Skip to content

Commit 5cff1a0

Browse files
authored
Merge pull request #275566 from ElazarK/WI242968-freshness
freshness
2 parents d7296dc + 9cef6ff commit 5cff1a0

32 files changed

+106
-82
lines changed

articles/defender-for-cloud/auto-deploy-vulnerability-assessment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Automatically assess machines for vulnerabilities
33
description: Use Microsoft Defender for Cloud to automatically ensure your machines have a vulnerability assessment solution
44
ms.topic: how-to
5-
ms.date: 04/24/2023
5+
ms.date: 05/16/2024
66
---
77

88
# Automatically configure vulnerability assessment for your machines

articles/defender-for-cloud/concept-defender-for-cosmos.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Overview of Defender for Azure Cosmos DB
33
description: Learn about the benefits and features of Microsoft Defender for Azure Cosmos DB.
4-
ms.topic: conceptual
4+
ms.topic: concept-article
55
ms.author: dacurwin
66
author: dcurwin
7-
ms.date: 11/27/2022
7+
ms.date: 05/30/2024
88
---
99

1010
# Overview of Microsoft Defender for Azure Cosmos DB

articles/defender-for-cloud/concept-easm.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
2-
title: Microsoft Defender for Cloud integration with Defender External Attack Surface Management (EASM)
3-
description: Learn about Defender for Cloud integration with Defender External attack surface management (EASM)
4-
ms.topic: conceptual
5-
ms.date: 03/05/2023
2+
title: Microsoft Defender for Cloud integration with Defender External attack surface management (EASM)
3+
description: Learn about Defender for Cloud integration with Defender External attack surface management (EASM) to enhance security and reduce the risk of attacks.
4+
ms.topic: concept-article
5+
ms.date: 05/20/2024
6+
#customer intent: As a reader, I want to learn about the integration between Defender for Cloud and Defender External attack surface management (EASM) so that I can enhance my organization's security.
67
---
78

89
# Integration with Defender EASM

articles/defender-for-cloud/create-custom-recommendations.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22
title: Create custom security standards and recommendations
33
description: Learn how to create custom security standards and recommendations for all clouds in Microsoft Defender for Cloud.
44
ms.topic: how-to
5-
ms.date: 03/26/2023
5+
ms.date: 05/16/2024
6+
#customer intent: As a user, I want to learn how to create custom security standards and recommendations in Microsoft Defender for Cloud.
67
---
78

89
# Create custom security standards and recommendations in Microsoft Defender for Cloud

articles/defender-for-cloud/cross-tenant-management.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Cross-tenant management
33
description: Learn how to set up cross-tenant management to manage the security posture of multiple tenants in Defender for Cloud using Azure Lighthouse.
4-
ms.topic: conceptual
4+
ms.topic: concept-article
55
ms.author: dacurwin
66
author: dcurwin
7-
ms.date: 11/09/2021
7+
ms.date: 05/30/2024
88
---
99

1010
# Cross-tenant management in Defender for Cloud
@@ -25,7 +25,7 @@ You're able to review and manage subscriptions across multiple tenants in the sa
2525

2626
From the top menu bar, select the filter icon, and select the subscriptions, from each tenant's directory, you'd like to view.
2727

28-
![Filter tenants.](./media/cross-tenant-management/cross-tenant-filter.png)
28+
:::image type="content" source="media/cross-tenant-management/cross-tenant-filter.png" alt-text="Screenshot that shows where the cross tenant filter button is located.":::
2929

3030
The views and actions are basically the same. Here are some examples:
3131

articles/defender-for-cloud/defender-for-cloud-planning-and-operations-guide.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
title: Defender for Cloud Planning and Operations Guide
33
description: This document helps you to plan before adopting Defender for Cloud and considerations regarding daily operations.
4-
ms.topic: conceptual
5-
ms.date: 02/06/2023
4+
ms.topic: concept-article
5+
ms.date: 05/16/2024
6+
#customer intent: As a reader, I want to understand the planning and operations considerations for adopting Defender for Cloud and how it fits into my organization's security requirements and cloud management model. I also want to learn about the security roles, access controls, security policies, data collection, and storage in Defender for Cloud.
67
---
78

89
# Planning and operations guide
@@ -29,7 +30,7 @@ In the next section, you'll learn how to plan for each one of those areas and ap
2930

3031
Depending on the size and structure of your organization, multiple individuals and teams might use Defender for Cloud to perform different security-related tasks. In the following diagram, you have an example of fictitious personas and their respective roles and security responsibilities:
3132

32-
:::image type="content" source="./media/defender-for-cloud-planning-and-operations-guide/defender-for-cloud-planning-and-operations-guide-fig01-new.png" alt-text="Roles.":::
33+
:::image type="content" source="./media/defender-for-cloud-planning-and-operations-guide/defender-for-cloud-planning-and-operations-guide-fig01-new.png" alt-text="Conceptual image that shows various people and the roles that they fill in an organization.":::
3334

3435
Defender for Cloud enables these individuals to meet these various responsibilities. For example:
3536

@@ -228,7 +229,7 @@ Each Security Alert provides information that can be used to better understand t
228229

229230
The following example shows a suspicious RDP activity taking place:
230231

231-
:::image type="content" source="./media/defender-for-cloud-planning-and-operations-guide/defender-for-cloud-planning-and-operations-guide-fig5-ga.png" alt-text="Suspicious activity.":::
232+
:::image type="content" source="./media/defender-for-cloud-planning-and-operations-guide/defender-for-cloud-planning-and-operations-guide-fig5-ga.png" alt-text="Screenshot of a suspicious activity report while it is taking place..":::
232233

233234
This page shows the details regarding the time that the attack took place, the source hostname, the target VM and also gives recommendation steps. In some circumstances, the source information of the attack might be empty. Read [Missing Source Information in Defender for Cloud alerts](/archive/blogs/azuresecurity/missing-source-information-in-azure-security-center-alerts) for more information about this type of behavior.
234235

articles/defender-for-cloud/defender-for-kubernetes-introduction.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,11 @@
11
---
22
title: Microsoft Defender for Kubernetes - the benefits and features
3-
description: Learn about the benefits and features of Microsoft Defender for Kubernetes.
4-
ms.date: 07/11/2022
3+
description: Learn about the benefits and features of Microsoft Defender for Kubernetes and how it provides real-time threat protection for your Azure Kubernetes Service (AKS) containerized environments.
4+
ms.date: 05/16/2024
55
author: dcurwin
66
ms.author: dacurwin
77
ms.topic: overview
8+
#customer intent: As a reader, I want to learn about the benefits and features of Microsoft Defender for Kubernetes so that I can understand its capabilities.
89
---
910

1011
# Introduction to Microsoft Defender for Kubernetes (deprecated)

articles/defender-for-cloud/defender-for-resource-manager-introduction.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
2-
title: Microsoft Defender for Resource Manager - the benefits and features
3-
description: Learn about the benefits and features of Microsoft Defender for Resource Manager
4-
ms.date: 05/01/2023
2+
title: Microsoft Defender for Resource Manager - Benefits and Features
3+
description: Learn about the benefits and features of Microsoft Defender for Resource Manager to protect your Azure resources from potential threats.
4+
ms.date: 05/16/2024
55
ms.topic: overview
6+
#customer intent: As a security operations team, I want to learn about the benefits and features of Microsoft Defender for Resource Manager so that I can protect the resource management layer of my Azure resources.
67
---
78

89
# Overview of Microsoft Defender for Resource Manager

articles/defender-for-cloud/defender-for-resource-manager-usage.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: How to respond to Microsoft Defender for Resource Manager alerts
33
description: Learn about the steps necessary for responding to alerts from Microsoft Defender for Resource Manager
4-
ms.date: 11/09/2021
4+
ms.date: 05/30/2024
55
ms.topic: how-to
66
ms.author: dacurwin
77
author: dcurwin
@@ -11,13 +11,13 @@ author: dcurwin
1111

1212
When you receive an alert from Microsoft Defender for Resource Manager, we recommend you investigate and respond to the alert as described below. Defender for Resource Manager protects all connected resources, so even if you're familiar with the application or user that triggered the alert, it's important to verify the situation surrounding every alert.
1313

14-
## Step 1: Contact
14+
## Contact
1515

1616
1. Contact the resource owner to determine whether the behavior was expected or intentional.
1717
1. If the activity is expected, dismiss the alert.
1818
1. If the activity is unexpected, treat the related user accounts, subscriptions, and virtual machines as compromised and mitigate as described in the following step.
1919

20-
## Step 2: Investigate alerts from Microsoft Defender for Resource Manager
20+
## Investigate alerts from Microsoft Defender for Resource Manager
2121

2222
Security alerts from Defender for Resource Manager are based on threats detected by monitoring Azure Resource Manager operations. Defender for Cloud uses internal log sources of Azure Resource Manager as well as Azure Activity log, a platform log in Azure that provides insight into subscription-level events.
2323

@@ -45,7 +45,7 @@ To investigate security alerts from Defender for Resource Manager:
4545
> [!TIP]
4646
> For a better, richer investigation experience, stream your Azure activity logs to Microsoft Sentinel as described in [Connect data from Azure Activity log](../sentinel/data-connectors/azure-activity.md).
4747
48-
## Step 3: Immediate mitigation
48+
## Mitigate immediately
4949

5050
1. Remediate compromised user accounts:
5151
- If they’re unfamiliar, delete them as they might have been created by a threat actor

articles/defender-for-cloud/defender-for-sql-on-machines-vulnerability-assessment.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,11 @@
11
---
2-
title: Scan for vulnerabilities on on-premises and Azure Arc-enabled SQL servers
2+
title: Scan for vulnerabilities on SQL servers
33
description: Learn about Microsoft Defender for SQL servers on machines' integrated vulnerability assessment scanner
44
ms.topic: how-to
55
ms.author: dacurwin
66
author: dcurwin
7-
ms.date: 11/09/2021
7+
ms.date: 05/20/2024
8+
#customer intent: As a user, I want to scan for vulnerabilities on SQL servers using Microsoft Defender for SQL servers on machines' integrated vulnerability assessment scanner.
89
---
910

1011
# Scan your SQL servers for vulnerabilities
@@ -37,7 +38,7 @@ You can view the vulnerability assessment results directly from Defender for Clo
3738

3839
The detailed view for this recommendation appears.
3940

40-
:::image type="content" source="./media/defender-for-sql-on-machines-vulnerability-assessment/sql-vulnerability-findings.png" alt-text="Recommendation details page.":::
41+
:::image type="content" source="./media/defender-for-sql-on-machines-vulnerability-assessment/sql-vulnerability-findings.png" alt-text="Screenshot of the recommendation details page.":::
4142

4243
1. For more details, drill down:
4344

@@ -106,7 +107,7 @@ To create a rule:
106107

107108
1. From the scope list, subscriptions with active rules show as **Rule applied**.
108109

109-
:::image type="content" source="./media/remediate-vulnerability-findings-vm/modify-rule.png" alt-text="Modify or delete an existing rule.":::
110+
:::image type="content" source="./media/remediate-vulnerability-findings-vm/modify-rule.png" alt-text="Screenshot showing how to modify or delete an existing rule in the Defender for Cloud portal.":::
110111

111112
1. To view or delete the rule, select the ellipsis menu ("...").
112113

@@ -140,6 +141,7 @@ Metadata information about the connected machine is also collected. Specifically
140141

141142
You can specify the region where your SQL Vulnerability Assessment data will be stored by choosing the Log Analytics workspace location. Microsoft might replicate to other regions for data resiliency, but Microsoft does not replicate data outside the geography.
142143

143-
## Next steps
144+
## Next step
144145

145-
Learn more about Defender for Cloud's protections for SQL resources in [Overview of Microsoft Defender for SQL](defender-for-sql-introduction.md).
146+
> [!div class="nextstepaction"]
147+
> [Overview of Microsoft Defender for SQL](defender-for-sql-introduction.md).

0 commit comments

Comments
 (0)