Skip to content

Commit 61c0e43

Browse files
updating planning section
1 parent 6f7c4ea commit 61c0e43

File tree

3 files changed

+11
-12
lines changed

3 files changed

+11
-12
lines changed

articles/defender-for-cloud/faq-general.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -359,7 +359,7 @@ sections:
359359
360360
:::image type="content" source="media/faq-general/change-region.png" alt-text="Screenshot that shows a change in region.":::
361361
362-
When configuring permission types, least privilege access supports features available at the time the template or script was run. New resource types can be supported only by re-running the template or script.
362+
When you configure permission types, least privilege access supports features available at the time the template or script was run. New resource types can be supported only by re-running the template or script.
363363
364364
:::image type="content" source="media/faq-general/permission-types.png" alt-text="Screenshot that shows selecting permission types.":::
365365

articles/defender-for-cloud/zero-trust.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,11 @@ ms.collection:
99

1010
# Zero trust and Defender for Cloud
1111

12-
This article provides strategy and instructions for integrating zero trust infrastructure solutions with [Microsoft Defender for Cloud](defender-for-cloud-introduction.md). The guidance includes integrations with other solutions, including security information and event maagement (SIEM), security orchestration automated response (SOAR), endpoint detection and response (EDR), and IT service management (ITSM) solutions.
12+
This article provides strategy and instructions for integrating zero trust infrastructure solutions with [Microsoft Defender for Cloud](defender-for-cloud-introduction.md). The guidance includes integrations with other solutions, including security information and event management (SIEM), security orchestration automated response (SOAR), endpoint detection and response (EDR), and IT service management (ITSM) solutions.
1313

1414
Infrastructure comprises the hardware, software, micro-services, networking infrastructure, and facilities required to support IT services for an organization. Whether on-premises or multicloud, infrastructure represents a critical threat vector.
1515

16-
Zero Trust infrastructure solutions assess, monitor, and prevent security threats to your infrastructure.Solutions support the principles of zero trust by ensuring that access to infrastructure resources is verified explicitly, and granted using principles of least privilege access. Mechanisms assume breach, and look for and remediate security threats in infrastructure.
16+
Zero Trust infrastructure solutions assess, monitor, and prevent security threats to your infrastructure. Solutions support the principles of zero trust by ensuring that access to infrastructure resources is verified explicitly, and granted using principles of least privilege access. Mechanisms assume breach, and look for and remediate security threats in infrastructure.
1717

1818
## What is zero trust?
1919

@@ -23,7 +23,7 @@ Zero Trust infrastructure solutions assess, monitor, and prevent security threat
2323

2424
## Zero Trust and Defender for Cloud
2525

26-
[Zero Trust infrastructure deployment guidance](/security/zero-trust/deploy/infrastructure) provides key stages of the Zero Trust strategy for infrastructure. Which are:
26+
[Zero Trust infrastructure deployment guidance](/security/zero-trust/deploy/infrastructure) provides key stages of zero trust infrastructure strategy:
2727

2828
1. [Assess compliance](update-regulatory-compliance-packages.yml) with chosen standards and policies.
2929
1. [Harden configuration](recommendations-reference.md) wherever gaps are found.
@@ -38,7 +38,7 @@ Here's how these stages map to Defender for Cloud.
3838
|Assess compliance | In Defender for Cloud, every subscription automatically has the [Microsoft cloud security benchmark (MCSB) security initiative assigned](security-policy-concept.md).<br>Using the [secure score tools](secure-score-security-controls.md) and the [regulatory compliance dashboard](update-regulatory-compliance-packages.yml) you can get a deep understanding of security posture. |
3939
| Harden configuration | Infrastructure and environment settings are assessed against compliance standard, and recommendations are issued based on those assessments. You can [review and remediate security recommendations](review-security-recommendations.md) and [track secure score improvements] (secure-score-access-and-track.md) over time. You can prioritize which recommendations to remediate based on potential [attack paths](how-to-manage-attack-path.md). |
4040
|Employ hardening mechanisms | Least privilege access is a zero trust principle. Defender for Cloud can help you to harden VMs and network settings using this principle with features such as:<br>[Just-in-time (JIT) VM access](just-in-time-access-overview.md), [adaptive network hardening](adaptive-network-hardening.md), and [adaptive application controls](adaptive-application-controls.md). |
41-
|Set up threat protection | Defender for Cloud is an cloud workload protection platform (CWPP), providing advanced, intelligent protection of Azure and hybrid resources and workloads. [Learn more](defender-for-cloud-introduction.md). |
41+
|Set up threat protection | Defender for Cloud is a cloud workload protection platform (CWPP), providing advanced, intelligent protection of Azure and hybrid resources and workloads. [Learn more](defender-for-cloud-introduction.md). |
4242
|Automatically block risky behavior | Many of the hardening recommendations in Defender for Cloud offer a *deny* option, to prevent the creation of resources that don't satisfy defined hardening criteria. [Learn more](./prevent-misconfigurations.md). |
4343
|Automatically flag suspicious behavior | Defenders for Cloud security alerts are triggered by threat detections. Defender for Cloud prioritizes and lists alerts, with information to help you investigate. It also provides detailed steps to help you remediate attacks. Review a [full list of security alerts](alerts-reference.md).|
4444

@@ -66,7 +66,7 @@ This is great way to define and respond in an automated, consistent manner when
6666

6767
## Integrate with SIEM, SOAR, and ITSM solutions
6868

69-
Defender for Cloud can stream your security alerts into the most popular SIEM, SOAR, and ITSM solutions. There are Azure-native tools to ensure you can view your alert data in all of the most popular solutions in use today, that include:
69+
Defender for Cloud can stream your security alerts into the most popular SIEM, SOAR, and ITSM solutions. There are Azure-native tools to ensure you can view your alert data in all of the most popular solutions in use today, including:
7070

7171
- Microsoft Sentinel
7272
- Splunk Enterprise and Splunk Cloud
@@ -115,7 +115,7 @@ You can use this API to stream alerts from the entire tenant, and data from many
115115
Use Defender for Cloud's [continuous export](continuous-export.md) feature to connect to Azure monitor via Azure Event Hubs, and stream alerts into **ArcSight**, **SumoLogic**, Syslog servers, **LogRhythm**, **Logz.io Cloud Observability Platform**, and other monitoring solutions.
116116

117117
- This can also be done at the Management Group level using Azure Policy. Learn about [creating continuous export automation configurations at scale](continuous-export.md).
118-
- To view the event schemas of the exported data types, review the [Event Hub event schemas](https://aka.ms/ASCAutomationSchemas).
118+
- To view the event schemas of the exported data types, review the [Event Hubs event schemas](https://aka.ms/ASCAutomationSchemas).
119119

120120
Learn more about [streaming alerts to monitoring solutions](export-to-siem.md).
121121

articles/security/index.yml

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
### YamlMime:Hub
22

33
title: Azure security documentation
4-
summary: Azure offers security advantages that support your compliance efforts, provide cost-effective security for your organization, and help protect your hybrid and multicloud platforms, applications, and data.
4+
summary: Azure offers security advantages that support compliance efforts, and provide cost-effective security for your organization, and help protect your hybrid and multicloud platforms, applications, and data.
55
brand: azure
66

77
metadata:
@@ -72,7 +72,6 @@ conceptualContent:
7272
- url: /security/zero-trust/develop/identity
7373
itemType: concept
7474
text: Building apps with a Zero Trust approach to identity
75-
7675
additionalContent:
7776
sections:
7877
- title: Security guidance for each phase of your cloud migration journey
@@ -220,20 +219,20 @@ additionalContent:
220219
links:
221220
- url: /azure/information-protection/what-is-information-protection
222221
text: Overview
223-
- url: /azure/information-protection/quickstart-deploy-client
222+
- url: /azure/information-protection/quickstart-deploy-aclient
224223
text: Deploying the client
225224
- url: /azure/information-protection/tutorial-scan-networks-and-content
226225
text: Discovering your sensitive content
227226

228227
- title: Microsoft Entra ID
229-
summary: Multi-tenant, cloud-based identity and access management service
228+
summary: Multitenant, cloud-based identity, and access management service
230229
links:
231230
- url: ../active-directory/fundamentals/active-directory-whatis.md
232231
text: Overview
233232
- url: ../active-directory/fundamentals/security-operations-introduction.md
234233
text: Security operations guide
235234
- url: /training/modules/secure-aad-users-with-mfa/
236-
text: "Learn: Secure Microsoft Entra users with Multi-Factor Authentication"
235+
text: "Learn: Secure Microsoft Entra users with Multifactor Authentication"
237236

238237
- title: Microsoft Defender XDR
239238
summary: Security solutions that protect your enterprise across attack surfaces

0 commit comments

Comments
 (0)