Skip to content

Commit 6ea5a2f

Browse files
authored
Merge pull request #271172 from dcurwin/fix-formatting-april4-2024
Fix formatting
2 parents 1da586e + 240dbea commit 6ea5a2f

23 files changed

+78
-74
lines changed

articles/defender-for-cloud/concept-regulatory-compliance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ This benchmark builds on the cloud security principles defined by the Azure Secu
1717

1818
:::image type="content" source="media/concept-regulatory-compliance/microsoft-security-benchmark.png" alt-text="Image that shows the components that make up the Microsoft cloud security benchmark." lightbox="media/concept-regulatory-compliance/microsoft-security-benchmark.png":::
1919

20-
The compliance dashboard gives you a view of your overall compliance standing. Security for non-Azure platforms follows the same cloud-neutral security principles as Azure. Each control within the benchmark provides the same granularity and scope of technical guidance across Azure and other cloud resources.
20+
The compliance dashboard gives you a view of your overall compliance standing. Security for non-Azure platforms follows the same cloud-neutral security principles as Azure. Each control within the benchmark provides the same granularity and scope of technical guidance across Azure and other cloud resources.
2121

2222
:::image type="content" source="media/concept-regulatory-compliance/compliance-dashboard.png" alt-text="Screenshot of a sample regulatory compliance page in Defender for Cloud." lightbox="media/concept-regulatory-compliance/compliance-dashboard.png":::
2323

articles/defender-for-cloud/connect-servicenow.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,14 +15,14 @@ Microsoft Defender for Cloud's integration with ServiceNow allows customers to c
1515

1616
## Prerequisites
1717

18-
- Have an [application registry in ServiceNow](https://docs.servicenow.com/bundle/utah-employee-service-management/page/product/meeting-extensibility/task/create-app-registry-meeting-extensibility.html).
18+
- Have an [application registry in ServiceNow](https://docs.servicenow.com/bundle/utah-employee-service-management/page/product/meeting-extensibility/task/create-app-registry-meeting-extensibility.html).
1919

2020
- Enable [Defender Cloud Security Posture Management (CSPM)](tutorial-enable-cspm-plan.md) on your Azure subscription.
2121

2222
- The following roles are required:
23-
- To create the integration: Security Admin, Contributor, or Owner.
23+
- To create the integration: Security Admin, Contributor, or Owner.
2424

25-
## Connect ServiceNow to Defender for Cloud
25+
## Connect a ServiceNow account to Defender for Cloud
2626

2727
To connect a ServiceNow account to a Defender for Cloud account:
2828

articles/defender-for-cloud/container-image-mapping.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,11 +14,11 @@ When a vulnerability is identified in a container image stored in a container re
1414

1515
- An Azure account with Defender for Cloud onboarded. If you don't already have an Azure account, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
1616
- [Azure DevOps](quickstart-onboard-devops.md) or [GitHub](quickstart-onboard-github.md) environment onboarded to Microsoft Defender for Cloud.
17-
- When an Azure DevOps environment is onboarded to Microsoft Defender for Cloud, the Microsoft Defender for DevOps Container Mapping will be automatically shared and installed in all connected Azure DevOps organizations. This will automatically inject tasks into all Azure Pipelines to collect data for container mapping.
18-
19-
- For Azure DevOps, [Microsoft Security DevOps (MSDO) Extension](azure-devops-extension.md) installed on the Azure DevOps organization.
17+
- When an Azure DevOps environment is onboarded to Microsoft Defender for Cloud, the Microsoft Defender for DevOps Container Mapping will be automatically shared and installed in all connected Azure DevOps organizations. This will automatically inject tasks into all Azure Pipelines to collect data for container mapping.
2018

21-
- For GitHub, [Microsoft Security DevOps (MSDO) Action](github-action.md) configured in your GitHub repositories. Additionally, the GitHub Workflow must have "**id-token: write"** permissions for federation with Defender for Cloud. For an example, see [this YAML](https://github.com/microsoft/security-devops-action/blob/7e3060ae1e6a9347dd7de6b28195099f39852fe2/.github/workflows/on-push-verification.yml).
19+
- For Azure DevOps, [Microsoft Security DevOps (MSDO) Extension](azure-devops-extension.md) installed on the Azure DevOps organization.
20+
21+
- For GitHub, [Microsoft Security DevOps (MSDO) Action](github-action.md) configured in your GitHub repositories. Additionally, the GitHub Workflow must have "**id-token: write"** permissions for federation with Defender for Cloud. For an example, see [this YAML](https://github.com/microsoft/security-devops-action/blob/7e3060ae1e6a9347dd7de6b28195099f39852fe2/.github/workflows/on-push-verification.yml).
2222
- [Defender CSPM](tutorial-enable-cspm-plan.md) enabled.
2323
- The container images must be built using [Docker](https://www.docker.com/) and the Docker client must be able to access the Docker server during the build.
2424

@@ -111,4 +111,3 @@ The following is an example of an advanced query that utilizes container image m
111111
## Next steps
112112
113113
- Learn more about [DevOps security in Defender for Cloud](defender-for-devops-introduction.md).
114-

articles/defender-for-cloud/create-governance-rule-servicenow.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,16 +11,16 @@ ai-usage: ai-assisted
1111

1212
# Create automatic tickets with governance rules
1313

14-
The integration of SeviceNow and Defender for Cloud allow you to create governance rules that automatically open tickets in SeviceNow for specific recommendations or severity levels. ServiceNow tickets can be created, viewed, and linked to recommendations directly from Defender for Cloud, enabling seamless collaboration between the two platforms and facilitating efficient incident management.
14+
The integration of ServiceNow and Defender for Cloud allow you to create governance rules that automatically open tickets in ServiceNow for specific recommendations or severity levels. ServiceNow tickets can be created, viewed, and linked to recommendations directly from Defender for Cloud, enabling seamless collaboration between the two platforms and facilitating efficient incident management.
1515

1616
## Prerequisites
1717

18-
- Have an [application registry in ServiceNow](https://docs.servicenow.com/bundle/utah-employee-service-management/page/product/meeting-extensibility/task/create-app-registry-meeting-extensibility.html).
18+
- Have an [application registry in ServiceNow](https://docs.servicenow.com/bundle/utah-employee-service-management/page/product/meeting-extensibility/task/create-app-registry-meeting-extensibility.html).
1919

2020
- Enable [Defender Cloud Security Posture Management (CSPM)](tutorial-enable-cspm-plan.md) on your Azure subscription.
2121

2222
- The following roles are required:
23-
- To create an assignment: Admin permissions to ServiceNow.
23+
- To create an assignment: Admin permissions to ServiceNow.
2424

2525
## Assign an owner with a governance rule
2626

articles/defender-for-cloud/create-ticket-servicenow.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,18 +9,18 @@ ai-usage: ai-assisted
99
#customer intent: As a user, I want to learn how to Create a ticket in Defender for Cloud for my ServiceNow account.
1010
---
1111

12-
# Create a ticket in Defender for Cloud
12+
# Create a ticket in Defender for Cloud
1313

1414
The integration between Defender for Cloud and ServiceNow allows Defender for Cloud customers to create tickets in Defender for Cloud that connects to a ServiceNow account. ServiceNow tickets are linked to recommendations directly from Defender for Cloud, allowing the two platforms to facilitate efficient incident management.
1515

1616
## Prerequisites
1717

18-
- Have an [application registry in ServiceNow](https://docs.servicenow.com/bundle/utah-employee-service-management/page/product/meeting-extensibility/task/create-app-registry-meeting-extensibility.html).
18+
- Have an [application registry in ServiceNow](https://docs.servicenow.com/bundle/utah-employee-service-management/page/product/meeting-extensibility/task/create-app-registry-meeting-extensibility.html).
1919

2020
- Enable [Defender Cloud Security Posture Management (CSPM)](tutorial-enable-cspm-plan.md) on your Azure subscription.
2121

2222
- The following roles are required:
23-
- To create an assignment: Admin permissions to ServiceNow.
23+
- To create an assignment: Admin permissions to ServiceNow.
2424

2525
## Create a new ticket based on a recommendation to ServiceNow
2626

articles/defender-for-cloud/defender-for-databases-introduction.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,14 +25,17 @@ Check out the [pricing page](https://azure.microsoft.com/pricing/details/defende
2525
Defender for open-source relational database is supported on PaaS environments and not on Azure Arc-enabled machines.
2626

2727
**Protected versions of PostgreSQL include**:
28-
- Single Server - General Purpose and Memory Optimized. Learn more in [PostgreSQL Single Server pricing tiers](../postgresql/concepts-pricing-tiers.md).
28+
29+
- Single Server - General Purpose and Memory Optimized. Learn more in [PostgreSQL Single Server pricing tiers](../postgresql/concepts-pricing-tiers.md).
2930
- Flexible Server - all pricing tiers.
3031

3132
**Protected versions of MySQL include**:
33+
3234
- Single Server - General Purpose and Memory Optimized. Learn more in [MySQL pricing tiers](../mysql/concepts-pricing-tiers.md).
3335
- Flexible Server - all pricing tiers.
3436

3537
**Protected versions of MariaDB include**:
38+
3639
- General Purpose and Memory Optimized. Learn more in [MariaDB pricing tiers](../mariadb/concepts-pricing-tiers.md).
3740

3841
View [cloud availability](support-matrix-cloud-environment.md#cloud-support) for Defender for open-source relational databases

articles/defender-for-cloud/enable-pull-request-annotations.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,14 +22,14 @@ Annotations can be added by a user with access to the repository, and can be use
2222
**For GitHub**:
2323

2424
- An Azure account. If you don't already have an Azure account, you can [create your Azure free account today](https://azure.microsoft.com/free/).
25-
- Be a [GitHub Advanced Security](https://docs.github.com/en/get-started/learning-about-github/about-github-advanced-security) customer.
25+
- Be a [GitHub Advanced Security](https://docs.github.com/en/get-started/learning-about-github/about-github-advanced-security) customer.
2626
- [Connect your GitHub repositories to Microsoft Defender for Cloud](quickstart-onboard-github.md).
2727
- [Configure the Microsoft Security DevOps GitHub action](github-action.md).
2828

2929
**For Azure DevOps**:
3030

3131
- An Azure account. If you don't already have an Azure account, you can [create your Azure free account today](https://azure.microsoft.com/free/).
32-
- [Have write access (owner/contributer) to the Azure subscription](../active-directory/privileged-identity-management/pim-how-to-activate-role.md).
32+
- [Have write access (owner/contributer) to the Azure subscription](../active-directory/privileged-identity-management/pim-how-to-activate-role.md).
3333
- [Connect your Azure DevOps repositories to Microsoft Defender for Cloud](quickstart-onboard-devops.md).
3434
- [Configure the Microsoft Security DevOps Azure DevOps extension](azure-devops-extension.md).
3535

@@ -98,13 +98,13 @@ Before you can enable pull request annotations, your main branch must have enabl
9898
9999
:::image type="content" source="media/tutorial-enable-pr-annotations/branch-policies.png" alt-text="Screenshot that shows where to locate the branch policies." lightbox="media/tutorial-enable-pr-annotations/branch-policies.png":::
100100
101-
1. Locate the Build Validation section.
101+
1. Locate the Build Validation section.
102102
103103
1. Ensure the build validation for your repository is toggled to **On**.
104104
105105
:::image type="content" source="media/tutorial-enable-pr-annotations/build-validation.png" alt-text="Screenshot that shows where the CI Build toggle is located." lightbox="media/tutorial-enable-pr-annotations/build-validation.png":::
106106
107-
1. Select **Save**.
107+
1. Select **Save**.
108108
109109
:::image type="content" source="media/tutorial-enable-pr-annotations/validation-policy.png" alt-text="Screenshot that shows the build validation.":::
110110
@@ -148,6 +148,7 @@ API Info:
148148
149149
**Http Method**: PATCH
150150
**URLs**:
151+
151152
- Azure DevOps Project Update: `https://management.azure.com/subscriptions/<subId>/resourcegroups/<resourceGroupName>/providers/Microsoft.Security/securityConnectors/<connectorName>/devops/default/azureDevOpsOrgs/<adoOrgName>/projects/<adoProjectName>?api-version=2023-09-01-preview`
152153
- Azure DevOps Org Update]: `https://management.azure.com/subscriptions/<subId>/resourcegroups/<resourceGroupName>/providers/Microsoft.Security/securityConnectors/<connectorName>/devops/default/azureDevOpsOrgs/<adoOrgName>?api-version=2023-09-01-preview`
153154

@@ -173,12 +174,12 @@ Parameters / Options Available
173174
**Options**: Enabled | Disabled
174175

175176
**`<Category>`**
176-
**Description**: Category of Findings that will be annotated on pull requests.
177+
**Description**: Category of Findings that will be annotated on pull requests.
177178
**Options**: IaC | Code | Artifacts | Dependencies | Containers
178179
**Note**: Only IaC is supported currently
179180

180181
**`<Severity>`**
181-
**Description**: The minimum severity of a finding that will be considered when creating PR annotations.
182+
**Description**: The minimum severity of a finding that will be considered when creating PR annotations.
182183
**Options**: High | Medium | Low
183184

184185
Example of enabling an Azure DevOps Org's PR Annotations for the IaC category with a minimum severity of Medium using the az cli tool.

articles/defender-for-cloud/endpoint-detection-response.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ai-usage: ai-assisted
1313

1414
Microsoft Defender for Cloud provides recommendations to secure and configure your endpoint detection and response solutions. By remediating these recommendations, you can ensure that your endpoint detection and response solution are compliant and secure across all environments.
1515

16-
The endpoint detection and response recommendations allow you to:
16+
The endpoint detection and response recommendations allow you to:
1717

1818
- Identify if an endpoint detection and response solution is installed on your multicloud machines
1919

@@ -27,16 +27,16 @@ The recommendations mentioned in this article are only available if you have the
2727

2828
- [Defender for Cloud](connect-azure-subscription.md) enabled on your Azure account.
2929

30-
- You must have either of the following plans enabled on Defender for Cloud enabled on your subscription:
31-
- [Defender for Servers plan 2](tutorial-enable-servers-plan.md)
32-
- [Defender Cloud Security Posture Management (CSPM)](tutorial-enable-cspm-plan.md)
30+
- You must have either of the following plans enabled on Defender for Cloud enabled on your subscription:
31+
- [Defender for Servers plan 2](tutorial-enable-servers-plan.md)
32+
- [Defender Cloud Security Posture Management (CSPM)](tutorial-enable-cspm-plan.md)
3333

3434
- You must enable [agentless scanning for virtual machines](enable-agentless-scanning-vms.md#enabling-agentless-scanning-for-machines).
3535

3636
> [!NOTE]
3737
> The feature described on this page is the replacement feature for the [MMA based feature](endpoint-protection-recommendations-technical.md), which is set to be retired along with the MMA retirement in August 2024.
3838
>
39-
> Learn more about the migration and the [deprecation process of the endpoint protection related recommendations](prepare-deprecation-log-analytics-mma-agent.md#endpoint-protection-recommendations-experience).
39+
> Learn more about the migration and the [deprecation process of the endpoint protection related recommendations](prepare-deprecation-log-analytics-mma-agent.md#endpoint-protection-recommendations-experience).
4040
4141
## Review and remediate endpoint detection and response discovery recommendations
4242

@@ -140,7 +140,7 @@ This recommended action is available when:
140140

141141
**To enable the Defender for Endpoint integration on your Defender for Servers plan on the affected VM**:
142142

143-
1. Select the affected machine.
143+
1. Select the affected machine.
144144

145145
1. (Optional) Select multiple affected machines that have the `Upgrade Defender plan` recommended action.
146146

@@ -170,7 +170,7 @@ This recommended action is available when:
170170

171171
:::image type="content" source="media/endpoint-detection-response/remediation-steps.png" alt-text="Screenshot that shows where the remediation steps are located in the recommendation." lightbox="media/endpoint-detection-response/remediation-steps.png":::
172172

173-
1. Follow the instructions to troubleshoot Microsoft Defender for Endpoint onboarding issues for [Windows](/microsoft-365/security/defender-endpoint/troubleshoot-onboarding?view=o365-worldwide&WT.mc_id=Portal-Microsoft_Azure_Security) or [Linux](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-linux?view=o365-worldwide&WT.mc_id=Portal-Microsoft_Azure_Security).
173+
1. Follow the instructions to troubleshoot Microsoft Defender for Endpoint onboarding issues for [Windows](/microsoft-365/security/defender-endpoint/troubleshoot-onboarding) or [Linux](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-linux).
174174

175175
After the process is completed, it can take up to 24 hours until your machine appears in the Healthy resources tab.
176176

@@ -218,7 +218,7 @@ When Defender for Cloud finds misconfigurations in your endpoint detection and r
218218

219219
1. Follow the remediation steps.
220220

221-
After the process is completed, it can take up to 24 hours until your machine appears in the Healthy resources tab.
221+
After the process is completed, it can take up to 24 hours until your machine appears in the Healthy resources tab.
222222

223223
## Next step
224224

articles/defender-for-cloud/faq-cspm.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,13 +19,13 @@ sections:
1919
- question: |
2020
If I address only three out of four recommendations in a security control, will my secure score change?
2121
answer: |
22-
No. It won't change until you remediate all of the recommendations for a single resource. To get the maximum score for a control, you must remediate all recommendations for all resources.
22+
No. It doesn't change until you remediate all of the recommendations for a single resource. To get the maximum score for a control, you must remediate all recommendations for all resources.
2323
2424
2525
- question: |
2626
If a security control offers me zero points towards my secure score, should I ignore it?
2727
answer: |
28-
In some cases, you'll see a control max score greater than zero, but the impact is zero. When the incremental score for fixing resources is negligible, it's rounded to zero. Don't ignore these recommendations because they still bring security improvements. The only exception is the "Additional Best Practice" control. Remediating these recommendations won't increase your score, but it will enhance your overall security.
28+
In some cases, you'll see a control max score greater than zero, but the impact is zero. When the incremental score for fixing resources is negligible, it's rounded to zero. Don't ignore these recommendations because they still bring security improvements. The only exception is the "Additional Best Practice" control. Remediating these recommendations doesn't increase your score, but it enhances your overall security.
2929
3030
- question: |
3131
How does scanning affect the instances?
@@ -40,7 +40,7 @@ sections:
4040
4141
| Cloud provider | Changes |
4242
|---------|---------|
43-
| Azure | - Adds a VM Scanner Operator role assignment<br>- Adds a vmScanners resource with the relevant configurations used to manage the scanning process |
43+
| Azure | - Adds a "VM Scanner Operator" role assignment<br>- Adds a "vmScanners" resource with the relevant configurations used to manage the scanning process |
4444
| AWS | - Adds role assignment<br>- Adds authorized audience to OpenIDConnect provider<br>- Snapshots are created next to the scanned volumes, in the same account, during the scan (typically for a few minutes) |
4545
| GCP | - Adds a role assignment |
4646
@@ -52,7 +52,7 @@ sections:
5252
- question: |
5353
Can I calculate the secure score at the resource group level?
5454
answer: |
55-
Secure score is calculated per Azure subscription, AWS account or GCP project. You can also view the secure score within the management scope such as Azure management group, AWS management account or GCP organization. There's no secure score per resource group.
55+
Secure score is calculated per Azure subscription, AWS account, or GCP project. You can also view the secure score within the management scope such as Azure management group, AWS management account, or GCP organization. There's no secure score per resource group.
5656
5757
5858

0 commit comments

Comments
 (0)