Skip to content

Commit 63048b8

Browse files
Merge pull request #267531 from dcurwin/fix-formatting-feb28-2024
Fix formatting
2 parents d949129 + 72264b3 commit 63048b8

File tree

3 files changed

+26
-25
lines changed

3 files changed

+26
-25
lines changed

articles/defender-for-cloud/integration-defender-for-endpoint.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,6 @@ A Defender for Endpoint tenant is automatically created, when you use Defender f
6464

6565
- **Moving subscriptions:** If you've moved your Azure subscription between Azure tenants, some manual preparatory steps are required before Defender for Cloud will deploy Defender for Endpoint. For full details, [contact Microsoft support](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/overview).
6666

67-
## Next Steps
67+
## Next step
6868

69-
[Enable the Microsoft Defender for Endpoint integration](enable-defender-for-endpoint.md).
69+
[Enable the Microsoft Defender for Endpoint integration](enable-defender-for-endpoint.md)

articles/defender-for-cloud/just-in-time-access-overview.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ To learn how to apply JIT to your VMs using the Azure portal (either Defender fo
1515

1616
Threat actors actively hunt accessible machines with open management ports, like RDP or SSH. All of your virtual machines are potential targets for an attack. When a VM is successfully compromised, it's used as the entry point to attack further resources within your environment.
1717

18-
## Why JIT VM access is the solution
18+
## Why JIT VM access is the solution
1919

2020
As with all cybersecurity prevention techniques, your goal should be to reduce the attack surface. In this case that means having fewer open ports especially management ports.
2121

@@ -25,7 +25,7 @@ To solve this dilemma, Microsoft Defender for Cloud offers JIT. With JIT, you ca
2525

2626
## How JIT operates with network resources in Azure and AWS
2727

28-
In Azure, you can block inbound traffic on specific ports, by enabling just-in-time VM access. Defender for Cloud ensures "deny all inbound traffic" rules exist for your selected ports in the [network security group](../virtual-network/network-security-groups-overview.md#security-rules) (NSG) and [Azure Firewall rules](../firewall/rule-processing.md). These rules restrict access to your Azure VMs’ management ports and defend them from attack.
28+
In Azure, you can block inbound traffic on specific ports, by enabling just-in-time VM access. Defender for Cloud ensures "deny all inbound traffic" rules exist for your selected ports in the [network security group](../virtual-network/network-security-groups-overview.md#security-rules) (NSG) and [Azure Firewall rules](../firewall/rule-processing.md). These rules restrict access to your Azure VMs’ management ports and defend them from attack.
2929

3030
If other rules already exist for the selected ports, then those existing rules take priority over the new "deny all inbound traffic" rules. If there are no existing rules on the selected ports, then the new rules take top priority in the NSG and Azure Firewall.
3131

@@ -38,21 +38,23 @@ When a user requests access to a VM, Defender for Cloud checks that the user has
3838
3939
## How Defender for Cloud identifies which VMs should have JIT applied
4040

41-
The following diagram shows the logic that Defender for Cloud applies when deciding how to categorize your supported VMs:
41+
The following diagram shows the logic that Defender for Cloud applies when deciding how to categorize your supported VMs:
4242

4343
### [**Azure**](#tab/defender-for-container-arch-aks)
44+
4445
[![Just-in-time (JIT) virtual machine (VM) logic flow.](media/just-in-time-explained/jit-logic-flow.png)](media/just-in-time-explained/jit-logic-flow.png#lightbox)
4546

4647
### [**AWS**](#tab/defender-for-container-arch-eks)
48+
4749
:::image type="content" source="media/just-in-time-explained/aws-jit-logic-flow.png" alt-text="A chart that explains the logic flow for the AWS Just in time (J I T) virtual machine (V M) logic flow.":::
4850

4951
---
5052

51-
When Defender for Cloud finds a machine that can benefit from JIT, it adds that machine to the recommendation's **Unhealthy resources** tab.
53+
When Defender for Cloud finds a machine that can benefit from JIT, it adds that machine to the recommendation's **Unhealthy resources** tab.
5254

5355
![Just-in-time (JIT) virtual machine (VM) access recommendation.](./media/just-in-time-explained/unhealthy-resources.png)
5456

55-
## Next steps
57+
## Next step
5658

5759
This page explained why just-in-time (JIT) virtual machine (VM) access should be used. To learn how to enable JIT and request access to your JIT-enabled VMs:
5860

articles/defender-for-cloud/just-in-time-access-usage.md

Lines changed: 17 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -30,15 +30,15 @@ In this article, you learn how to include JIT in your security program, includin
3030

3131
## Prerequisites
3232

33-
- JIT requires [Microsoft Defender for Servers Plan 2](plan-defender-for-servers-select-plan.md#plan-features) to be enabled on the subscription.
33+
- JIT requires [Microsoft Defender for Servers Plan 2](plan-defender-for-servers-select-plan.md#plan-features) to be enabled on the subscription.
3434

3535
- **Reader** and **SecurityReader** roles can both view the JIT status and parameters.
3636

3737
- If you want to create custom roles that work with JIT, you need the details from the following table:
3838

3939
| To enable a user to: | Permissions to set|
4040
| --- | --- |
41-
|Configure or edit a JIT policy for a VM | *Assign these actions to the role:* <ul><li>On the scope of a subscription or resource group that is associated with the VM:<br/> `Microsoft.Security/locations/jitNetworkAccessPolicies/write` </li><li> On the scope of a subscription or resource group of VM: <br/>`Microsoft.Compute/virtualMachines/write`</li></ul> |
41+
|Configure or edit a JIT policy for a VM | *Assign these actions to the role:* <ul><li>On the scope of a subscription or resource group that is associated with the VM:<br/> `Microsoft.Security/locations/jitNetworkAccessPolicies/write` </li><li> On the scope of a subscription or resource group of VM: <br/>`Microsoft.Compute/virtualMachines/write`</li></ul> |
4242
|Request JIT access to a VM | *Assign these actions to the user:* <ul><li> `Microsoft.Security/locations/jitNetworkAccessPolicies/initiate/action` </li><li> `Microsoft.Security/locations/jitNetworkAccessPolicies/*/read` </li><li> `Microsoft.Compute/virtualMachines/read` </li><li> `Microsoft.Network/networkInterfaces/*/read` </li> <li> `Microsoft.Network/publicIPAddresses/read` </li></ul> |
4343
|Read JIT policies| *Assign these actions to the user:* <ul><li>`Microsoft.Security/locations/jitNetworkAccessPolicies/read`</li><li>`Microsoft.Security/locations/jitNetworkAccessPolicies/initiate/action`</li><li>`Microsoft.Security/policies/read`</li><li>`Microsoft.Security/pricings/read`</li><li>`Microsoft.Compute/virtualMachines/read`</li><li>`Microsoft.Network/*/read`</li>|
4444

@@ -48,11 +48,10 @@ In this article, you learn how to include JIT in your security program, includin
4848
- To set up JIT on your Amazon Web Service (AWS) VM, you need to [connect your AWS account](quickstart-onboard-aws.md) to Microsoft Defender for Cloud.
4949

5050
> [!TIP]
51-
> To create a least-privileged role for users that need to request JIT access to a VM, and perform no other JIT operations, use the [Set-JitLeastPrivilegedRole script](https://github.com/Azure/Azure-Security-Center/tree/main/Powershell%20scripts/JIT%20Scripts/JIT%20Custom%20Role) from the Defender for Cloud GitHub community pages.
52-
51+
> To create a least-privileged role for users that need to request JIT access to a VM, and perform no other JIT operations, use the [Set-JitLeastPrivilegedRole script](https://github.com/Azure/Azure-Security-Center/tree/main/Powershell%20scripts/JIT%20Scripts/JIT%20Custom%20Role) from the Defender for Cloud GitHub community pages.
5352
5453
> [!NOTE]
55-
> In order to successfully create a custom JIT policy, the policy name, together with the targeted VM name, must not exceed a total of 56 characters.
54+
> In order to successfully create a custom JIT policy, the policy name, together with the targeted VM name, must not exceed a total of 56 characters.
5655
5756
## Work with JIT VM access using Microsoft Defender for Cloud
5857

@@ -79,12 +78,12 @@ From Defender for Cloud, you can enable and configure the JIT VM access.
7978

8079
1. Open the **Workload protections** and, in the advanced protections, select **Just-in-time VM access**.
8180

82-
1. In the **Not configured** virtual machines tab, mark the VMs to protect with JIT and select **Enable JIT on VMs**.
81+
1. In the **Not configured** virtual machines tab, mark the VMs to protect with JIT and select **Enable JIT on VMs**.
8382

8483
The JIT VM access page opens listing the ports that Defender for Cloud recommends protecting:
8584
- 22 - SSH
8685
- 3389 - RDP
87-
- 5985 - WinRM
86+
- 5985 - WinRM
8887
- 5986 - WinRM
8988

9089
To customize the JIT access:
@@ -106,13 +105,13 @@ To edit the existing JIT rules for a VM:
106105

107106
1. Open the **Workload protections** and, in the advanced protections, select **Just-in-time VM access**.
108107

109-
1. In the **Configured** virtual machines tab, right-click on a VM and select **Edit**.
108+
1. In the **Configured** virtual machines tab, right-click on a VM and select **Edit**.
110109

111110
1. In the **JIT VM access configuration**, you can either edit the list of port or select **Add** a new custom port.
112111

113112
1. When you finish editing the ports, select **Save**.
114113

115-
### Request access to a JIT-enabled VM from Microsoft Defender for Cloud
114+
### Request access to a JIT-enabled VM from Microsoft Defender for Cloud
116115

117116
When a VM has a JIT enabled, you have to request access to connect to it. You can request access in any of the supported ways, regardless of how you enabled JIT.
118117

@@ -144,13 +143,13 @@ You can enable JIT on a VM from the Azure virtual machines pages of the Azure po
144143
> [!TIP]
145144
> If a VM already has JIT enabled, the VM configuration page shows that JIT is enabled. You can use the link to open the JIT VM access page in Defender for Cloud to view and change the settings.
146145
147-
1. From the [Azure portal](https://portal.azure.com), search for and select **Virtual machines**.
146+
1. From the [Azure portal](https://portal.azure.com), search for and select **Virtual machines**.
148147

149148
1. Select the virtual machine you want to protect with JIT.
150149

151150
1. In the menu, select **Configuration**.
152151

153-
1. Under **Just-in-time access**, select **Enable just-in-time**.
152+
1. Under **Just-in-time access**, select **Enable just-in-time**.
154153

155154
By default, just-in-time access for the VM uses these settings:
156155

@@ -167,7 +166,7 @@ You can enable JIT on a VM from the Azure virtual machines pages of the Azure po
167166

168167
1. From Defender for Cloud's menu, select **Just-in-time VM access**.
169168

170-
1. From the **Configured** tab, right-click on the VM to which you want to add a port, and select **Edit**.
169+
1. From the **Configured** tab, right-click on the VM to which you want to add a port, and select **Edit**.
171170

172171
![Editing a JIT VM access configuration in Microsoft Defender for Cloud.](./media/just-in-time-access-usage/jit-policy-edit-security-center.png)
173172

@@ -229,13 +228,13 @@ The following PowerShell commands create this JIT configuration:
229228
```
230229
231230
1. Insert the VM just-in-time VM access rules into an array:
232-
231+
233232
```azurepowershell
234233
$JitPolicyArr=@($JitPolicy)
235234
```
236235
237236
1. Configure the just-in-time VM access rules on the selected VM:
238-
237+
239238
```azurepowershell
240239
Set-AzJitNetworkAccessPolicy -Kind "Basic" -Location "LOCATION" -Name "default" -ResourceGroupName "RESOURCEGROUP" -VirtualMachine $JitPolicyArr
241240
```
@@ -264,7 +263,7 @@ Run the following commands in PowerShell:
264263
```azurepowershell
265264
$JitPolicyArr=@($JitPolicyVm1)
266265
```
267-
266+
268267
1. Send the request access (use the resource ID from step 1)
269268
270269
```azurepowershell
@@ -277,13 +276,13 @@ Learn more in the [PowerShell cmdlet documentation](/powershell/scripting/develo
277276
278277
#### Enable JIT on your VMs using the REST API
279278
280-
The just-in-time VM access feature can be used via the Microsoft Defender for Cloud API. Use this API to get information about configured VMs, add new ones, request access to a VM, and more.
279+
The just-in-time VM access feature can be used via the Microsoft Defender for Cloud API. Use this API to get information about configured VMs, add new ones, request access to a VM, and more.
281280
282281
Learn more at [JIT network access policies](/rest/api/defenderforcloud/jit-network-access-policies).
283282
284283
#### Request access to a JIT-enabled VM using the REST API
285284
286-
The just-in-time VM access feature can be used via the Microsoft Defender for Cloud API. Use this API to get information about configured VMs, add new ones, request access to a VM, and more.
285+
The just-in-time VM access feature can be used via the Microsoft Defender for Cloud API. Use this API to get information about configured VMs, add new ones, request access to a VM, and more.
287286
288287
Learn more at [JIT network access policies](/rest/api/defenderforcloud/jit-network-access-policies).
289288
@@ -294,7 +293,7 @@ You can gain insights into VM activities using log search. To view the logs:
294293
1. From **Just-in-time VM access**, select the **Configured** tab.
295294
296295
1. For the VM that you want to audit, open the ellipsis menu at the end of the row.
297-
296+
298297
1. Select **Activity Log** from the menu.
299298
300299
![Select just-in-time JIT activity log.](./media/just-in-time-access-usage/jit-select-activity-log.png)

0 commit comments

Comments
 (0)