Skip to content

Commit 68dd8b1

Browse files
Merge pull request #237263 from ElazarK/lior-patch-fix
fixing Liors patch and moving Rn to archive
2 parents 070ce42 + 14fb906 commit 68dd8b1

File tree

2 files changed

+102
-53
lines changed

2 files changed

+102
-53
lines changed

articles/defender-for-cloud/release-notes-archive.md

Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,53 @@ This page provides you with information about:
1717
- Bug fixes
1818
- Deprecated functionality
1919

20+
## November 2022
21+
22+
Updates in November include:
23+
24+
- [Protect containers across your GCP organization with Defender for Containers](#protect-containers-across-your-gcp-organization-with-defender-for-containers)
25+
- [Validate Defender for Containers protections with sample alerts](#validate-defender-for-containers-protections-with-sample-alerts)
26+
- [Governance rules at scale (Preview)](#governance-rules-at-scale-preview)
27+
- [The ability to create custom assessments in AWS and GCP (Preview) has been deprecated](#the-ability-to-create-custom-assessments-in-aws-and-gcp-preview-has-been-deprecated)
28+
- [The recommendation to configure dead-letter queues for Lambda functions has been deprecated](#the-recommendation-to-configure-dead-letter-queues-for-lambda-functions-has-been-deprecated)
29+
30+
### Protect containers across your GCP organization with Defender for Containers
31+
32+
Now you can enable [Defender for Containers](defender-for-containers-introduction.md) for your GCP environment to protect standard GKE clusters across an entire GCP organization. Just create a new GCP connector with Defender for Containers enabled or enable Defender for Containers on an existing organization level GCP connector.
33+
34+
Learn more about [connecting GCP projects and organizations](quickstart-onboard-gcp.md#connect-your-gcp-project) to Defender for Cloud.
35+
36+
### Validate Defender for Containers protections with sample alerts
37+
38+
You can now create sample alerts also for Defender for Containers plan. The new sample alerts are presented as being from AKS, Arc-connected clusters, EKS, and GKE resources with different severities and MITRE tactics. You can use the sample alerts to validate security alert configurations, such as SIEM integrations, workflow automation, and email notifications.
39+
40+
Learn more about [alert validation](alert-validation.md).
41+
42+
### Governance rules at scale (Preview)
43+
44+
We're happy to announce the new ability to apply governance rules at scale (Preview) in Defender for Cloud.
45+
46+
With this new experience, security teams are able to define governance rules in bulk for various scopes (subscriptions and connectors). Security teams can accomplish this task by using management scopes such as Azure management groups, AWS top level accounts or GCP organizations.
47+
48+
Additionally, the Governance rules (Preview) page presents all of the available governance rules that are effective in the organization’s environments.
49+
50+
Learn more about the [new governance rules at-scale experience](governance-rules.md).
51+
52+
> [!NOTE]
53+
> As of January 1, 2023, in order to experience the capabilities offered by Governance, you must have the [Defender CSPM plan](concept-cloud-security-posture-management.md) enabled on your subscription or connector.
54+
55+
### The ability to create custom assessments in AWS and GCP (Preview) has been deprecated
56+
57+
The ability to create custom assessments for [AWS accounts](how-to-manage-aws-assessments-standards.md) and [GCP projects](how-to-manage-gcp-assessments-standards.md), which was a Preview feature, has been deprecated.
58+
59+
### The recommendation to configure dead-letter queues for Lambda functions has been deprecated
60+
61+
The recommendation [`Lambda functions should have a dead-letter queue configured`](https://portal.azure.com/#view/Microsoft_Azure_Security/AwsRecommendationDetailsBlade/assessmentKey/dcf10b98-798f-4734-9afd-800916bf1e65/showSecurityCenterCommandBar~/false) has been deprecated.
62+
63+
| Recommendation | Description | Severity |
64+
|--|--|--|
65+
| Lambda functions should have a dead-letter queue configured | This control checks whether a Lambda function is configured with a dead-letter queue. The control fails if the Lambda function isn't configured with a dead-letter queue. As an alternative to an on-failure destination, you can configure your function with a dead-letter queue to save discarded events for further processing. A dead-letter queue acts the same as an on-failure destination. It's used when an event fails all processing attempts or expires without being processed. A dead-letter queue allows you to look back at errors or failed requests to your Lambda function to debug or identify unusual behavior. From a security perspective, it's important to understand why your function failed and to ensure that your function doesn't drop data or compromise data security as a result. For example, if your function can't communicate to an underlying resource that could be a symptom of a denial of service (DoS) attack elsewhere in the network. | Medium |
66+
2067
## October 2022
2168

2269
Updates in October include:

articles/defender-for-cloud/release-notes.md

Lines changed: 55 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Release notes for Microsoft Defender for Cloud
33
description: A description of what's new and changed in Microsoft Defender for Cloud
44
ms.topic: overview
5-
ms.date: 05/04/2023
5+
ms.date: 05/08/2023
66
---
77

88
# What's new in Microsoft Defender for Cloud?
@@ -22,15 +22,17 @@ Updates in May include:
2222

2323
- [Agentless scanning now supports encrypted disks in AWS](#agentless-scanning-now-supports-encrypted-disks-in-aws)
2424
- [Revised JIT (Just-In-Time) rule naming conventions in Defender for Cloud](#revised-jit-just-in-time-rule-naming-conventions-in-defender-for-cloud)
25+
- [Onboard selected AWS regions](#onboard-selected-aws-regions)
26+
- [Multiple changes to identity recommendations](#multiple-changes-to-identity-recommendations)
2527

2628
### Agentless scanning now supports encrypted disks in AWS
2729

2830
Agentless scanning for VMs now supports processing of instances with encrypted disks in AWS, using both CMK and PMK.
2931

3032
This extended support increases coverage and visibility over your cloud estate without impacting your running workloads. Support for encrypted disks maintains the same zero impact method on running instances.
3133

32-
- For new customers enabling agentless scanning in AWS - encrypted disks coverage is built-in and supported by default.
33-
- For existing customers that already have an AWS connector with agentless scanning enabled, you will need to re-apply the CloudFormation stack to your onboarded AWS accounts to update and add the new permissions that are required to process encrypted disks. The updated CloudFormation template includes new assignments that allow Defender for Cloud to process encrypted disks.
34+
- For new customers enabling agentless scanning in AWS - encrypted disks coverage is built in and supported by default.
35+
- For existing customers that already have an AWS connector with agentless scanning enabled, you'll need to reapply the CloudFormation stack to your onboarded AWS accounts to update and add the new permissions that are required to process encrypted disks. The updated CloudFormation template includes new assignments that allow Defender for Cloud to process encrypted disks.
3436

3537
You can learn more about the [permissions used to scan AWS instances](concept-agentless-data-collection.md#which-permissions-are-used-by-agentless-scanning).
3638

@@ -58,6 +60,53 @@ The changes are listed as follows:
5860

5961
Learn how to [secure your management ports with Just-In-Time access](just-in-time-access-usage.md).
6062

63+
### Onboard selected AWS regions
64+
65+
To help you manage your AWS CloudTrail costs and compliance needs, you can now select which AWS regions to scan when you add or edit a cloud connector.
66+
You can now scan selected specific AWS regions or all available regions (default), when you onboard your AWS accounts to Defender for Cloud.
67+
Learn more at [Connect your AWS account to Microsoft Defender for Cloud](quickstart-onboard-aws.md).
68+
69+
### Multiple changes to identity recommendations
70+
71+
The following recommendations are now released as General Availability (GA) and are replacing the V1 recommendations that are now deprecated.
72+
73+
#### General Availability (GA) release of identity recommendations V2
74+
75+
The V2 release of identity recommendations introduces the following enhancements:
76+
- The scope of the scan has been expanded to include all Azure resources, not just subscriptions. Which enables security administrators to view role assignments per account.
77+
- Specific accounts can now be exempted from evaluation. Accounts such as break the glass or service accounts can be excluded by security administrators.
78+
- The scan frequency has been increased from 24 hours to 12 hours, thereby ensuring that the identity recommendations are more up-to-date and accurate.
79+
80+
The following security recommendations are available in GA and replace the V1 recommendations:
81+
82+
|Recommendation | Assessment Key|
83+
|--|--|
84+
| Accounts with owner permissions on Azure resources should be MFA enabled | 6240402e-f77c-46fa-9060-a7ce53997754 |
85+
| Accounts with write permissions on Azure resources should be MFA enabled | c0cb17b2-0607-48a7-b0e0-903ed22de39b |
86+
| Accounts with read permissions on Azure resources should be MFA enabled | dabc9bc4-b8a8-45bd-9a5a-43000df8aa1c |
87+
| Guest accounts with owner permissions on Azure resources should be removed | 20606e75-05c4-48c0-9d97-add6daa2109a |
88+
| Guest accounts with write permissions on Azure resources should be removed | 0354476c-a12a-4fcc-a79d-f0ab7ffffdbb |
89+
| Guest accounts with read permissions on Azure resources should be removed | fde1c0c9-0fd2-4ecc-87b5-98956cbc1095 |
90+
| Blocked accounts with owner permissions on Azure resources should be removed | 050ac097-3dda-4d24-ab6d-82568e7a50cf |
91+
| Blocked accounts with read and write permissions on Azure resources should be removed | 1ff0b4c9-ed56-4de6-be9c-d7ab39645926 |
92+
93+
#### Deprecation of identity recommendations V1
94+
95+
The following security recommendations are now deprecated:
96+
97+
| Recommendation | Assessment Key |
98+
|--|--|
99+
| MFA should be enabled on accounts with owner permissions on subscriptions | 94290b00-4d0c-d7b4-7cea-064a9554e681 |
100+
| MFA should be enabled on accounts with write permissions on subscriptions | 57e98606-6b1e-6193-0e3d-fe621387c16b |
101+
| MFA should be enabled on accounts with read permissions on subscriptions | 151e82c5-5341-a74b-1eb0-bc38d2c84bb5 |
102+
| External accounts with owner permissions should be removed from subscriptions | c3b6ae71-f1f0-31b4-e6c1-d5951285d03d |
103+
| External accounts with write permissions should be removed from subscriptions | 04e7147b-0deb-9796-2e5c-0336343ceb3d |
104+
| External accounts with read permissions should be removed from subscriptions | a8c6a4ad-d51e-88fe-2979-d3ee3c864f8b |
105+
| Deprecated accounts with owner permissions should be removed from subscriptions | e52064aa-6853-e252-a11e-dffc675689c2 |
106+
| Deprecated accounts should be removed from subscriptions | 00c6d40b-e990-6acf-d4f3-471e747a27c4 |
107+
108+
We recommend updating your custom scripts, workflows, and governance rules to correspond with the V2 recommendations.
109+
61110
## April 2023
62111

63112
Updates in April include:
@@ -200,9 +249,9 @@ will both be available until the [Log Analytics agent is deprecated on August 31
200249

201250
The new recommendation `System updates should be installed on your machines (powered by Update management center)`, has a remediation flow available through the Fix button, which can be used to remediate any results through the Update Management Center (Preview). This remediation process is still in Preview.
202251

203-
The new recommendation `System updates should be installed on your machines (powered by Update management center)`, isn't expected to affect your Secure Score, as it will have the same results as the old recommendation `System updates should be installed on your machines`.
252+
The new recommendation `System updates should be installed on your machines (powered by Update management center)`, isn't expected to affect your Secure Score, as it has the same results as the old recommendation `System updates should be installed on your machines`.
204253

205-
The prerequisite recommendation ([Enable the periodic assessment property](../update-center/assessment-options.md#periodic-assessment)) will have a negative effect on your Secure Score. You can remediate the negative effect with the available [Fix button](implement-security-recommendations.md).
254+
The prerequisite recommendation ([Enable the periodic assessment property](../update-center/assessment-options.md#periodic-assessment)) has a negative effect on your Secure Score. You can remediate the negative effect with the available [Fix button](implement-security-recommendations.md).
206255

207256
### Defender for APIs (Preview)
208257

@@ -389,7 +438,7 @@ Updates in January include:
389438

390439
### The Endpoint protection (Microsoft Defender for Endpoint) component is now accessed in the Settings and monitoring page
391440

392-
To access Endpoint protection navigate to **Environment settings** > **Defender plans** > **Settings and monitoring**. From here you can set Endpoint protection to **On**. You can also see all of the other components that are managed.
441+
To access Endpoint protection, navigate to **Environment settings** > **Defender plans** > **Settings and monitoring**. From here you can set Endpoint protection to **On**. You can also see all of the other components that are managed.
393442

394443
Learn more about [enabling Microsoft Defender for Endpoint](integration-defender-for-endpoint.md) on your servers with Defender for Servers.
395444

@@ -461,53 +510,6 @@ With the express configuration experience for vulnerability assessments, securit
461510

462511
Learn more about [Defender for SQL vulnerability assessment](sql-azure-vulnerability-assessment-overview.md).
463512

464-
## November 2022
465-
466-
Updates in November include:
467-
468-
- [Protect containers across your GCP organization with Defender for Containers](#protect-containers-across-your-gcp-organization-with-defender-for-containers)
469-
- [Validate Defender for Containers protections with sample alerts](#validate-defender-for-containers-protections-with-sample-alerts)
470-
- [Governance rules at scale (Preview)](#governance-rules-at-scale-preview)
471-
- [The ability to create custom assessments in AWS and GCP (Preview) has been deprecated](#the-ability-to-create-custom-assessments-in-aws-and-gcp-preview-has-been-deprecated)
472-
- [The recommendation to configure dead-letter queues for Lambda functions has been deprecated](#the-recommendation-to-configure-dead-letter-queues-for-lambda-functions-has-been-deprecated)
473-
474-
### Protect containers across your GCP organization with Defender for Containers
475-
476-
Now you can enable [Defender for Containers](defender-for-containers-introduction.md) for your GCP environment to protect standard GKE clusters across an entire GCP organization. Just create a new GCP connector with Defender for Containers enabled or enable Defender for Containers on an existing organization level GCP connector.
477-
478-
Learn more about [connecting GCP projects and organizations](quickstart-onboard-gcp.md#connect-your-gcp-project) to Defender for Cloud.
479-
480-
### Validate Defender for Containers protections with sample alerts
481-
482-
You can now create sample alerts also for Defender for Containers plan. The new sample alerts are presented as being from AKS, Arc-connected clusters, EKS, and GKE resources with different severities and MITRE tactics. You can use the sample alerts to validate security alert configurations, such as SIEM integrations, workflow automation, and email notifications.
483-
484-
Learn more about [alert validation](alert-validation.md).
485-
486-
### Governance rules at scale (Preview)
487-
488-
We're happy to announce the new ability to apply governance rules at scale (Preview) in Defender for Cloud.
489-
490-
With this new experience, security teams are able to define governance rules in bulk for various scopes (subscriptions and connectors). Security teams can accomplish this task by using management scopes such as Azure management groups, AWS top level accounts or GCP organizations.
491-
492-
Additionally, the Governance rules (Preview) page presents all of the available governance rules that are effective in the organization’s environments.
493-
494-
Learn more about the [new governance rules at-scale experience](governance-rules.md).
495-
496-
> [!NOTE]
497-
> As of January 1, 2023, in order to experience the capabilities offered by Governance, you must have the [Defender CSPM plan](concept-cloud-security-posture-management.md) enabled on your subscription or connector.
498-
499-
### The ability to create custom assessments in AWS and GCP (Preview) has been deprecated
500-
501-
The ability to create custom assessments for [AWS accounts](how-to-manage-aws-assessments-standards.md) and [GCP projects](how-to-manage-gcp-assessments-standards.md), which was a Preview feature, has been deprecated.
502-
503-
### The recommendation to configure dead-letter queues for Lambda functions has been deprecated
504-
505-
The recommendation [`Lambda functions should have a dead-letter queue configured`](https://portal.azure.com/#view/Microsoft_Azure_Security/AwsRecommendationDetailsBlade/assessmentKey/dcf10b98-798f-4734-9afd-800916bf1e65/showSecurityCenterCommandBar~/false) has been deprecated.
506-
507-
| Recommendation | Description | Severity |
508-
|--|--|--|
509-
| Lambda functions should have a dead-letter queue configured | This control checks whether a Lambda function is configured with a dead-letter queue. The control fails if the Lambda function isn't configured with a dead-letter queue. As an alternative to an on-failure destination, you can configure your function with a dead-letter queue to save discarded events for further processing. A dead-letter queue acts the same as an on-failure destination. It's used when an event fails all processing attempts or expires without being processed. A dead-letter queue allows you to look back at errors or failed requests to your Lambda function to debug or identify unusual behavior. From a security perspective, it's important to understand why your function failed and to ensure that your function doesn't drop data or compromise data security as a result. For example, if your function can't communicate to an underlying resource that could be a symptom of a denial of service (DoS) attack elsewhere in the network. | Medium |
510-
511513
## Next steps
512514

513515
For past changes to Defender for Cloud, see [Archive for what's new in Defender for Cloud?](release-notes-archive.md).

0 commit comments

Comments
 (0)