Skip to content

Commit 747699a

Browse files
authored
Merge pull request #105782 from memildin/asc-melvyn-20200129
Brought consistency to threat protection terminology
2 parents 0706132 + 6a5e074 commit 747699a

19 files changed

+61
-64
lines changed

articles/security-center/advanced-threat-protection-key-vault.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Set up advanced threat protection for Azure Key Vault
2+
title: Threat protection for Azure Key Vault
33
description: This article explains how to set up advanced threat protection for Azure Key Vault in Azure Security Center
44
services: security-center
55
author: memildin

articles/security-center/container-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,9 +57,9 @@ AKS provides security controls and visibility into the security posture of your
5757

5858
For details of the relevant Security Center recommendations that might appear for this feature, see the [container section](recommendations-reference.md#recs-containers) of the recommendations reference table.
5959

60-
## Run-time protection - Real-time threat detection
60+
## Run-time protection - Real-time threat protection
6161

62-
Security Center provides real-time threat detection for your containerized environments and generates alerts for suspicious activities. You can use this information to quickly remediate security issues and improve the security of your containers.
62+
Security Center provides real-time threat protection for your containerized environments and generates alerts for suspicious activities. You can use this information to quickly remediate security issues and improve the security of your containers.
6363

6464
We detect threats at the host and AKS cluster level. For full details, see [threat protection for Azure containers](threat-protection.md#azure-containers).
6565

articles/security-center/faq-billing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Security Center is offered in two tiers:
2323

2424
- The **free tier** provides visibility into the security state of your Azure resources, basic security policy, security recommendations, and integration with security products and services from partners.
2525

26-
- The **standard tier** adds advanced threat detection capabilities, including threat intelligence, behavioral analysis, anomaly detection, security incidents, and threat attribution reports. You can start a Standard tier free trial. To upgrade, select [Pricing Tier](https://docs.microsoft.com/azure/security-center/security-center-pricing) in the security policy. To learn more, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
26+
- The **standard tier** adds threat protection capabilities that includes security alerts, threat intelligence, behavioral analysis, anomaly detection, and threat attribution reports. You can start a standard tier free trial. To upgrade, select [Pricing Tier](https://docs.microsoft.com/azure/security-center/security-center-pricing) in the security policy. To learn more, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
2727

2828
## How can I track who in my organization performed pricing tier changes in Azure Security Center
2929
Azure Subscriptions may have multiple administrators with permissions to change the pricing tier. To find out which user performed a pricing tier change, use the Azure Activity Log. For more information, see [here](https://techcommunity.microsoft.com/t5/Security-Identity/Tracking-Changes-in-the-Pricing-Tier-for-Azure-Security-Center/td-p/390832).

articles/security-center/monitor-container-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Azure Security Center covers the following three aspects of container security:
2525

2626
- **Hardening your Azure Kubernetes Service clusters** - Security Center provides recommendations when it finds vulnerabilities in the configuration of your Azure Kubernetes Service clusters. For details of the specific recommendations that may appear, see the [Kubernetes Service recommendations](recommendations-reference.md#recs-containers).
2727

28-
- **Runtime protection** - If you're on Security Center's standard pricing tier, you'll get real-time threat detection for your containerized environments. Security Center generates alerts for suspicious activities at the host and AKS cluster level. For details of the relevant security alerts that might appear, see the [Alerts for Azure Kubernetes Service clusters](alerts-reference.md#alerts-akscluster) and [Alerts for containers - host level](alerts-reference.md#alerts-containerhost) sections of the alerts reference table.
28+
- **Runtime protection** - If you're on Security Center's standard pricing tier, you'll get real-time threat protection for your containerized environments. Security Center generates alerts for suspicious activities at the host and AKS cluster level. For details of the relevant security alerts that might appear, see the [Alerts for Azure Kubernetes Service clusters](alerts-reference.md#alerts-akscluster) and [Alerts for containers - host level](alerts-reference.md#alerts-containerhost) sections of the alerts reference table.
2929

3030
## Scanning your ARM-based container registries for vulnerabilities
3131

articles/security-center/security-center-container-recommendations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Azure Security Center provides the following capabilities to help you secure you
3030

3131
![container tab](./media/security-center-container-recommendations/container-cis-benchmark.png)
3232

33-
- **Real time container threat detection**<br> Security Center provides real-time threat detection for your containers on Linux machines with AuditD component. The alerts identify several suspicious Docker activities, such as the creation of a privileged container on host, an indication of Secure Shell (SSH) server running inside a Docker container, or the use of crypto miners. You can use this information to quickly remediate security issues and improve the security of your containers.
33+
- **Real time container threat protection**<br> Security Center provides real-time threat protection for your containers on Linux machines with AuditD component. The alerts identify several suspicious Docker activities, such as the creation of a privileged container on host, an indication of Secure Shell (SSH) server running inside a Docker container, or the use of crypto miners. You can use this information to quickly remediate security issues and improve the security of your containers.
3434

3535
![container tab](./media/security-center-container-recommendations/docker-threat-detection.png)
3636

articles/security-center/security-center-cross-tenant-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ The views and actions are basically the same. Here are some examples:
4747
- **Remediate recommendations**: Monitor and remediate a [recommendation](security-center-recommendations.md) for many resources from various tenants at one time. You can then immediately tackle the vulnerabilities that present the highest risk across all tenants.
4848
- **Manage Alerts**: Detect [alerts](security-center-alerts-overview.md) throughout the different tenants. Take action on resources that are out of compliance with actionable [remediation steps](security-center-managing-and-responding-alerts.md).
4949

50-
- **Manage advanced cloud defense features and more**: Manage the various threat detection and protection services, such as [just-in-time (JIT) VM access](security-center-just-in-time.md), [Adaptive Network Hardening](security-center-adaptive-network-hardening.md), [adaptive application controls](security-center-adaptive-application.md), and more.
50+
- **Manage advanced cloud defense features and more**: Manage the various threat protection services, such as [just-in-time (JIT) VM access](security-center-just-in-time.md), [Adaptive Network Hardening](security-center-adaptive-network-hardening.md), [adaptive application controls](security-center-adaptive-application.md), and more.
5151

5252
## Next steps
5353
This article explains how cross-tenant management works in Security Center. To learn more about Security Center, see the following:

articles/security-center/security-center-enable-data-collection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.author: memildin
1414
# Data collection in Azure Security Center
1515
Security Center collects data from your Azure virtual machines (VMs), virtual machine scale sets, IaaS containers, and non-Azure (including on-premises) computers to monitor for security vulnerabilities and threats. Data is collected using the Log Analytics Agent, which reads various security-related configurations and event logs from the machine and copies the data to your workspace for analysis. Examples of such data are: operating system type and version, operating system logs (Windows event logs), running processes, machine name, IP addresses, and logged in user. The Log Analytics Agent also copies crash dump files to your workspace.
1616

17-
Data collection is required to provide visibility into missing updates, misconfigured OS security settings, endpoint protection status, and health and threat detections.
17+
Data collection is required to provide visibility into missing updates, misconfigured OS security settings, endpoint protection status, and health and threat protection.
1818

1919
This article describes how to install a Log Analytics Agent and set a Log Analytics workspace in which to store the collected data. Both operations are required to enable data collection.
2020

@@ -137,7 +137,7 @@ When you select a workspace in which to store your data, all the workspaces acro
137137

138138

139139
## Data collection tier
140-
Selecting a data collection tier in Azure Security Center will only affect the storage of security events in your Log Analytics workspace. The Log Analytics agent will still collect and analyze the security events required for Azure Security Center’s threat detections, regardless of which tier of security events you choose to store in your Log Analytics workspace (if any). Choosing to store security events in your workspace will enable investigation, search, and auditing of those events in your workspace.
140+
Selecting a data collection tier in Azure Security Center will only affect the storage of security events in your Log Analytics workspace. The Log Analytics agent will still collect and analyze the security events required for Azure Security Center’s threat protection, regardless of which tier of security events you choose to store in your Log Analytics workspace (if any). Choosing to store security events in your workspace will enable investigation, search, and auditing of those events in your workspace.
141141
> [!NOTE]
142142
> Storing data in log analytics might incur additional charges for data storage. For more information, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/).
143143
>

articles/security-center/security-center-intro.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ To help you protect yourself against these challenges, Security Center provides
3535

3636
- **Strengthen security posture**: Security Center assesses your environment and enables you to understand the status of your resources, and whether they are secure.
3737

38-
- **Protect against threats**: Security Center assesses your workloads and raises threat prevention recommendations and threat detection alerts.
38+
- **Protect against threats**: Security Center assesses your workloads and raises threat prevention recommendations and security alerts.
3939

4040
- **Get secure faster**: In Security Center, everything is done in cloud speed. Because it is natively integrated, deployment of Security Center is easy, providing you with autoprovisioning and protection with Azure services.
4141

@@ -47,7 +47,7 @@ Because Security Center is natively part of Azure, PaaS services in Azure - incl
4747

4848
In addition, Security Center protects non-Azure servers and virtual machines in the cloud or on premises, for both Windows and Linux servers, by installing the Microsoft Monitoring Agent on them. Azure virtual machines are auto-provisioned in Security Center.
4949

50-
The events collected from the agents and from Azure are correlated in the security analytics engine to provide you tailored recommendations (hardening tasks), that you should follow to make sure your workloads are secure, and threat detection alerts. You should investigate such alerts as soon as possible to make sure malicious attacks aren't taking place on your workloads.
50+
The events collected from the agents and from Azure are correlated in the security analytics engine to provide you tailored recommendations (hardening tasks), that you should follow to make sure your workloads are secure, and security alerts. You should investigate such alerts as soon as possible to make sure malicious attacks aren't taking place on your workloads.
5151

5252
When you enable Security Center, the security policy built-in to Security Center is reflected in Azure Policy as a built in initiative under Security Center category. The built-in initiative is automatically assigned to all Security Center registered subscriptions (Free or Standard tiers). The built-in initiative contains only Audit policies. For more information about Security Center policies in Azure Policy, see [Working with security policies](tutorial-security-policy.md).
5353

@@ -108,10 +108,9 @@ Security Center's threat protection includes fusion kill-chain analysis, which a
108108

109109
![Security Center attack recommendation](media/security-center-intro/sc-attack-recommendation.png)
110110

111-
### Advanced threat protection
111+
### Integration with Microsoft Defender Advanced threat protection
112112

113-
With Security Center, you get native integration with Windows Defender Advanced Threat Protection out of the box. This means that without any configuration, your Windows virtual machines and servers are fully integrated with Security Center's recommendations and assessments. Advanced threat detection is also
114-
offered out of the box for Linux virtual machines and servers.
113+
Security Center includes automatic, native integration with Microsoft Defender Advanced Threat Protection. This means that without any configuration, your Windows and Linux machines are fully integrated with Security Center's recommendations and assessments.
115114

116115
In addition, Security Center lets you automate application control policies on server environments. The adaptive application controls in Security Center enable end-to-end app whitelisting across your Windows servers. You don't need to create the rules and check violations, it's all done automatically for you.
117116

@@ -134,7 +133,7 @@ recommendations for how to mitigate them.
134133

135134
### Protect IoT and hybrid cloud workloads
136135

137-
Azure Security Center for IoT (Internet of Things) simplifies hybrid workload protection by delivering unified visibility and control, adaptive threat prevention, and intelligent threat detection and response across workloads running on edge, on-premises, in Azure, and in other clouds. For more information, see [Azure Security Center for IoT](https://docs.microsoft.com/azure/asc-for-iot/).
136+
Azure Security Center for IoT (Internet of Things) simplifies hybrid workload protection by delivering unified visibility and control, adaptive threat prevention, and intelligent threat protection and response across workloads running on edge, on-premises, in Azure, and in other clouds. For more information, see [Azure Security Center for IoT](https://docs.microsoft.com/azure/asc-for-iot/).
138137

139138
## Get secure faster
140139

@@ -153,6 +152,5 @@ Extensive log collection - logs from Windows and Linux are all leveraged in the
153152
## Next steps
154153

155154
- To get started with Security Center, you need a subscription to Microsoft Azure. If you do not have a subscription, you can sign up for a [free trial](https://azure.microsoft.com/free/).
156-
- Security Center’s Free pricing tier is enabled with your Azure subscription. To take advantage of advanced security management and threat detection capabilities, you must upgrade to the Standard pricing tier. The Standard tier can be tried for free. See the [Security Center pricing page](https://azure.microsoft.com/pricing/details/security-center/) for more information.
157-
- If you’re ready to enable Security Center Standard now, the [Quickstart: Onboard your Azure subscription to Security Center Standard](security-center-get-started.md) walks you through the steps.
158-
155+
- Security Center’s free pricing tier is enabled with your Azure subscription. To take advantage of advanced security management and threat protection capabilities, you must upgrade to the standard pricing tier. The standard tier can be tried for free for 30 days. For more information, see the [Security Center pricing page](https://azure.microsoft.com/pricing/details/security-center/).
156+
- If you’re ready to enable Security Center standard now, the [Quickstart: Onboard your Azure subscription to Security Center Standard](security-center-get-started.md) walks you through the steps.

articles/security-center/security-center-managing-and-responding-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Security Center automatically collects, analyzes, and integrates log data from y
6262
6363
1. The remediation steps suggested by Security Center vary according to the security alert. Follow them for each alert.
6464

65-
In some cases, in order to mitigate a threat detection alert, you may have to use other Azure controls or services to implement the recommended remediation.
65+
In some cases, in order to mitigate a security alert, you may have to use other Azure controls or services to implement the recommended remediation.
6666

6767
The following topics guide you through the different alerts, according to resource types:
6868

articles/security-center/security-center-onboarding.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,10 @@ ms.author: memildin
1818
# Onboarding to Azure Security Center Standard for enhanced security
1919
Upgrade to Security Center Standard to take advantage of enhanced security management and threat protection for your hybrid cloud workloads. You can try Standard free. See the Security Center [pricing page](https://azure.microsoft.com/pricing/details/security-center/) for more information.
2020

21-
Security Center Standard includes:
21+
Security Center standard tier includes:
2222

2323
- **Hybrid security** – Get a unified view of security across all of your on-premises and cloud workloads. Apply security policies and continuously assess the security of your hybrid cloud workloads to ensure compliance with security standards. Collect, search, and analyze security data from a variety of sources, including firewalls and other partner solutions.
24-
- **Advanced threat detection** - Use advanced analytics and the Microsoft Intelligent Security Graph to get an edge over evolving cyber-attacks. Leverage built-in behavioral analytics and machine learning to identify attacks and zero-day exploits. Monitor networks, machines, and cloud services for incoming attacks and post-breach activity. Streamline investigation with interactive tools and contextual threat intelligence.
24+
- **Security alerts** - Use advanced analytics and the Microsoft Intelligent Security Graph to get an edge over evolving cyber-attacks. Leverage built-in behavioral analytics and machine learning to identify attacks and zero-day exploits. Monitor networks, machines, and cloud services for incoming attacks and post-breach activity. Streamline investigation with interactive tools and contextual threat intelligence.
2525
- **Access and application controls** - Block malware and other unwanted applications by applying whitelisting recommendations adapted to your specific workloads and powered by machine learning. Reduce the network attack surface with just-in-time, controlled access to management ports on Azure VMs, drastically reducing exposure to brute force and other network attacks.
2626

2727
## Detecting unprotected resources
@@ -35,7 +35,7 @@ You can upgrade an entire Azure subscription to the Standard tier, which is inhe
3535
>
3636
3737
## Upgrade an Azure subscription or workspace
38-
To upgrade a subscription or workspace to Standard:
38+
To upgrade a subscription or workspace to standard:
3939
1. Under the Security Center main menu, select **Getting started**.
4040
![Getting started](./media/security-center-onboarding/get-started.png)
4141
2. Under **Upgrade**, Security Center lists subscriptions and workspaces eligible for onboarding.

0 commit comments

Comments
 (0)