You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/integration-defender-for-endpoint.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,6 +64,6 @@ A Defender for Endpoint tenant is automatically created, when you use Defender f
64
64
65
65
-**Moving subscriptions:** If you've moved your Azure subscription between Azure tenants, some manual preparatory steps are required before Defender for Cloud will deploy Defender for Endpoint. For full details, [contact Microsoft support](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/overview).
66
66
67
-
## Next Steps
67
+
## Next step
68
68
69
-
[Enable the Microsoft Defender for Endpoint integration](enable-defender-for-endpoint.md).
69
+
[Enable the Microsoft Defender for Endpoint integration](enable-defender-for-endpoint.md)
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/just-in-time-access-overview.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ To learn how to apply JIT to your VMs using the Azure portal (either Defender fo
15
15
16
16
Threat actors actively hunt accessible machines with open management ports, like RDP or SSH. All of your virtual machines are potential targets for an attack. When a VM is successfully compromised, it's used as the entry point to attack further resources within your environment.
17
17
18
-
## Why JIT VM access is the solution
18
+
## Why JIT VM access is the solution
19
19
20
20
As with all cybersecurity prevention techniques, your goal should be to reduce the attack surface. In this case that means having fewer open ports especially management ports.
21
21
@@ -25,7 +25,7 @@ To solve this dilemma, Microsoft Defender for Cloud offers JIT. With JIT, you ca
25
25
26
26
## How JIT operates with network resources in Azure and AWS
27
27
28
-
In Azure, you can block inbound traffic on specific ports, by enabling just-in-time VM access. Defender for Cloud ensures "deny all inbound traffic" rules exist for your selected ports in the [network security group](../virtual-network/network-security-groups-overview.md#security-rules) (NSG) and [Azure Firewall rules](../firewall/rule-processing.md). These rules restrict access to your Azure VMs’ management ports and defend them from attack.
28
+
In Azure, you can block inbound traffic on specific ports, by enabling just-in-time VM access. Defender for Cloud ensures "deny all inbound traffic" rules exist for your selected ports in the [network security group](../virtual-network/network-security-groups-overview.md#security-rules) (NSG) and [Azure Firewall rules](../firewall/rule-processing.md). These rules restrict access to your Azure VMs’ management ports and defend them from attack.
29
29
30
30
If other rules already exist for the selected ports, then those existing rules take priority over the new "deny all inbound traffic" rules. If there are no existing rules on the selected ports, then the new rules take top priority in the NSG and Azure Firewall.
31
31
@@ -38,21 +38,23 @@ When a user requests access to a VM, Defender for Cloud checks that the user has
38
38
39
39
## How Defender for Cloud identifies which VMs should have JIT applied
40
40
41
-
The following diagram shows the logic that Defender for Cloud applies when deciding how to categorize your supported VMs:
41
+
The following diagram shows the logic that Defender for Cloud applies when deciding how to categorize your supported VMs:
:::image type="content" source="media/just-in-time-explained/aws-jit-logic-flow.png" alt-text="A chart that explains the logic flow for the AWS Just in time (J I T) virtual machine (V M) logic flow.":::
48
50
49
51
---
50
52
51
-
When Defender for Cloud finds a machine that can benefit from JIT, it adds that machine to the recommendation's **Unhealthy resources** tab.
53
+
When Defender for Cloud finds a machine that can benefit from JIT, it adds that machine to the recommendation's **Unhealthy resources** tab.
This page explained why just-in-time (JIT) virtual machine (VM) access should be used. To learn how to enable JIT and request access to your JIT-enabled VMs:
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/just-in-time-access-usage.md
+17-18Lines changed: 17 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,15 +30,15 @@ In this article, you learn how to include JIT in your security program, includin
30
30
31
31
## Prerequisites
32
32
33
-
- JIT requires [Microsoft Defender for Servers Plan 2](plan-defender-for-servers-select-plan.md#plan-features) to be enabled on the subscription.
33
+
- JIT requires [Microsoft Defender for Servers Plan 2](plan-defender-for-servers-select-plan.md#plan-features) to be enabled on the subscription.
34
34
35
35
-**Reader** and **SecurityReader** roles can both view the JIT status and parameters.
36
36
37
37
- If you want to create custom roles that work with JIT, you need the details from the following table:
38
38
39
39
| To enable a user to: | Permissions to set|
40
40
| --- | --- |
41
-
|Configure or edit a JIT policy for a VM |*Assign these actions to the role:* <ul><li>On the scope of a subscription or resource group that is associated with the VM:<br/> `Microsoft.Security/locations/jitNetworkAccessPolicies/write` </li><li> On the scope of a subscription or resource group of VM: <br/>`Microsoft.Compute/virtualMachines/write`</li></ul> |
41
+
|Configure or edit a JIT policy for a VM |*Assign these actions to the role:* <ul><li>On the scope of a subscription or resource group that is associated with the VM:<br/> `Microsoft.Security/locations/jitNetworkAccessPolicies/write` </li><li> On the scope of a subscription or resource group of VM: <br/>`Microsoft.Compute/virtualMachines/write`</li></ul> |
42
42
|Request JIT access to a VM |*Assign these actions to the user:* <ul><li> `Microsoft.Security/locations/jitNetworkAccessPolicies/initiate/action` </li><li> `Microsoft.Security/locations/jitNetworkAccessPolicies/*/read` </li><li> `Microsoft.Compute/virtualMachines/read` </li><li> `Microsoft.Network/networkInterfaces/*/read` </li> <li> `Microsoft.Network/publicIPAddresses/read` </li></ul> |
43
43
|Read JIT policies|*Assign these actions to the user:* <ul><li>`Microsoft.Security/locations/jitNetworkAccessPolicies/read`</li><li>`Microsoft.Security/locations/jitNetworkAccessPolicies/initiate/action`</li><li>`Microsoft.Security/policies/read`</li><li>`Microsoft.Security/pricings/read`</li><li>`Microsoft.Compute/virtualMachines/read`</li><li>`Microsoft.Network/*/read`</li>|
44
44
@@ -48,11 +48,10 @@ In this article, you learn how to include JIT in your security program, includin
48
48
- To set up JIT on your Amazon Web Service (AWS) VM, you need to [connect your AWS account](quickstart-onboard-aws.md) to Microsoft Defender for Cloud.
49
49
50
50
> [!TIP]
51
-
> To create a least-privileged role for users that need to request JIT access to a VM, and perform no other JIT operations, use the [Set-JitLeastPrivilegedRole script](https://github.com/Azure/Azure-Security-Center/tree/main/Powershell%20scripts/JIT%20Scripts/JIT%20Custom%20Role) from the Defender for Cloud GitHub community pages.
52
-
51
+
> To create a least-privileged role for users that need to request JIT access to a VM, and perform no other JIT operations, use the [Set-JitLeastPrivilegedRole script](https://github.com/Azure/Azure-Security-Center/tree/main/Powershell%20scripts/JIT%20Scripts/JIT%20Custom%20Role) from the Defender for Cloud GitHub community pages.
53
52
54
53
> [!NOTE]
55
-
> In order to successfully create a custom JIT policy, the policy name, together with the targeted VM name, must not exceed a total of 56 characters.
54
+
> In order to successfully create a custom JIT policy, the policy name, together with the targeted VM name, must not exceed a total of 56 characters.
56
55
57
56
## Work with JIT VM access using Microsoft Defender for Cloud
58
57
@@ -79,12 +78,12 @@ From Defender for Cloud, you can enable and configure the JIT VM access.
79
78
80
79
1. Open the **Workload protections** and, in the advanced protections, select **Just-in-time VM access**.
81
80
82
-
1. In the **Not configured** virtual machines tab, mark the VMs to protect with JIT and select **Enable JIT on VMs**.
81
+
1. In the **Not configured** virtual machines tab, mark the VMs to protect with JIT and select **Enable JIT on VMs**.
83
82
84
83
The JIT VM access page opens listing the ports that Defender for Cloud recommends protecting:
85
84
- 22 - SSH
86
85
- 3389 - RDP
87
-
- 5985 - WinRM
86
+
- 5985 - WinRM
88
87
- 5986 - WinRM
89
88
90
89
To customize the JIT access:
@@ -106,13 +105,13 @@ To edit the existing JIT rules for a VM:
106
105
107
106
1. Open the **Workload protections** and, in the advanced protections, select **Just-in-time VM access**.
108
107
109
-
1. In the **Configured** virtual machines tab, right-click on a VM and select **Edit**.
108
+
1. In the **Configured** virtual machines tab, right-click on a VM and select **Edit**.
110
109
111
110
1. In the **JIT VM access configuration**, you can either edit the list of port or select **Add** a new custom port.
112
111
113
112
1. When you finish editing the ports, select **Save**.
114
113
115
-
### Request access to a JIT-enabled VM from Microsoft Defender for Cloud
114
+
### Request access to a JIT-enabled VM from Microsoft Defender for Cloud
116
115
117
116
When a VM has a JIT enabled, you have to request access to connect to it. You can request access in any of the supported ways, regardless of how you enabled JIT.
118
117
@@ -144,13 +143,13 @@ You can enable JIT on a VM from the Azure virtual machines pages of the Azure po
144
143
> [!TIP]
145
144
> If a VM already has JIT enabled, the VM configuration page shows that JIT is enabled. You can use the link to open the JIT VM access page in Defender for Cloud to view and change the settings.
146
145
147
-
1. From the [Azure portal](https://portal.azure.com), search for and select **Virtual machines**.
146
+
1. From the [Azure portal](https://portal.azure.com), search for and select **Virtual machines**.
148
147
149
148
1. Select the virtual machine you want to protect with JIT.
150
149
151
150
1. In the menu, select **Configuration**.
152
151
153
-
1. Under **Just-in-time access**, select **Enable just-in-time**.
152
+
1. Under **Just-in-time access**, select **Enable just-in-time**.
154
153
155
154
By default, just-in-time access for the VM uses these settings:
156
155
@@ -167,7 +166,7 @@ You can enable JIT on a VM from the Azure virtual machines pages of the Azure po
167
166
168
167
1. From Defender for Cloud's menu, select **Just-in-time VM access**.
169
168
170
-
1. From the **Configured** tab, right-click on the VM to which you want to add a port, and select **Edit**.
169
+
1. From the **Configured** tab, right-click on the VM to which you want to add a port, and select **Edit**.
171
170
172
171

173
172
@@ -229,13 +228,13 @@ The following PowerShell commands create this JIT configuration:
229
228
```
230
229
231
230
1. Insert the VM just-in-time VM access rules into an array:
232
-
231
+
233
232
```azurepowershell
234
233
$JitPolicyArr=@($JitPolicy)
235
234
```
236
235
237
236
1. Configure the just-in-time VM access rules on the selected VM:
@@ -264,7 +263,7 @@ Run the following commands in PowerShell:
264
263
```azurepowershell
265
264
$JitPolicyArr=@($JitPolicyVm1)
266
265
```
267
-
266
+
268
267
1. Send the request access (use the resource ID from step 1)
269
268
270
269
```azurepowershell
@@ -277,13 +276,13 @@ Learn more in the [PowerShell cmdlet documentation](/powershell/scripting/develo
277
276
278
277
#### Enable JIT on your VMs using the REST API
279
278
280
-
The just-in-time VM access feature can be used via the Microsoft Defender for Cloud API. Use this API to get information about configured VMs, add new ones, request access to a VM, and more.
279
+
The just-in-time VM access feature can be used via the Microsoft Defender for Cloud API. Use this API to get information about configured VMs, add new ones, request access to a VM, and more.
281
280
282
281
Learn more at [JIT network access policies](/rest/api/defenderforcloud/jit-network-access-policies).
283
282
284
283
#### Request access to a JIT-enabled VM using the REST API
285
284
286
-
The just-in-time VM access feature can be used via the Microsoft Defender for Cloud API. Use this API to get information about configured VMs, add new ones, request access to a VM, and more.
285
+
The just-in-time VM access feature can be used via the Microsoft Defender for Cloud API. Use this API to get information about configured VMs, add new ones, request access to a VM, and more.
287
286
288
287
Learn more at [JIT network access policies](/rest/api/defenderforcloud/jit-network-access-policies).
289
288
@@ -294,7 +293,7 @@ You can gain insights into VM activities using log search. To view the logs:
294
293
1. From **Just-in-time VM access**, select the **Configured** tab.
295
294
296
295
1. For the VM that you want to audit, open the ellipsis menu at the end of the row.
0 commit comments