Skip to content

Commit 741c5e4

Browse files
authored
Merge pull request #220401 from MicrosoftDocs/main
Publish to live, Monday 4 AM PST, 12/5
2 parents 5526e07 + 851b44c commit 741c5e4

24 files changed

+365
-93
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -759,6 +759,11 @@
759759
"source_path_from_root": "/articles/defender-for-cloud/deploy-vulnerability-assessment-tvm.md",
760760
"redirect_url": "/azure/defender-for-cloud/deploy-vulnerability-assessment-defender-vulnerability-management",
761761
"redirect_document_id": true
762-
}
762+
},
763+
{
764+
"source_path_from_root": "/articles/defender-for-cloud/plan-multicloud-security-other-resources.md",
765+
"redirect_url": "/azure/defender-for-cloud/multicloud",
766+
"redirect_document_id": true
767+
}
763768
]
764769
}

articles/active-directory/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-powershell.md

Lines changed: 17 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -76,18 +76,25 @@ In this article, you learn how to assign a managed identity to an application ro
7676
> [!NOTE]
7777
> Display names for applications are not unique, so you should verify that you obtain the correct application's service principal.
7878
79-
1. Add an [app role](../develop/howto-add-app-roles-in-azure-ad-apps.md) to the application you created in step 3. You can create the role using the Azure portal or by using Microsoft Graph. For example, you could add an app role like this:
79+
1. Add an [app role](../develop/howto-add-app-roles-in-azure-ad-apps.md) to the application you created in step 3. You can create the role using the Azure portal or by using Microsoft Graph. For example, you could add an app role by running the following query on Graph explorer:
80+
81+
```http
82+
PATCH /applications/{id}/
8083
81-
```json
8284
{
83-
"allowedMemberTypes": [
84-
"Application"
85-
],
86-
"displayName": "Read data from MyApi",
87-
"id": "0566419e-bb95-4d9d-a4f8-ed9a0f147fa6",
88-
"isEnabled": true,
89-
"description": "Allow the application to read data as itself.",
90-
"value": "MyApi.Read.All"
85+
"appRoles": [
86+
{
87+
"allowedMemberTypes": [
88+
"User",
89+
"Application"
90+
],
91+
"description": "Read reports",
92+
"id": "1e250995-3081-451e-866c-0f6efef9c638",
93+
"displayName": "Report reader",
94+
"isEnabled": true,
95+
"value": "report.read"
96+
}
97+
]
9198
}
9299
```
93100

articles/azure-monitor/containers/container-insights-logging-v2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Customers can enable the ContainerLogV2 schema at the cluster level. To enable t
3636
Follow the instructions to configure an existing ConfigMap or to use a new one.
3737

3838
### Configure an existing ConfigMap
39-
If your ConfigMap doesn't yet have the `log_collection_settings.schema` field, you'll need to append the following section in your existing ConfigMap .yaml file:
39+
This applies to the scenario where you have already enabled container insights for your AKS cluster and have [configured agent data collection settings](./container-insights-agent-config.md#configure-and-deploy-configmaps) using ConfigMap "_container-azm-ms-agentconfig.yaml_". If this ConfigMap doesn't yet have the `log_collection_settings.schema` field, you'll need to append the following section in this existing ConfigMap .yaml file:
4040

4141
```yaml
4242
[log_collection_settings.schema]

articles/azure-monitor/whats-new.md

Lines changed: 39 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,45 @@ ms.author: edbaynash
88

99
# What's new in Azure Monitor documentation
1010

11-
This article lists significant changes to Azure Monitor documentation.
11+
This article lists significant changes to Azure Monitor documentation.
12+
13+
## November 2022
14+
15+
16+
17+
|Subservice| Article | Description |
18+
|---|---|---|
19+
General|[Cost optimization and Azure Monitor](app/tutorial-app-dashboards.md)|Complete rewrite to align with Well Architected Framework. Detailed content moved to other articles and linked from here.|
20+
Agents|[Collect SNMP trap data with Azure Monitor Agent](essentials/data-collection-transformations-structure.md)|New tutorial that explains how to collect Simple Network Management Protocol (SNMP) traps using Azure Monitor Agent.|
21+
Alerts|[Manage your alert rules](logs/logs-ingestion-api-overview.md)|Recommended alert rules are enabled for AKS and Log Analytics workspace resources in addition to VMs.|
22+
Alerts|[Create a new alert rule](logs/private-link-configure.md)|Resource Health alerts and Service Health alerts are created using the same simplified workflow as all other alert types.|
23+
Application-insights|[What is auto-instrumentation for Azure Monitor Application Insights?](agents/data-collection-text-log.md)|Our auto-instrumentation supported languages chart has been updated.|
24+
Application-insights|[Enable Application Insights logs\|for ASP.NET Core applications](app/api-custom-events-metrics.md)|The Azure Café sample app is now hosted and linked on Git.|
25+
Application-insights|[Application Map: Triage distributed applications](app/javascript.md)|App Map Filters, an exciting new feature, has been documented.|
26+
Application-insights|[How many Application Insights resources should I deploy?](insights/ad-assessment.md)|Clarification has been added on setting iKey dynamically in code.|
27+
Application-insights|[Sampling in Application Insights](insights/capacity-performance.md)|ASP.NET Core applications may be configured in code or through the `appsettings.json` file. Conflicting information was removed.|
28+
Application-insights|[Application Monitoring for Azure App Service and ASP.NET ](insights/dns-analytics.md)|Links to check versions have been corrected.|
29+
Application-insights|[Sampling overrides (preview) - Azure Monitor Application Insights for Java](insights/scom-assessment.md)|Updated OpenTelemetry Span information for Java.|
30+
Autoscale|[Overview of common autoscale patterns](essentials/metrics-supported.md)|Refreshed and updated.|
31+
Essentials|[Azure Monitor workspace (preview)](logs/query-packs.md)|Added Bicep example.|
32+
Essentials|[Configure remote write for Azure Monitor managed service for Prometheus using Azure Active Directory authentication (preview)](change/tutorial-outages.md)|New article|
33+
Essentials|[Azure Monitor managed service for Prometheus (preview)](insights/ad-assessment.md)|General restructure of Prometheus content.|
34+
Essentials|[Diagnostic settings in Azure Monitor](essentials/prometheus-metrics-enable.md)|All destination endpoints support TLS 1.2.|
35+
Essentials|[Migrate from diagnostic settings storage retention to Azure Storage lifecycle management](app/nodejs.md)|Deprecation note added|
36+
Logs|[Cost optimization and Azure Monitor](app/api-custom-events-metrics.md)|Added cost information and removed preview label.|
37+
Logs|[Diagnostic settings in Azure Monitor](app/asp-net-core.md)|Added section on controlling costs with transformations.|
38+
Logs|[Analyze usage in a Log Analytics workspace](app/asp-net-exceptions.md)|Added KQL query that retrieves data volumes for charged data types.|
39+
Logs|[Access the Azure Monitor Log Analytics API](app/java-standalone-profiler.md)|Refresh and update|
40+
Logs|[Collect text logs with the Log Analytics agent in Azure Monitor](app/monitor-web-app-availability.md)|New table management section with new articles on table configuration options, schema management, and custom table creation.|
41+
Logs|[Azure Monitor Metrics overview](essentials/data-platform-metrics.md)| Added a new Azure SDK client library for Go.|
42+
Logs|[Azure Monitor Log Analytics API Overview](essentials/prometheus-metrics-overview.md)| Added a new Azure SDK client library for Go.|
43+
Logs|[Azure Monitor Logs overview](logs/cost-logs.md)| Added a new Azure SDK client library for Go.|
44+
Logs|[Log queries in Azure Monitor](essentials/data-platform-metrics.md)| Added a new Azure SDK client library for Go.|
45+
Logs|[Set a table's log data plan to Basic or Analytics](logs/api/overview.md)|Added new tables to the list of tables that support the Basic log data plan.|
46+
Visualizations|[Get started with Azure Workbooks](alerts/itsmc-connector-deletion.md)|Added instructions for how to share Workbooks.|
47+
Visualizations|[Monitor your Azure services in Grafana](alerts/alerts-create-new-alert-rule.md)|The Grafana integration is GA, and is no longer in preview.|
48+
49+
1250

1351
## October 2022
1452

articles/defender-for-cloud/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -134,8 +134,6 @@
134134
- name: Automate connector deployment
135135
displayName: rest api
136136
href: plan-multicloud-security-automate-connector-deployment.md
137-
- name: Other resources
138-
href: plan-multicloud-security-other-resources.md
139137
- name: Improve your cloud security posture
140138
items:
141139
- name: Policies, initiatives, and recommendations
@@ -611,7 +609,9 @@
611609
- name: Cloud security explorer and attack path analysis
612610
href: episode-twenty.md
613611
- name: Latest updates in the regulatory compliance dashboard
614-
href: episode-twenty-one.md
612+
href: episode-twenty-one.md
613+
- name: Defender EASM
614+
href: episode-twenty-two.md
615615
- name: Manage user data
616616
href: privacy.md
617617
- name: Microsoft Defender for IoT documentation

articles/defender-for-cloud/episode-twenty-one.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,4 +42,4 @@ ms.date: 11/24/2022
4242
## Next steps
4343

4444
> [!div class="nextstepaction"]
45-
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)
45+
> [Defender External Attack Surface Management (Defender EASM)](episode-twenty-two.md)
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
---
2+
title: Defender EASM | Defender for Cloud in the field
3+
titleSuffix: Microsoft Defender for Cloud
4+
description: Learn about Microsoft Defender External Attack Surface Management (Defender EASM)
5+
ms.topic: reference
6+
ms.date: 12/01/2022
7+
---
8+
9+
# Defender EASM | Defender for Cloud in the Field
10+
11+
**Episode description**: In this episode of Defender for Cloud in the Field, Jamil Mirza joins Yuri Diogenes to talk about Microsoft Defender External Attack Surface Management (Defender EASM). Jamil explains how Defender EASM continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. Jamil also covers the integration with Defender for Cloud, how it works, and he demonstrates different capabilities available in Defender EASM..
12+
<br>
13+
<br>
14+
<iframe src="https://aka.ms/docs/player?id=5a3e2eab-52ce-4527-94e0-baae1b9cc81d" width="1080" height="530" allowFullScreen="true" frameBorder="0"></iframe>
15+
16+
- [01:11](/shows/mdc-in-the-field/defender-easm#time=01m11s) - What is Defender EASM?
17+
18+
- [02:59](/shows/mdc-in-the-field/defender-easm#time=02m59s) - How does Defender EASM work?
19+
20+
- [05:55](/shows/mdc-in-the-field/defender-easm#time=05m55s) - What type of information is discovered?
21+
22+
- [09:50](/shows/mdc-in-the-field/defender-easm#time=09m50s) - Integration with Defender for Cloud
23+
24+
- [11:51](/shows/mdc-in-the-field/security-explorer#time=11m51s) - Demonstration
25+
26+
27+
## Recommended resources
28+
- [Learn more](concept-easm.md) about external attack surface management.
29+
- Subscribe to [Microsoft Security on YouTube](https://www.youtube.com/playlist?list=PL3ZTgFEc7LysiX4PfHhdJPR7S8mGO14YS)
30+
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity)
31+
- For more about [Microsoft Security](https://msft.it/6002T9HQY)
32+
33+
- Follow us on social media:
34+
35+
- [LinkedIn](https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbFk5TXZuQld2NlpBRV9BQlJqMktYSm95WWhCZ3xBQ3Jtc0tsQU13MkNPWGNFZzVuem5zc05wcnp0VGxybHprVTkwS2todWw0b0VCWUl4a2ZKYVktNGM1TVFHTXpmajVLcjRKX0cwVFNJaDlzTld4MnhyenBuUGRCVmdoYzRZTjFmYXRTVlhpZGc4MHhoa3N6ZDhFMA&q=https%3A%2F%2Fwww.linkedin.com%2Fshowcase%2Fmicrosoft-security%2F)
36+
- [Twitter](https://twitter.com/msftsecurity)
37+
38+
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity)
39+
40+
- Learn more about [Microsoft Security](https://msft.it/6002T9HQY)
41+
42+
## Next steps
43+
44+
> [!div class="nextstepaction"]
45+
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)

articles/defender-for-cloud/multicloud.yml

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,8 @@ landingContent:
2828
url: /azure/cloud-adoption-framework/scenarios/hybrid/
2929
- text: Why protect multicloud resources with Microsoft Defender for Cloud
3030
url: https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/protect-your-google-cloud-workloads-with-microsoft-defender-for/ba-p/3073360
31+
- text: Get started planning multicloud security
32+
url: plan-multicloud-security-get-started.md
3133
- linkListType: how-to-guide
3234
links:
3335
- text: Connect your non-Azure machines to Defender for Cloud
@@ -72,8 +74,6 @@ landingContent:
7274
url: file-integrity-monitoring-overview.md
7375
- text: Scan your AWS virtual machines for vulnerabilities
7476
url: deploy-vulnerability-assessment-vm.md
75-
- text: Create custom assessments and standards for AWS workloads
76-
url: https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/custom-assessments-and-standards-in-microsoft-defender-for-cloud/ba-p/3066575
7777
- linkListType: video
7878
links:
7979
- text: How to connect AWS to Microsoft Defender for Cloud
@@ -104,10 +104,6 @@ landingContent:
104104
url: defender-for-containers-enable.md?tabs=aks-deploy-portal%2Ck8s-deploy-asc%2Ck8s-verify-asc%2Ck8s-remove-arc%2Caks-removeprofile-api&pivots=defender-for-container-gke
105105
- text: Enable Defender for SQL servers for your GCP SQL databases
106106
url: defender-for-sql-usage.md
107-
- linkListType: how-to-guide
108-
links:
109-
- text: Create custom assessments and standards for GCP workloads
110-
url: https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/custom-assessments-and-standards-in-microsoft-defender-for-cloud/ba-p/3251252
111107
- linkListType: video
112108
links:
113109
- text: How to connect GCP to Microsoft Defender for Cloud

articles/defender-for-cloud/plan-multicloud-security-other-resources.md

Lines changed: 0 additions & 22 deletions
This file was deleted.

articles/defender-for-cloud/quickstart-onboard-aws.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -457,7 +457,6 @@ The following IAM permissions are needed to discover AWS resources:
457457
You can check out the following blogs:
458458
459459
- [Ignite 2021: Microsoft Defender for Cloud news](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/ignite-2021-microsoft-defender-for-cloud-news/ba-p/2882807).
460-
- [Custom assessments and standards in Microsoft Defender for Cloud for AWS workloads (Preview)](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/custom-assessments-and-standards-in-microsoft-defender-for-cloud/ba-p/3066575).
461460
- [Security posture management and server protection for AWS and GCP](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/security-posture-management-and-server-protection-for-aws-and/ba-p/3271388)
462461
463462
## Next steps

0 commit comments

Comments
 (0)