You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/adaptive-application-controls.md
+20-21Lines changed: 20 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,20 +4,19 @@ description: This document helps you use adaptive application control in Microso
4
4
author: bmansheim
5
5
ms.author: benmansheim
6
6
ms.topic: how-to
7
-
ms.date: 11/09/2021
7
+
ms.date: 01/08/2023
8
8
9
9
---
10
10
# Use adaptive application controls to reduce your machines' attack surfaces
11
11
12
12
13
-
14
13
Learn about the benefits of Microsoft Defender for Cloud's adaptive application controls and how you can enhance your security with this data-driven, intelligent feature.
15
14
16
15
## What are adaptive application controls?
17
16
18
17
Adaptive application controls are an intelligent and automated solution for defining allowlists of known-safe applications for your machines.
19
18
20
-
Often, organizations have collections of machines that routinely run the same processes. Microsoft Defender for Cloud uses machine learning to analyze the applications running on your machines and create a list of the known-safe software. Allowlists are based on your specific Azure workloads, and you can further customize the recommendations using the instructions below.
19
+
Often, organizations have collections of machines that routinely run the same processes. Microsoft Defender for Cloud uses machine learning to analyze the applications running on your machines and create a list of the known-safe software. Allowlists are based on your specific Azure workloads, and you can further customize the recommendations using the following instructions.
21
20
22
21
When you've enabled and configured adaptive application controls, you'll get security alerts if any application runs other than the ones you've defined as safe.
23
22
@@ -55,7 +54,7 @@ Select the recommendation, or open the adaptive application controls page to vie
55
54
56
55
1. Open the Workload protections dashboard and from the advanced protection area, select **Adaptive application controls**.
57
56
58
-
:::image type="content" source="./media/adaptive-application/opening-adaptive-application-control.png" alt-text="Opening adaptive application controls from the Azure Dashboard." lightbox="./media/adaptive-application/opening-adaptive-application-control.png":::
57
+
:::image type="content" source="./media/adaptive-application/opening-adaptive-application-control-new.png" alt-text="Screenshot showing opening adaptive application controls from the Azure Dashboard." lightbox="./media/adaptive-application/opening-adaptive-application-control.png":::
59
58
60
59
The **Adaptive application controls** page opens with your VMs grouped into the following tabs:
61
60
@@ -66,20 +65,20 @@ Select the recommendation, or open the adaptive application controls page to vie
66
65
-**Recommended** - Groups of machines that consistently run the same applications, and don't have an allowlist configured. We recommend that you enable adaptive application controls for these groups.
67
66
68
67
> [!TIP]
69
-
> If you see a group name with the prefix "REVIEWGROUP", it contains machines with a partially consistent list of applications. Microsoft Defender for Cloud can't see a pattern but recommends reviewing this group to see whether _you_ can manually define some adaptive application controls rules as described in [Editing a group's adaptive application controls rule](#edit-a-groups-adaptive-application-controls-rule).
68
+
> If you see a group name with the prefix "REVIEWGROUP", it contains machines with a partially consistent list of applications. Microsoft Defender for Cloud can't see a pattern but recommends reviewing this group to see whether _you_ can manually define some adaptive application controls rules as described in [Edit a group's adaptive application controls rule](#edit-a-groups-adaptive-application-controls-rule).
70
69
>
71
70
> You can also move machines from this group to other groups as described in [Move a machine from one group to another](#move-a-machine-from-one-group-to-another).
72
71
73
72
-**No recommendation** - Machines without a defined allowlist of applications, and which don't support the feature. Your machine might be in this tab for the following reasons:
74
73
- It's missing a Log Analytics agent
75
74
- The Log Analytics agent isn't sending events
76
75
- It's a Windows machine with a pre-existing [AppLocker](/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview) policy enabled by either a GPO or a local security policy
77
-
- AppLocker is not available (Windows Server Core installations)
76
+
- AppLocker isn't available (Windows Server Core installations)
78
77
79
78
> [!TIP]
80
79
> Defender for Cloud needs at least two weeks of data to define the unique recommendations per group of machines. Machines that have recently been created, or which belong to subscriptions that were only recently protected by Microsoft Defender for Servers, will appear under the **No recommendation** tab.
81
80
82
-
1. Open the **Recommended** tab. The groups of machines with recommended allowlists appears.
81
+
1. Open the **Recommended** tab. The groups of machines with recommended allowlists appear.
@@ -89,7 +88,7 @@ Select the recommendation, or open the adaptive application controls page to vie
89
88
90
89

91
90
92
-
1.**Select machines** - By default, all machines in the identified group are selected. Unselect any to removed them from this rule.
91
+
1.**Select machines** - By default, all machines in the identified group are selected. Unselect any to remove them from this rule.
93
92
94
93
1.**Recommended applications** - Review this list of applications that are common to the machines within this group, and recommended to be allowed to run.
95
94
@@ -98,7 +97,7 @@ Select the recommendation, or open the adaptive application controls page to vie
98
97
> [!TIP]
99
98
> Both application lists include the option to restrict a specific application to certain users. Adopt the principle of least privilege whenever possible.
100
99
>
101
-
> Applications are defined by their publishers, if an application doesn't have publisher information (it's unsigned), a path rule is created for the full path of the specific application.
100
+
> Applications are defined by their publishers; if an application doesn't have publisher information (it's unsigned), a path rule is created for the full path of the specific application.
102
101
103
102
1. To apply the rule, select **Audit**.
104
103
@@ -140,11 +139,11 @@ To edit the rules for a group of machines:
140
139
141
140
## Review and edit a group's settings
142
141
143
-
1. To view the details and settings of your group, select **Group settings**
142
+
1. To view the details and settings of your group, select **Group settings**.
144
143
145
144
This pane shows the name of the group (which can be modified), the OS type, the location, and other relevant details.
146
145
147
-
:::image type="content" source="./media/adaptive-application/adaptive-application-group-settings.png" alt-text="The group settings page for adaptive application controls." lightbox="./media/adaptive-application/adaptive-application-group-settings.png":::
146
+
:::image type="content" source="./media/adaptive-application/adaptive-application-group-settings.png" alt-text="Screenshot showing the group settings page for adaptive application controls." lightbox="./media/adaptive-application/adaptive-application-group-settings.png":::
148
147
149
148
1. Optionally, modify the group's name or file type protection modes.
:::image type="content" source="./media/adaptive-application/recent-alerts.png" alt-text="Screenshot showing selecting a group the group settings page for adaptive application controls." lightbox="./media/adaptive-application/recent-alerts.png":::
181
180
182
181
1. For further details, and the list of affected machines, select an alert.
183
182
184
183
The security alerts page shows more details of the alerts and provides a **Take action** link with recommendations of how to mitigate the threat.
185
184
186
-
:::image type="content" source="media/adaptive-application/adaptive-application-alerts-start-time.png" alt-text="The start time of adaptive application controls alerts is the time that adaptive application controls created the alert.":::
185
+
:::image type="content" source="media/adaptive-application/adaptive-application-alerts-start-time.png" alt-text="Screenshot showing the start time of adaptive application controls alerts is the time that adaptive application controls created the alert.":::
187
186
188
187
> [!NOTE]
189
188
> Adaptive application controls calculates events once every twelve hours. The "activity start time" shown in the security alerts page is the time that adaptive application controls created the alert, **not** the time that the suspicious process was active.
190
189
191
190
192
191
## Move a machine from one group to another
193
192
194
-
When you move a machine from one group to another, the application control policy applied to it changes to the settings of the group that you moved it to. You can also move a machine from a configured group to a non-configured group, doing so removes any application control rules that were applied to the machine.
193
+
When you move a machine from one group to another, the application control policy applied to it changes to the settings of the group that you moved it to. You can also move a machine from a configured group to a non-configured group; doing so removes any application control rules that were applied to the machine.
195
194
196
195
1. Open the **Workload protections dashboard** and from the advanced protection area, select **Adaptive application controls**.
197
196
198
-
1. From the **Adaptive application controls** page, from the **Configured** tab, select the group containing the machine to be moved.
197
+
1. From the **Adaptive application controls** page, from the **Configured** tab, select the group containing the machine to be moved.
199
198
200
199
1. Open the list of **Configured machines**.
201
200
@@ -213,20 +212,20 @@ When you move a machine from one group to another, the application control polic
213
212
214
213
To manage your adaptive application controls programmatically, use our REST API.
215
214
216
-
The relevant API documentation is available in [the Adaptive application Controls section of Defender for Cloud's API docs](/rest/api/defenderforcloud/adaptive-application-controls).
215
+
The relevant API documentation is available in [the Adaptive application Controls section of Defender for Cloud's API docs](https://learn.microsoft.com/rest/api/defenderforcloud/adaptive-application-controls).
217
216
218
-
Some of the functions that are available from the REST API:
217
+
Some of the functions available from the REST API include:
219
218
220
219
***List** retrieves all your group recommendations and provides a JSON with an object for each group.
221
220
222
-
***Get** retrieves the JSON with the full recommendation data (that is, list of machines, publisher/path rules, and so on).
221
+
***Get** retrieves the JSON with the full recommendation data (list of machines, publisher/path rules, etc.).
223
222
224
223
***Put** configures your rule (use the JSON you retrieved with **Get** as the body for this request).
225
224
226
225
> [!IMPORTANT]
227
-
> The **Put** function expects fewer parameters than the JSON returned by the Get command contains.
226
+
> The **Put** function expects fewer parameters than the JSON returned by the **Get** command contains.
228
227
>
229
-
> Remove the following properties before using the JSON in the Put request: recommendationStatus, configurationStatus, issues, location, and sourceSystem.
228
+
> Remove the following properties before using the JSON in the **Put** request: recommendationStatus, configurationStatus, issues, location, and sourceSystem.
230
229
231
230
232
231
## FAQ - Adaptive application controls
@@ -235,7 +234,7 @@ Some of the functions that are available from the REST API:
235
234
-[Why do I see a Qualys app in my recommended applications?](#why-do-i-see-a-qualys-app-in-my-recommended-applications)
236
235
237
236
### Are there any options to enforce the application controls?
238
-
No enforcement options are currently available. Adaptive application controls are intended to provide **security alerts** if any application runs other than the ones you've defined as safe. They have a range of benefits ([What are the benefits of adaptive application controls?](#what-are-the-benefits-of-adaptive-application-controls)) and are extremely customizable as shown on this page.
237
+
No enforcement options are currently available. Adaptive application controls are intended to provide **security alerts** if any application runs other than the ones you've defined as safe. They have a range of benefits ([What are the benefits of adaptive application controls?](#what-are-the-benefits-of-adaptive-application-controls)) and are customizable as shown on this page.
239
238
240
239
### Why do I see a Qualys app in my recommended applications?
241
240
[Microsoft Defender for Servers](defender-for-servers-introduction.md) includes vulnerability scanning for your machines at no extra cost. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Defender for Cloud. For details of this scanner and instructions for how to deploy it, see [Defender for Cloud's integrated Qualys vulnerability assessment solution](deploy-vulnerability-assessment-vm.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-app-service-introduction.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Microsoft Defender for App Service - the benefits and features
3
3
description: Learn about the capabilities of Microsoft Defender for App Service and how to enable it on your subscription
4
-
ms.date: 11/09/2021
4
+
ms.date: 01/10/2023
5
5
ms.topic: overview
6
6
ms.author: benmansheim
7
7
author: bmansheim
@@ -66,7 +66,7 @@ Defender for Cloud monitors for many threats to your App Service resources. The
66
66
67
67
### Dangling DNS detection
68
68
69
-
Defender for App Service also identifies any DNS entries remaining in your DNS registrar when an App Service website is decommissioned - these are known as dangling DNS entries. When you remove a website and don't remove its custom domain from your DNS registrar, the DNS entry is pointing at a non-existent resource and your subdomain is vulnerable to a takeover. Defender for Cloud doesn't scan your DNS registrar for *existing* dangling DNS entries; it alerts you when an App Service website is decommissioned and its custom domain (DNS entry) isn't deleted.
69
+
Defender for App Service also identifies any DNS entries remaining in your DNS registrar when an App Service website is decommissioned - these are known as dangling DNS entries. When you remove a website and don't remove its custom domain from your DNS registrar, the DNS entry is pointing to a non-existent resource, and your subdomain is vulnerable to a takeover. Defender for Cloud doesn't scan your DNS registrar for *existing* dangling DNS entries; it alerts you when an App Service website is decommissioned and its custom domain (DNS entry) isn't deleted.
70
70
71
71
Subdomain takeovers are a common, high-severity threat for organizations. When a threat actor detects a dangling DNS entry, they create their own site at the destination address. The traffic intended for the organization’s domain is then directed to the threat actor's site, and they can use that traffic for a wide range of malicious activity.
72
72
@@ -83,7 +83,7 @@ For a full list of the App Service alerts, see the [Reference table of alerts](a
83
83
84
84
## Next steps
85
85
86
-
In this article, you learned about Microsoft Defender for App Service.
86
+
In this article, you learned about Microsoft Defender for App Service.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-dns-introduction.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Microsoft Defender for DNS - the benefits and features
3
3
description: Learn about the benefits and features of Microsoft Defender for DNS
4
-
ms.date: 11/09/2021
4
+
ms.date: 01/10/2023
5
5
ms.topic: overview
6
6
ms.author: benmansheim
7
7
author: bmansheim
@@ -37,12 +37,13 @@ A full list of the alerts provided by Microsoft Defender for DNS is on the [aler
37
37
38
38
Microsoft Defender for DNS doesn't use any agents.
39
39
40
-
To protect your DNS layer, enable Microsoft Defender for DNS for each of your subscriptions as described in [Enable enhanced protections](enable-enhanced-security.md).
41
40
42
41
## Next steps
43
42
44
43
In this article, you learned about Microsoft Defender for DNS.
45
44
45
+
To protect your DNS layer, enable Microsoft Defender for DNS for each of your subscriptions as described in [Enable enhanced protections](enable-enhanced-security.md).
0 commit comments