Skip to content

Commit 726bab5

Browse files
Merge pull request #263785 from dcurwin/replace-click-jan22-2024
Fix formatting
2 parents 50ce1a9 + 6f64e4c commit 726bab5

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

articles/defender-for-cloud/faq-general.yml

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ sections:
4444
- question: |
4545
How can I see the current security state of my Azure, multicloud, and on-premises resources?
4646
answer: |
47-
The **Defender for Cloud Overview** page shows the overall security posture of your environment broken down by Compute, Networking, Storage & data, and Applications. Each resource type has an indicator showing identified security vulnerabilities. Clicking each tile displays a list of security issues identified by Defender for Cloud, along with an inventory of the resources in your subscription.
47+
The **Defender for Cloud Overview** page shows the overall security posture of your environment broken down by Compute, Networking, Storage & data, and Applications. Each resource type has an indicator showing identified security vulnerabilities. Selecting each tile displays a list of security issues identified by Defender for Cloud, along with an inventory of the resources in your subscription.
4848
4949
5050
@@ -73,7 +73,7 @@ sections:
7373
* [Network security groups](../virtual-network/network-security-groups-overview.md) and rules to control traffic to virtual machines
7474
* Provisioning of a web application firewall to help defend against attacks targeting your web applications
7575
* Deploying missing system updates
76-
* Addressing OS configurations that do not match the recommended baselines
76+
* Addressing OS configurations that don't match the recommended baselines
7777
7878
Only recommendations that are enabled in Security Policies are shown here.
7979
@@ -92,7 +92,7 @@ sections:
9292
- question: |
9393
What's the difference between threats detected and alerted on by Microsoft Security Response Center versus Microsoft Defender for Cloud?
9494
answer: |
95-
The Microsoft Security Response Center (MSRC) performs select security monitoring of the Azure network and infrastructure and receives threat intelligence and abuse complaints from third parties. When MSRC becomes aware that customer data has been accessed by an unlawful or unauthorized party or that the customers use of Azure does not comply with the terms for Acceptable Use, a security incident manager notifies the customer. Notification typically occurs by sending an email to the security contacts specified in Microsoft Defender for Cloud or the Azure subscription owner if a security contact is not specified.
95+
The Microsoft Security Response Center (MSRC) performs select security monitoring of the Azure network and infrastructure and receives threat intelligence and abuse complaints from third parties. When MSRC becomes aware that customer data was accessed by an unlawful or unauthorized party or that the customer's use of Azure doesn't comply with the terms for Acceptable Use, a security incident manager notifies the customer. Notification typically occurs by sending an email to the security contacts specified in Microsoft Defender for Cloud or the Azure subscription owner if a security contact isn't specified.
9696
9797
Defender for Cloud is an Azure service that continuously monitors the customer's Azure, multicloud, and on-premises environment and applies analytics to automatically detect a wide range of potentially malicious activity. These detections are surfaced as security alerts in the workload protection dashboard.
9898
@@ -112,7 +112,7 @@ sections:
112112
- question: |
113113
What happens when one recommendation is in multiple policy initiatives?
114114
answer: |
115-
Sometimes, a security recommendation appears in more than one policy initiative. If you've got multiple instances of the same recommendation assigned to the same subscription, and you create an exemption for the recommendation, it will affect all of the initiatives that you have permission to edit.
115+
Sometimes, a security recommendation appears in more than one policy initiative. If you have multiple instances of the same recommendation assigned to the same subscription, and you create an exemption for the recommendation, it affects all of the initiatives that you have permission to edit.
116116
117117
If you try to create an exemption for this recommendation, you'll see one of the two following messages:
118118
@@ -149,7 +149,7 @@ sections:
149149
- Privileged containers should be avoided
150150
- Running containers as root user should be avoided
151151
- Services should listen on allowed ports only
152-
- SQL servers should have an Microsoft Entra administrator provisioned
152+
- SQL servers should have a Microsoft Entra administrator provisioned
153153
- Usage of host networking and ports should be restricted
154154
- Usage of pod HostPath volume mounts should be restricted to a known list to restrict node access from compromised containers
155155
@@ -159,7 +159,7 @@ sections:
159159
answer: |
160160
To investigate why the recommendations are still being generated, verify the following configuration options in your MFA CA policy:
161161
162-
- You've included the accounts in the **Users** section of your MFA CA policy (or one of the groups in the **Groups** section)
162+
- You included the accounts in the **Users** section of your MFA CA policy (or one of the groups in the **Groups** section)
163163
- The Azure Management app ID (797f4846-ba00-4fd7-ba43-dac1f8f63013), or all apps, are included in the **Apps** section of your MFA CA policy
164164
- The Azure Management app ID isn't excluded in the **Apps** section of your MFA CA policy
165165
- OR condition is used with only MFA, or AND condition is used with MFA
@@ -211,7 +211,7 @@ sections:
211211
answer: |
212212
There are some limitations to Defender for Cloud's identity and access protections:
213213
214-
- Identity recommendations aren't available for subscriptions with more than 6,000 accounts. In these cases, these types of subscriptions will be listed under Not applicable tab.
214+
- Identity recommendations aren't available for subscriptions with more than 6,000 accounts. In these cases, these types of subscriptions are listed under Not applicable tab.
215215
- Identity recommendations aren't available for Cloud Solution Provider (CSP) partner's admin agents.
216216
- Identity recommendations don't identify accounts that are managed with a privileged identity management (PIM) system. If you're using a PIM tool, you might see inaccurate results in the **Manage access and permissions** control.
217217
- Identity recommendations don't support Microsoft Entra conditional access policies with included Directory Roles instead of users and groups.
@@ -220,7 +220,7 @@ sections:
220220
- question: |
221221
What operating systems for my EC2 instances are supported?
222222
answer: |
223-
For a list of the AMIs with the SSM Agent preinstalled see [this page in the AWS docs](https://docs.aws.amazon.com/systems-manager/latest/userguide/ssm-agent-technical-details.html#ami-preinstalled-agent).
223+
For a list of the AMIs with the SSM Agent preinstalled, see [this page in the AWS docs](https://docs.aws.amazon.com/systems-manager/latest/userguide/ssm-agent-technical-details.html#ami-preinstalled-agent).
224224
225225
For other operating systems, the SSM Agent should be installed manually using the following instructions:
226226
@@ -246,7 +246,7 @@ sections:
246246
| CloudWatch logs | `logs:DescribeLogGroups` <br> `logs:DescribeMetricFilters` |
247247
| CodeBuild | `codebuild:DescribeCodeCoverages` <br> `codebuild:DescribeTestCases` <br> `codebuild:List*` |
248248
| Config Service | `config:Describe*` <br> `config:List*` |
249-
| DMS database migration service | `dms:Describe*` <br> `dms:List*` |
249+
| DMS - database migration service | `dms:Describe*` <br> `dms:List*` |
250250
| DAX | `dax:Describe*` |
251251
| DynamoDB | `dynamodb:Describe*` <br> `dynamodb:List*` |
252252
| Ec2 | `ec2:Describe*` <br> `ec2:GetEbsEncryptionByDefault` |
@@ -255,9 +255,9 @@ sections:
255255
| EFS | `elasticfilesystem:Describe*` |
256256
| EKS | `eks:Describe*` <br> `eks:List*` |
257257
| Elastic Beanstalk | `elasticbeanstalk:Describe*` <br> `elasticbeanstalk:List*` |
258-
| ELB elastic load balancing (v1/2) | `elasticloadbalancing:Describe*` |
258+
| ELB - elastic load balancing (v1/2) | `elasticloadbalancing:Describe*` |
259259
| Elastic search | `es:Describe*` <br> `es:List*` |
260-
| EMR elastic map reduce | `elasticmapreduce:Describe*` <br> `elasticmapreduce:GetBlockPublicAccessConfiguration` <br> `elasticmapreduce:List*` <br> `elasticmapreduce:View*` |
260+
| EMR - elastic map reduce | `elasticmapreduce:Describe*` <br> `elasticmapreduce:GetBlockPublicAccessConfiguration` <br> `elasticmapreduce:List*` <br> `elasticmapreduce:View*` |
261261
| GuardDuty | `guardduty:DescribeOrganizationConfiguration` <br> `guardduty:DescribePublishingDestination` <br> `guardduty:List*` |
262262
| IAM | `iam:Generate*` <br> `iam:Get*` <br> `iam:List*` <br> `iam:Simulate*` |
263263
| KMS | `kms:Describe*` <br> `kms:List*` |
@@ -268,7 +268,7 @@ sections:
268268
| S3 and S3Control | `s3:DescribeJob` <br> `s3:GetEncryptionConfiguration` <br> `s3:GetBucketPublicAccessBlock` <br> `s3:GetBucketTagging` <br> `s3:GetBucketLogging` <br> `s3:GetBucketAcl` <br> `s3:GetBucketLocation` <br> `s3:GetBucketPolicy` <br> `s3:GetReplicationConfiguration` <br> `s3:GetAccountPublicAccessBlock` <br> `s3:GetObjectAcl` <br> `s3:GetObjectTagging` <br> `s3:List*` |
269269
| SageMaker | `sagemaker:Describe*` <br> `sagemaker:GetSearchSuggestions` <br> `sagemaker:List*` <br> `sagemaker:Search` |
270270
| Secret manager | `secretsmanager:Describe*` <br> `secretsmanager:List*` |
271-
| Simple notification service SNS | `sns:Check*` <br> `sns:List*` |
271+
| Simple notification service SNS | `sns:Check*` <br> `sns:List*` |
272272
| SSM | `ssm:Describe*` <br> `ssm:List*` |
273273
| SQS | `sqs:List*` <br> `sqs:Receive*` |
274274
| STS | `sts:GetCallerIdentity` |
@@ -302,7 +302,7 @@ sections:
302302
answer: |
303303
There's no cost for enabling a continuous export. Costs might be incurred for ingestion and retention of data in your Log Analytics workspace, depending on your configuration there.
304304
305-
Many alerts are only provided when you've enabled Defender plans for your resources. A good way to preview the alerts you'll get in your exported data is to see the alerts shown in Defender for Cloud's pages in the Azure portal.
305+
Many alerts are only provided when you enabled Defender plans for your resources. A good way to preview the alerts you get in your exported data is to see the alerts shown in Defender for Cloud's pages in the Azure portal.
306306
307307
Learn more about [Log Analytics workspace pricing](https://azure.microsoft.com/pricing/details/monitor/).
308308
@@ -316,7 +316,7 @@ sections:
316316
answer: |
317317
No. Continuous export is built for streaming of **events**:
318318
319-
- **Alerts** received before you enabled export won't be exported.
319+
- **Alerts** received before you enabled export aren't exported.
320320
- **Recommendations** are sent whenever a resource's compliance state changes. For example, when a resource turns from healthy to unhealthy. Therefore, as with alerts, recommendations for resources that haven't changed state since you enabled export won't be exported.
321321
- **Secure score** per security control or subscription is sent when a security control's score changes by 0.01 or more.
322322
- **Regulatory compliance status** is sent when the status of the resource's compliance changes.

0 commit comments

Comments
 (0)