Skip to content

Commit 630a0bb

Browse files
author
David Curwin
committed
Retiring connectors - upcoming changes
1 parent 532399c commit 630a0bb

File tree

1 file changed

+20
-2
lines changed

1 file changed

+20
-2
lines changed

articles/defender-for-cloud/upcoming-changes.md

Lines changed: 20 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Important upcoming changes
33
description: Upcoming changes to Microsoft Defender for Cloud that you might need to be aware of and for which you might need to plan
44
ms.topic: overview
5-
ms.date: 08/08/2023
5+
ms.date: 08/14/2023
66
---
77

88
# Important upcoming changes to Microsoft Defender for Cloud
@@ -30,9 +30,27 @@ If you're looking for the latest release notes, you can find them in the [What's
3030
| [Update naming format of Azure Center for Internet Security standards in regulatory compliance](#update-naming-format-of-azure-center-for-internet-security-standards-in-regulatory-compliance) | August 2023 |
3131
| [Preview alerts for DNS servers to be deprecated](#preview-alerts-for-dns-servers-to-be-deprecated) | August 2023 |
3232
| [Deprecate and replace recommendations App Service Client Certificates](#deprecate-and-replace-recommendations-app-service-client-certificates) | August 2023 |
33+
| [Classic connectors for multicloud will be retired](#classic-connectors-for-multicloud-will-be-retired) | September 2023 |
3334
| [Change to the Log Analytics daily cap](#change-to-the-log-analytics-daily-cap) | September 2023 |
3435
| [Defender for Cloud plan and strategy for the Log Analytics agent deprecation](#defender-for-cloud-plan-and-strategy-for-the-log-analytics-agent-deprecation) | August 2024 |
3536

37+
### Classic connectors for multicloud will be retired
38+
39+
**Estimated date for change: September 15, 2023**
40+
41+
The classic multicloud connectors will be retiring on September 15, 2023 and no data will be streamed to them after this date. These classic connectors were used to connect AWS Security Hub and GCP Security Command Center recommendations to Defender for Cloud and onboard AWS EC2s to Defender for Servers.
42+
43+
The full value of these connectors has been replaced with the native multicloud security connectors experience, which has been Generally Available for AWS and GCP since March 2022 at no additional cost.
44+
45+
The new native connectors are included in your plan and offer an automated onboarding experience with options to onboard single accounts, multiple accounts (with Terraform), and organizational onboarding with auto provisioning for the following Defender plans: free foundational CSPM capabilities, Defender Cloud Security Posture Management (CSPM), Defender for Servers, Defender for SQL, and Defender for Containers.
46+
47+
If you're currently using the classic multicloud connectors, we strongly recommend that you begin your migration to the native security connectors before September 15, 2023.
48+
49+
How to migrate to the native security connectors:
50+
51+
- [Connect your AWS account to Defender for Cloud](quickstart-onboard-aws.md)
52+
- [Connect your GCP project to Defender for Cloud](quickstart-onboard-gcp.md)
53+
3654
### Defender for Cloud plan and strategy for the Log Analytics agent deprecation
3755

3856
**Estimated date for change: August 2024**
@@ -87,7 +105,6 @@ The following section describes the planned introduction of a new and improved S
87105
| SQL-targeted AMA autoprovisioning GA release | December 2023 | GA release of a SQL-targeted AMA autoprovisioning process. Following the release, it will be defined as the default option for all new customers. |
88106
| MMA deprecation | August 2024 | The current MMA autoprovisioning process and its related policy initiative will be deprecated. It can still be used customers, but they won't be eligible for support. |
89107

90-
91108
### Replacing the "Key Vaults should have purge protection enabled" recommendation with combined recommendation "Key Vaults should have deletion protection enabled"
92109

93110
**Estimated date for change: June 2023**
@@ -236,6 +253,7 @@ The following table lists the alerts to be deprecated:
236253
App Service policies are set to be deprecated and replaced so that they only monitor apps using HTTP 1.1 since HTTP 2.0 on App Service doesn't support client certificates. The existing policies that enforce client certificates require an additional check to determine if Http 2.0 is being used by the app. Adding this additional check requires a change to the policy "effect" from Audit to AuditIfNotExists. Policy "effect" changes require deprecation of the old version of the policy and the creation of a replacement.
237254

238255
Policies in this scope:
256+
239257
- App Service apps should have Client Certificates (Incoming client certificates) enabled
240258
- App Service app slots should have Client Certificates (Incoming client certificates) enabled
241259
- Function apps should have Client Certificates (Incoming client certificates) enabled

0 commit comments

Comments
 (0)