devlang: na
1211
ms.topic: conceptual
13-
ms.tgt_pltfrm: na
14-
ms.workload: na
15-
ms.date: 7/24/2019
16-
ms.author: "v-mohabe"
12+
ms.date: 07/24/2019
13+
ms.author: memildin
1714
---
1815
# Threat detection for data services in Azure Security Center
1916

0 commit comments

Comments
 (0)