Skip to content

Commit 756e4c0

Browse files
Merge pull request #238584 from ElazarK/WI90716-github-app-update
GitHub apps update
2 parents be074a0 + 30ad0f9 commit 756e4c0

File tree

2 files changed

+44
-3
lines changed

2 files changed

+44
-3
lines changed

articles/defender-for-cloud/defender-for-devops-introduction.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,11 @@ ms.custom: references_regions
88

99
# Overview of Defender for DevOps
1010

11+
> [!IMPORTANT]
12+
> Microsoft Defender for DevOps is constantly making changes and updates that require Defender for DevOps customers who have onboarded their GitHub environments in Defender for Cloud to provide permissions as part of the application deployed in their GitHub organization. These permissions are necessary to ensure all of the security features of Defender for DevOps operate normally and without issues.
13+
>
14+
> Please see the recent release note for [instructions on how to add these additional permissions](release-notes.md#defender-for-devops-github-application-update).
15+
1116
Microsoft Defender for Cloud enables comprehensive visibility, posture management, and threat protection across multicloud environments including Azure, AWS, GCP, and on-premises resources. Defender for DevOps, a service available in Defender for Cloud, empowers security teams to manage DevOps security across multi-pipeline environments.
1217

1318
Defender for DevOps uses a central console to empower security teams with the ability to protect applications and resources from code to cloud across multi-pipeline environments, such as GitHub and Azure DevOps. Findings from Defender for DevOps can then be correlated with other contextual cloud security insights to prioritize remediation in code. Key capabilities in Defender for DevOps include:

articles/defender-for-cloud/release-notes.md

Lines changed: 39 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Release notes for Microsoft Defender for Cloud
33
description: A description of what's new and changed in Microsoft Defender for Cloud
44
ms.topic: overview
55
ms.custom: build-2023
6-
ms.date: 05/23/2023
6+
ms.date: 05/28/2023
77
---
88

99
# What's new in Microsoft Defender for Cloud?
@@ -32,10 +32,10 @@ Updates in May include:
3232
- [Download a CSV report of your cloud security explorer query results (Preview)](#download-a-csv-report-of-your-cloud-security-explorer-query-results-preview)
3333
- [Release of containers Vulnerability Assessment powered by Microsoft Defender Vulnerability Management (MDVM) in Defender CSPM](#release-of-containers-vulnerability-assessment-powered-by-microsoft-defender-vulnerability-management-mdvm-in-defender-cspm)
3434
- [Renaming container recommendations powered by Qualys](#renaming-container-recommendations-powered-by-qualys)
35+
- [Defender for DevOps GitHub Application update](#defender-for-devops-github-application-update)
3536

3637
### New alert in Defender for Key Vault
3738

38-
Defender for Key Vault has the following new alert:
3939

4040
| Alert (alert type) | Description | MITRE tactics | Severity |
4141
|---|---|:-:|---|
@@ -150,7 +150,7 @@ Vulnerability assessment (VA) solutions are essential to safeguard machines from
150150

151151
Microsoft Defender Vulnerability Management (MDVM) is now enabled as the default, built-in solution for all subscriptions protected by Defender for Servers that don't already have a VA solution selected.
152152

153-
If a subscription has a VA solution enabled on any of its VMs, no changes will be made and MDVM will not be enabled by default on the remaining VMs in that subscription. You can choose to [enable a VA solution](deploy-vulnerability-assessment-defender-vulnerability-management.md) on the remaining VMs on your subscriptions.
153+
If a subscription has a VA solution enabled on any of its VMs, no changes are made and MDVM won't be enabled by default on the remaining VMs in that subscription. You can choose to [enable a VA solution](deploy-vulnerability-assessment-defender-vulnerability-management.md) on the remaining VMs on your subscriptions.
154154

155155
Learn how to [Find vulnerabilities and collect software inventory with agentless scanning (Preview)](enable-vulnerability-assessment-agentless.md).
156156

@@ -176,6 +176,21 @@ Learn more about [Agentless Containers Posture in Defender CSPM](concept-agentle
176176

177177
Learn more about [Microsoft Defender Vulnerability Management (MDVM)](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management).
178178

179+
### Release of containers Vulnerability Assessment powered by Microsoft Defender Vulnerability Management (MDVM) in Defender CSPM
180+
181+
We're announcing the release of Vulnerability Assessment for Linux images in Azure container registries powered by Microsoft Defender Vulnerability Management (MDVM) in Defender CSPM. This release includes daily scanning of images. Findings used in the Security Explorer and attack paths rely on MDVM Vulnerability Assessment instead of the Qualys scanner.
182+
183+
The existing recommendation "Container registry images should have vulnerability findings resolved" is replaced by a new recommendation powered by MDVM:
184+
185+
|Recommendation | Description | Assessment Key|
186+
|--|--|--|
187+
| Container registry images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management)| Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. This recommendation provides visibility to vulnerable images currently running in your Kubernetes clusters. Remediating vulnerabilities in container images that are currently running is key to  improving your security posture, significantly reducing the attack surface for your containerized workloads. |dbd0cb49-b563-45e7-9724-889e799fa648 <br> is replaced by c0b7cfc6-3172-465a-b378-53c7ff2cc0d5
188+
189+
Learn more about [Agentless Containers Posture in Defender CSPM](concept-agentless-containers.md).
190+
191+
Learn more about [Microsoft Defender Vulnerability Management (MDVM)](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management).
192+
193+
179194
### Renaming container recommendations powered by Qualys
180195

181196
The current container recommendations in Defender for Containers will be renamed as follows:
@@ -185,6 +200,27 @@ The current container recommendations in Defender for Containers will be renamed
185200
| Container registry images should have vulnerability findings resolved (powered by Qualys) | Container image vulnerability assessment scans your registry for security vulnerabilities and exposes detailed findings for each image. Resolving the vulnerabilities can greatly improve your containers' security posture and protect them from attacks. | dbd0cb49-b563-45e7-9724-889e799fa648 |
186201
| Running container images should have vulnerability findings resolved (powered by Qualys) | Container image vulnerability assessment scans container images running on your Kubernetes clusters for security vulnerabilities and exposes detailed findings for each image. Resolving the vulnerabilities can greatly improve your containers' security posture and protect them from attacks. | 41503391-efa5-47ee-9282-4eff6131462c |
187202

203+
### Defender for DevOps GitHub Application update
204+
205+
Microsoft Defender for DevOps is constantly making changes and updates that require Defender for DevOps customers who have onboarded their GitHub environments in Defender for Cloud to provide permissions as part of the application deployed in their GitHub organization. These permissions are necessary to ensure all of the security features of Defender for DevOps operate normally and without issues.
206+
207+
We suggest updating the permissions as soon as possible to ensure continued access to all available features of Defender for DevOps.
208+
209+
Permissions can be granted in two different ways:
210+
211+
- In your organization, select **GitHub Apps**. Locate Your organization, and select **Review request**.
212+
213+
- You'll get an automated email from GitHub Support. In the email, select **Review permission request to accept or reject this change**.
214+
215+
After you have followed either of these options, you'll be navigated to the review screen where you should review the request. Select **Accept new permissions** to approve the request.
216+
217+
If you require any assistance updating permissions, you can [create an Azure support request](../azure-portal/supportability/how-to-create-azure-support-request.md).
218+
219+
You can also learn more about [Defender for DevOps](defender-for-devops-introduction.md).
220+
If a subscription has a VA solution enabled on any of its VMs, no changes are made and MDVM won't be enabled by default on the remaining VMs in that subscription. You can choose to [enable a VA solution](deploy-vulnerability-assessment-defender-vulnerability-management.md) on the remaining VMs on your subscriptions.
221+
222+
Learn how to [Find vulnerabilities and collect software inventory with agentless scanning (Preview)](enable-vulnerability-assessment-agentless.md).
223+
188224
## April 2023
189225
Updates in April include:
190226

0 commit comments

Comments
 (0)