Skip to content

Commit 62724c6

Browse files
Merge pull request #259019 from ElazarK/WI185202-sanity-test
sanity test
2 parents 25096b0 + 6d64f12 commit 62724c6

22 files changed

+246
-127
lines changed

articles/defender-for-cloud/advanced-configurations-for-malware-scanning.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Defender for Storage - advanced configurations for malware scanning
33
description: Learn about the advanced configurations of Microsoft Defender for Storage malware scanning
4-
ms.date: 08/21/2023
4+
ms.date: 11/20/2023
55
author: dcurwin
66
ms.author: dacurwin
77
ms.topic: conceptual
@@ -118,7 +118,7 @@ Overriding the settings of the subscriptions are usually used for the following
118118

119119
To configure the settings of individual storage accounts different from those configured on the subscription level using the Azure portal:
120120

121-
1. Sign in to the Azure portal.
121+
1. Sign in to the [Azure portal](https://portal.azure.com/).
122122

123123
1. Navigate to your storage account that you want to configure custom settings.
124124

articles/defender-for-cloud/concept-regulatory-compliance-standards.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Regulatory compliance standards in Microsoft Defender for Cloud
33
description: Learn about regulatory compliance standards in Microsoft Defender for Cloud
44
ms.topic: conceptual
55
ms.custom: ignite-2022
6-
ms.date: 01/10/2023
6+
ms.date: 11/27/2023
77
---
88

99
# Regulatory compliance standards
@@ -61,7 +61,7 @@ You can drill down into controls to get information about resources that have pa
6161
By default, when you enable Defender for Cloud, the following standards are enabled:
6262

6363
- **Azure**: The [Microsoft Cloud Security Benchmark (MCSB)](concept-regulatory-compliance.md) is enabled for Azure subscriptions.
64-
- **AWS**: AWS accounts get the [AWS Foundational Security Best Practices standard](https://docs.aws.amazon.com/securityhub/latest/userguide/fsbp-standard.html) assigned. This standard contains AWS-specific guidelines for security and compliance best practices based on common compliance frameworks. AWS accounts also have MCSB assigned by default.
64+
- **AWS**: AWS accounts get the [AWS Foundational Security Best Practices standard](https://docs.aws.amazon.com/securityhub/latest/userguide/fsbp-standard.html) and [Microsoft Cloud Security Benchmark (MCSB)](concept-regulatory-compliance.md) assigned by default. AWS Foundational Security Best Practices standard contains AWS-specific guidelines for security and compliance best practices based on common compliance frameworks.
6565
- **GCP**: GCP projects get the GCP Default standard assigned.
6666

6767

articles/defender-for-cloud/custom-security-policies.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Create custom security standards for Azure resources in Microsoft Defende
33
description: Learn how to create custom security standards for Azure resources in Microsoft Defender for Cloud
44
ms.topic: how-to
55
ms.custom: ignite-2023
6-
ms.date: 10/30/2023
6+
ms.date: 11/27/2023
77
zone_pivot_groups: manage-asc-initiatives
88
---
99

@@ -34,27 +34,28 @@ Security recommendations in Microsoft Defender for Cloud help you to improve and
3434

3535
:::image type="content" source="media/custom-security-policies/create-custom-standard.png" alt-text="Screenshot that shows how to create a custom security standard." lightbox="media/custom-security-policies/create-custom-standard.png":::
3636

37-
1. In **Create a new standard** > **Basics**, enter a name and description. Make sure the name is unique. If you create a custom standard with the same name as an existing standard, it causes a conflict in the information displayed in the dashboard.
37+
1. Enter a name and description.
38+
39+
> [!IMPORTANT]
40+
> Make sure the name is unique. If you create a custom standard with the same name as an existing standard, it causes a conflict in the information displayed in the dashboard.
3841
3942
1. Select **Next**.
4043

4144
1. In **Recommendations**, select the recommendations that you want to add to the custom standard.
4245

4346
:::image type="content" source="media/custom-security-policies/select-recommendations.png" alt-text="Screenshot that shows the list of all of the recommendations that are available to select for the custom standard." lightbox="media/custom-security-policies/select-recommendations.png":::
4447

45-
1. (Optional) Select **...** > **Manage effect and parameters** to manage the effects and parameters of each recommendation, and save the setting.
48+
1. (Optional) Select the three dot button (**...**) > **Manage effect and parameters** to manage the effects and parameters of each recommendation, and save the setting.
4649

4750
1. Select **Next**.
4851

4952
1. In **Review + create**, select **Create**.
5053

51-
Your new standard takes effect after you create it. Here's what you'll see:
54+
Your new standard takes effect after you create it. You can see the effects of your new standard:
5255

53-
- In Defender for Cloud > **Regulatory compliance**, the compliance dashboard shows the new custom standard alongside existing standards.
56+
- On the Regulatory compliance page, you will see the new custom standard alongside existing standards.
5457
- If your environment doesn't align with the custom standard, you begin to receive recommendations to fix issues found in the **Recommendations** page.
5558

56-
57-
5859
## Create a custom recommendation
5960

6061
If you want to create a custom recommendation for Azure resources, you currently need to do that in Azure Policy, as follows:

articles/defender-for-cloud/exempt-resource.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -74,9 +74,6 @@ After creating the exemption it can take up to 30 minutes to take effect. After
7474
- If you've exempted specific resources, they'll be listed in the **Not applicable** tab of the recommendation details page.
7575
- If you've exempted a recommendation, it will be hidden by default on Defender for Cloud's recommendations page. This is because the default options of the **Recommendation status** filter on that page are to exclude **Not applicable** recommendations. The same is true if you exempt all recommendations in a security control.
7676

77-
78-
79-
8077
## Next steps
8178

8279
[Review exempted resources](review-exemptions.md) in Defender for Cloud.

articles/defender-for-cloud/governance-rules.md

Lines changed: 52 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to drive remediation of security recommendations with gov
44
services: defender-for-cloud
55
ms.service: defender-for-cloud
66
ms.topic: how-to
7-
ms.date: 10/29/2023
7+
ms.date: 11/27/2023
88
---
99

1010
# Drive remediation with governance rules
@@ -35,80 +35,102 @@ For tracking, you can review the progress of the remediation tasks by subscripti
3535

3636
## Before you begin
3737

38-
- To use governance rules, the [Defender Cloud Security Posture Management (CSPM) plan](concept-cloud-security-posture-management.md) must be enabled.
39-
- You need **Contributor**, **Security Admin**, or **Owner** permissions on Azure subscriptions.
40-
- For AWS accounts and GCP projects, you need **Contributor**, **Security Admin**, or **Owner** permissions on the Defender for Cloud AWS/GCP connectors.
38+
- The [Defender Cloud Security Posture Management (CSPM) plan](concept-cloud-security-posture-management.md) must be enabled.
39+
- You need **Contributor**, **Security Admin**, or **Owner** permissions on the Azure subscriptions.
40+
- For AWS accounts and GCP projects, you need **Contributor**, **Security Admin**, or **Owner** permissions on the Defender for Cloud AWS or GCP connectors.
4141

4242

4343
## Define a governance rule
4444

45-
Define a governance rule as follows.
45+
**You can define a governance rule as follows**:
46+
47+
1. Sign in to the [Azure portal](https://portal.azure.com).
48+
49+
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings** > **Governance rules**.
4650

47-
1. In Defender for Cloud, open the **Environment settings** page, and select **Governance rules**.
4851
1. Select **Create governance rule**.
49-
1. In **Create governance rule** > **General details**, specify a rule name, and the scope in which the rule applies.
52+
53+
:::image type="content" source="./media/governance-rules/add-rule.png" alt-text="Screenshot of page for adding a governance rule." lightbox="media/governance-rules/add-rule.png":::
54+
55+
1. Specify a rule name and scope in which to apply the rule.
5056

5157
- Rules for management scope (Azure management groups, AWS master accounts, GCP organizations) are applied prior to the rules on a single scope.
5258
- You can define exclusions within the scope as needed.
5359

54-
1. Priority is assigned automatically. Rules are run in priority order from the highest (1) to the lowest (1000).
55-
1. Specify a description to help you identify the rule. Then select **Next**.
60+
1. Set a priority level.
5661

57-
:::image type="content" source="./media/governance-rules/add-rule.png" alt-text="Screenshot of page for adding a governance rule." lightbox="media/governance-rules/add-rule.png":::
62+
Rules are run in priority order from the highest (1) to the lowest (1000).
63+
64+
1. Specify a description to help you identify the rule.
65+
66+
1. Select **Next**
67+
68+
1. Specify how recommendations are impacted by the rule.
5869

59-
1. In the **Conditions** tab, specify how recommendations are impacted by the rule.
6070
- **By severity** - The rule assigns the owner and due date to any recommendation in the subscription that doesn't already have them assigned.
6171
- **By specific recommendations** - Select the specific built-in or custom recommendations that the rule applies to.
62-
1. In **Set owner**, specify who's responsible for fixing recommendations covered by the rule.
72+
73+
:::image type="content" source="./media/governance-rules/create-rule-conditions.png" alt-text="Screenshot of page for adding conditions for a governance rule." lightbox="media/governance-rules/create-rule-conditions.png":::
74+
75+
1. Set the owner to specify who's responsible for fixing recommendations covered by the rule.
76+
6377
- **By resource tag** - Enter the resource tag on your resources that defines the resource owner.
6478
- **By email address** - Enter the email address of the owner to assign to the recommendations.
6579

66-
1. In **Set remediation timeframe**, specify the time that can elapse between when resources are identified as requiring remediation, and the time that the remediation is due.
67-
1. For recommendations issued by MCSB, if you don't want the resources to affect your secure score until they're overdue, select **Apply grace period**.
68-
1. By default owners and their managers are notified weekly about open and overdue tasks. If you don't want them to receive these weekly emails, clear the notification options.
69-
1. Select **Create**.
80+
1. Specify remediation time frame to set the time that can elapse between when resources are identified as requiring remediation, and the time that the remediation is due.
7081

71-
:::image type="content" source="./media/governance-rules/create-rule-conditions.png" alt-text="Screenshot of page for adding conditions for a governance rule." lightbox="media/governance-rules/create-rule-conditions.png":::
82+
For recommendations issued by MCSB, if you don't want the resources to affect your secure score until they're overdue, select **Apply grace period**.
7283

84+
1. (Optional) By default owners and their managers are notified weekly about open and overdue tasks. If you don't want them to receive these weekly emails, clear the notification options.
7385

74-
- If there are existing recommendations that match the definition of the governance rule, you can either:
86+
1. Select **Create**.
87+
88+
If there are existing recommendations that match the definition of the governance rule, you can either:
7589

76-
- Assign an owner and due date to recommendations that don't already have an owner or due date.
77-
- Overwrite the owner and due date of existing recommendations.
78-
- When you delete or disable a rule, all existing assignments and notifications remain.
90+
- Assign an owner and due date to recommendations that don't already have an owner or due date.
7991

92+
- Overwrite the owner and due date of existing recommendations.
93+
94+
When you delete or disable a rule, all existing assignments and notifications remain.
8095

8196
## View effective rules
8297

8398
You can view the effect of government rules in your environment.
8499

85-
1. In the Defender for Cloud portal, open the **Governance rules** page.
100+
1. Sign in to the [Azure portal](https://portal.azure.com).
101+
102+
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings** > **Governance rules**.
103+
86104
1. Review governance rules. The default list shows all the governance rules applicable in your environment.
105+
87106
1. You can search for rules, or filter rules.
107+
88108
- Filter on **Environment** to identify rules for Azure, AWS, and GCP.
109+
89110
- Filter on rule name, owner, or time between the recommendation being issued and due date.
111+
90112
- Filter on **Grace period** to find MCSB recommendations that won't affect your secure score.
113+
91114
- Identify by status.
92115

93116
:::image type="content" source="./media/governance-rules/view-filter-rules.png" alt-text="Screenshot of page for viewing and filtering rules." lightbox="media/governance-rules/view-filter-rules.png":::
94117

118+
## Review the governance report
95119

120+
The governance report lets you select subscriptions that have governance rules and, for each rule and owner, shows you how many recommendations are completed, on time, overdue, or unassigned.
96121

122+
1. Sign in to the [Azure portal](https://portal.azure.com).
97123

124+
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings** > **Governance rules** >**Governance report**.
98125

99-
## Review the governance report
126+
:::image type="content" source="media/governance-rules/governance-report.png" alt-text="Screenshot of the governance rules page that shows where the governance report button is located." lightbox="media/governance-rules/governance-report.png":::
100127

101-
The governance report lets you select subscriptions that have governance rules and, for each rule and owner, shows you how many recommendations are completed, on time, overdue, or unassigned.
102-
103-
1. In Defender for Cloud > **Environment settings** > **Governance rules**, select **Governance report**.
104-
1. In **Governance**, select a subscription.
128+
1. Select a subscription.
105129

106130
:::image type="content" source="./media/governance-rules/governance-in-workbook.png" alt-text="Screenshot of governance status by rule and owner in the governance workbook." lightbox="media/governance-rules/governance-in-workbook.png":::
107131

108-
1. From the governance report, you drill down into recommendations by rule and owner.
109-
132+
From the governance report, you can drill down into recommendations by scope, display name, priority, remediation timeframe, owner type, owner details, grace period and cloud.
110133

111134
## Next steps
112135

113-
114136
Learn how to [Implement security recommendations](implement-security-recommendations.md).

articles/defender-for-cloud/implement-security-recommendations.md

Lines changed: 25 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,9 @@ description: Learn how to remediate security recommendations in Microsoft Defend
44
ms.topic: how-to
55
ms.author: dacurwin
66
author: dcurwin
7-
ms.date: 11/08/2023
7+
ms.date: 11/22/2023
88
---
9+
910
# Remediate security recommendations
1011

1112
Resources and workloads protected by Microsoft Defender for Cloud are assessed against built-in and custom security standards enabled in your Azure subscriptions, AWS accounts, and GCP projects. Based on those assessments, security recommendations provide practical steps to remediate security issues, and improve security posture.
@@ -16,6 +17,11 @@ This article describes how to remediate security recommendations in your Defende
1617

1718
Before you attempt to remediate a recommendation you should review it in detail. Learn how to [review security recommendations](review-security-recommendations.md).
1819

20+
> [!IMPORTANT]
21+
> This page discusses how to use the new recommendations experience where you have the ability to prioritize your recommendations by their effective risk level. To view this experience, you must select **Try it now**.
22+
>
23+
> :::image type="content" source="media/review-security-recommendations/try-it-now.png" alt-text="Screenshot that shows where the try it now button is located on the recommendation page." lightbox="media/review-security-recommendations/try-it-now.png":::
24+
1925
## Group recommendations by risk level
2026

2127
Before you start remediating, we recommend grouping your recommendations by risk level in order to remediate the most critical recommendations first.
@@ -30,43 +36,46 @@ Before you start remediating, we recommend grouping your recommendations by risk
3036

3137
Recommendations are displayed in groups of risk levels.
3238

33-
1. Review critical and other recommendations to understand the recommendation and remediation steps. Use the graph to understand the risk to your business, including which resources are exploitable, and the effect that the recommendation has on your business.
34-
39+
You can now review critical and other recommendations to understand the recommendation and remediation steps. Use the graph to understand the risk to your business, including which resources are exploitable, and the effect that the recommendation has on your business.
3540

3641
## Remediate recommendations
3742

3843
After reviewing recommendations by risk, decide which one to remediate first.
3944

4045
In addition to risk level, we recommend that you prioritize the security controls in the default [Microsoft Cloud Security Benchmark (MCSB)](concept-regulatory-compliance.md) standard in Defender for Cloud, since these controls affect your [secure score](secure-score-security-controls.md).
4146

47+
1. Sign in to the [Azure portal](https://portal.azure.com).
4248

43-
1. In the **Recommendations** page, select the recommendation you want to remediate.
49+
1. Navigate to **Microsoft Defender for Cloud** > **Recommendations**.
4450

45-
1. In the recommendation details page, select **Take action** > **Remediate**.
46-
1. Follow the remediation instructions.
51+
1. Select a recommendation to remediate.
4752

48-
As an example, the following screenshot shows remediation steps for configuring applications to only allow traffic over HTTPS.
53+
1. Select **Take action**
4954

50-
:::image type="content" source="./media/implement-security-recommendations/security-center-remediate-recommendation.png" alt-text="This screenshots shows manual remediation steps for a recommendation." lightbox="./media/implement-security-recommendations/security-center-remediate-recommendation.png":::
55+
1. Locate the Remediate section and follow the remediation instructions.
5156

52-
1. Once completed, a notification appears informing you whether the issue is resolved.
57+
:::image type="content" source="./media/implement-security-recommendations/security-center-remediate-recommendation.png" alt-text="This screenshot shows manual remediation steps for a recommendation." lightbox="./media/implement-security-recommendations/security-center-remediate-recommendation.png":::
5358

5459
## Use the Fix option
5560

56-
To simplify remediation and improve your environment's security (and increase your secure score), many recommendations include a **Fix** option to help you quickly remediate a recommendation on multiple resources.
61+
To simplify remediation and improve your environment's security (and increase your secure score), many recommendations include a **Fix** option to help you quickly remediate a recommendation on multiple resources. If the Fix button is not present in the recommendation, then there is no option to apply a quick fix.
62+
63+
**To remediate a recommendation with the Fix button**:
64+
65+
1. Sign in to the [Azure portal](https://portal.azure.com).
66+
67+
1. Navigate to **Microsoft Defender for Cloud** > **Recommendations**.
68+
69+
1. Select a recommendation to remediate.
5770

58-
1. In the **Recommendations** page, select a recommendation that shows the **Fix** action icon: :::image type="icon" source="media/implement-security-recommendations/fix-icon.png" border="false":::.
71+
1. Select **Take action** > **Fix**.
5972

6073
:::image type="content" source="./media/implement-security-recommendations/microsoft-defender-for-cloud-recommendations-fix-action.png" alt-text="This screenshot shows recommendations with the Fix action" lightbox="./media/implement-security-recommendations/microsoft-defender-for-cloud-recommendations-fix-action.png":::
6174

62-
1. In **Take action**, select **Fix**.
6375
1. Follow the rest of the remediation steps.
6476

65-
66-
After remediation completes, it can take several minutes to see the resources appear in the **Findings** tab when the status is filtered to view **Healthy** resources.
77+
After remediation completes, it can take several minutes for the change to take place.
6778

6879
## Next steps
6980

7081
[Learn about](governance-rules.md) using governance rules in your remediation processes.
71-
72-

0 commit comments

Comments
 (0)