You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/faq-general.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -359,7 +359,7 @@ sections:
359
359
360
360
:::image type="content" source="media/faq-general/change-region.png" alt-text="Screenshot that shows a change in region.":::
361
361
362
-
When configuring permission types, least privilege access supports features available at the time the template or script was run. New resource types can be supported only by re-running the template or script.
362
+
When you configure permission types, least privilege access supports features available at the time the template or script was run. New resource types can be supported only by re-running the template or script.
363
363
364
364
:::image type="content" source="media/faq-general/permission-types.png" alt-text="Screenshot that shows selecting permission types.":::
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/zero-trust.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,11 +9,11 @@ ms.collection:
9
9
10
10
# Zero trust and Defender for Cloud
11
11
12
-
This article provides strategy and instructions for integrating zero trust infrastructure solutions with [Microsoft Defender for Cloud](defender-for-cloud-introduction.md). The guidance includes integrations with other solutions, including security information and event maagement (SIEM), security orchestration automated response (SOAR), endpoint detection and response (EDR), and IT service management (ITSM) solutions.
12
+
This article provides strategy and instructions for integrating zero trust infrastructure solutions with [Microsoft Defender for Cloud](defender-for-cloud-introduction.md). The guidance includes integrations with other solutions, including security information and event management (SIEM), security orchestration automated response (SOAR), endpoint detection and response (EDR), and IT service management (ITSM) solutions.
13
13
14
14
Infrastructure comprises the hardware, software, micro-services, networking infrastructure, and facilities required to support IT services for an organization. Whether on-premises or multicloud, infrastructure represents a critical threat vector.
15
15
16
-
Zero Trust infrastructure solutions assess, monitor, and prevent security threats to your infrastructure.Solutions support the principles of zero trust by ensuring that access to infrastructure resources is verified explicitly, and granted using principles of least privilege access. Mechanisms assume breach, and look for and remediate security threats in infrastructure.
16
+
Zero Trust infrastructure solutions assess, monitor, and prevent security threats to your infrastructure.Solutions support the principles of zero trust by ensuring that access to infrastructure resources is verified explicitly, and granted using principles of least privilege access. Mechanisms assume breach, and look for and remediate security threats in infrastructure.
17
17
18
18
## What is zero trust?
19
19
@@ -23,7 +23,7 @@ Zero Trust infrastructure solutions assess, monitor, and prevent security threat
23
23
24
24
## Zero Trust and Defender for Cloud
25
25
26
-
[Zero Trust infrastructure deployment guidance](/security/zero-trust/deploy/infrastructure) provides key stages of the Zero Trust strategy for infrastructure. Which are:
26
+
[Zero Trust infrastructure deployment guidance](/security/zero-trust/deploy/infrastructure) provides key stages of zero trust infrastructure strategy:
27
27
28
28
1.[Assess compliance](update-regulatory-compliance-packages.yml) with chosen standards and policies.
29
29
1.[Harden configuration](recommendations-reference.md) wherever gaps are found.
@@ -38,7 +38,7 @@ Here's how these stages map to Defender for Cloud.
38
38
|Assess compliance | In Defender for Cloud, every subscription automatically has the [Microsoft cloud security benchmark (MCSB) security initiative assigned](security-policy-concept.md).<br>Using the [secure score tools](secure-score-security-controls.md) and the [regulatory compliance dashboard](update-regulatory-compliance-packages.yml) you can get a deep understanding of security posture. |
39
39
| Harden configuration | Infrastructure and environment settings are assessed against compliance standard, and recommendations are issued based on those assessments. You can [review and remediate security recommendations](review-security-recommendations.md) and [track secure score improvements] (secure-score-access-and-track.md) over time. You can prioritize which recommendations to remediate based on potential [attack paths](how-to-manage-attack-path.md). |
40
40
|Employ hardening mechanisms | Least privilege access is a zero trust principle. Defender for Cloud can help you to harden VMs and network settings using this principle with features such as:<br>[Just-in-time (JIT) VM access](just-in-time-access-overview.md), [adaptive network hardening](adaptive-network-hardening.md), and [adaptive application controls](adaptive-application-controls.md). |
41
-
|Set up threat protection | Defender for Cloud is an cloud workload protection platform (CWPP), providing advanced, intelligent protection of Azure and hybrid resources and workloads. [Learn more](defender-for-cloud-introduction.md). |
41
+
|Set up threat protection | Defender for Cloud is a cloud workload protection platform (CWPP), providing advanced, intelligent protection of Azure and hybrid resources and workloads. [Learn more](defender-for-cloud-introduction.md). |
42
42
|Automatically block risky behavior | Many of the hardening recommendations in Defender for Cloud offer a *deny* option, to prevent the creation of resources that don't satisfy defined hardening criteria. [Learn more](./prevent-misconfigurations.md). |
43
43
|Automatically flag suspicious behavior | Defenders for Cloud security alerts are triggered by threat detections. Defender for Cloud prioritizes and lists alerts, with information to help you investigate. It also provides detailed steps to help you remediate attacks. Review a [full list of security alerts](alerts-reference.md).|
44
44
@@ -66,7 +66,7 @@ This is great way to define and respond in an automated, consistent manner when
66
66
67
67
## Integrate with SIEM, SOAR, and ITSM solutions
68
68
69
-
Defender for Cloud can stream your security alerts into the most popular SIEM, SOAR, and ITSM solutions. There are Azure-native tools to ensure you can view your alert data in all of the most popular solutions in use today, that include:
69
+
Defender for Cloud can stream your security alerts into the most popular SIEM, SOAR, and ITSM solutions. There are Azure-native tools to ensure you can view your alert data in all of the most popular solutions in use today, including:
70
70
71
71
- Microsoft Sentinel
72
72
- Splunk Enterprise and Splunk Cloud
@@ -115,7 +115,7 @@ You can use this API to stream alerts from the entire tenant, and data from many
115
115
Use Defender for Cloud's [continuous export](continuous-export.md) feature to connect to Azure monitor via Azure Event Hubs, and stream alerts into **ArcSight**, **SumoLogic**, Syslog servers, **LogRhythm**, **Logz.io Cloud Observability Platform**, and other monitoring solutions.
116
116
117
117
- This can also be done at the Management Group level using Azure Policy. Learn about [creating continuous export automation configurations at scale](continuous-export.md).
118
-
- To view the event schemas of the exported data types, review the [Event Hub event schemas](https://aka.ms/ASCAutomationSchemas).
118
+
- To view the event schemas of the exported data types, review the [Event Hubs event schemas](https://aka.ms/ASCAutomationSchemas).
119
119
120
120
Learn more about [streaming alerts to monitoring solutions](export-to-siem.md).
Copy file name to clipboardExpand all lines: articles/security/index.yml
+4-5Lines changed: 4 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
### YamlMime:Hub
2
2
3
3
title: Azure security documentation
4
-
summary: Azure offers security advantages that support your compliance efforts, provide cost-effective security for your organization, and help protect your hybrid and multicloud platforms, applications, and data.
4
+
summary: Azure offers security advantages that support compliance efforts, and provide cost-effective security for your organization, and help protect your hybrid and multicloud platforms, applications, and data.
5
5
brand: azure
6
6
7
7
metadata:
@@ -72,7 +72,6 @@ conceptualContent:
72
72
- url: /security/zero-trust/develop/identity
73
73
itemType: concept
74
74
text: Building apps with a Zero Trust approach to identity
75
-
76
75
additionalContent:
77
76
sections:
78
77
- title: Security guidance for each phase of your cloud migration journey
0 commit comments