Skip to content

Commit 765815c

Browse files
authored
Merge pull request #276385 from ElazarK/WI245622-CIS-baseline
MDVM baseline
2 parents 775b97b + c53452e commit 765815c

File tree

6 files changed

+76
-8
lines changed

6 files changed

+76
-8
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -641,6 +641,9 @@
641641
href: enable-adaptive-application-controls.md
642642
- name: Review server protection
643643
items:
644+
- name: Remediate security baselines recommendation powered by MDVM
645+
displayName: security, baseline, remediate, mdvm, vulnerability, assessment, va
646+
href: remediate-security-baseline.md
644647
- name: Review hardening recommendations
645648
displayName: VM, guest configuration, vulnerabilities, ASB, benchmark
646649
href: apply-security-baseline.md
212 KB
Loading
112 KB
Loading
210 KB
Loading

articles/defender-for-cloud/release-notes.md

Lines changed: 17 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Release notes
33
description: This page is updated frequently with the latest updates in Defender for Cloud.
44
ms.topic: overview
5-
ms.date: 05/22/2024
5+
ms.date: 05/28/2024
66
---
77

88
# What's new in Microsoft Defender for Cloud?
@@ -24,13 +24,22 @@ If you're looking for items older than six months, you can find them in the [Arc
2424

2525
|Date | Update |
2626
|--|--|
27+
| May 28 | [Remediate security baseline recommendation](#remediate-security-baseline-recommendation) |
2728
| May 22 | [Configure email notifications for attack paths](#configure-email-notifications-for-attack-paths) |
2829
| May 21 | [Advanced hunting in Microsoft Defender XDR now includes Defender for Cloud alerts and incidents](#advanced-hunting-in-microsoft-defender-xdr-now-includes-defender-for-cloud-alerts-and-incidents) |
2930
| May 9 | [Checkov integration for IaC scanning in Defender for Cloud (Preview)](#checkov-integration-for-iac-scanning-in-defender-for-cloud-preview) |
3031
| May 6 | [AI multicloud security posture management is publicly available for Azure and AWS](#ai-multicloud-security-posture-management-is-publicly-available-for-azure-and-aws) |
3132
| May 2 | [Updated security policy management is now generally available](#updated-security-policy-management-is-now-generally-available) |
3233
| May 1 | [Defender for open-source databases is now available on AWS for Amazon instances (Preview)](#defender-for-open-source-databases-is-now-available-on-aws-for-amazon-instances-preview) |
3334

35+
### Remediate security baseline recommendation
36+
37+
May 28, 2024
38+
39+
Microsoft Defender for Cloud enhances the Center for Internet Security (CIS) benchmarks by providing security baselines that are powered by Microsoft Defender Vulnerability Management (MDVM). The new recommendation **Machine should be configured securely (powered by MDVM)** helps you secure your servers by providing recommendations that improve your security posture.
40+
41+
Learn how to [remediate security baseline recommendations powered by MDVM](remediate-security-baseline.md).
42+
3443
### Configure email notifications for attack paths
3544

3645
May 22, 2024
@@ -67,16 +76,16 @@ We're announcing the general availability (GA) of [permissions management](permi
6776

6877
May 6, 2024
6978

70-
We are announcing the inclusion of AI security posture management in Defender for Cloud. This feature provides AI security posture management capabilities for Azure and AWS that enhance the security of your AI pipelines and services.
79+
We're announcing the inclusion of AI security posture management in Defender for Cloud. This feature provides AI security posture management capabilities for Azure and AWS that enhance the security of your AI pipelines and services.
7180

7281
Learn more about [AI security posture management](ai-security-posture.md).
7382

7483
### Limited public preview of threat protection for AI workloads in Azure
7584

7685
May 6, 2024
7786

78-
Threat protection for AI workloads in Defender for Cloud provides contextual insights into AI workload threat protection, integrating with [Responsible AI](../ai-services/responsible-use-of-ai-overview.md) and Microsoft Threat Intelligence. Threat protection for AI workloads security alerts are integrated into Defender XDR in the Defender portal.
79-
This plan helps you monitor your Azure OpenAI powered applications in runtime for malicious activity, identify and remediate security risks.
87+
Threat protection for AI workloads in Defender for Cloud provides contextual insights into AI workload threat protection, integrating with [Responsible AI](../ai-services/responsible-use-of-ai-overview.md) and Microsoft Threat Intelligence. Threat protections for AI workloads security alerts are integrated into Defender XDR in the Defender portal.
88+
This plan helps you monitor your Azure OpenAI powered applications in runtime for malicious activity, identify, and remediate security risks.
8089

8190
Learn more about [threat protection for AI workloads](ai-threat-protection.md).
8291

@@ -96,7 +105,7 @@ For more information, see [Security policies in Microsoft Defender for Cloud](se
96105

97106
May 1, 2024
98107

99-
We are announcing the public preview of Defender for open-source databases on AWS that adds support for various types of Amazon Relational Database Service (RDS) instance types.
108+
We're announcing the public preview of Defender for open-source databases on AWS that adds support for various types of Amazon Relational Database Service (RDS) instance types.
100109

101110
Learn more about [Defender for open-source databases](defender-for-databases-introduction.md) and how to [enable Defender for open-source databases on AWS](enable-defender-for-databases-aws.md).
102111

@@ -118,7 +127,7 @@ April 15, 2024
118127

119128
Runtime threat detection and agentless discovery for AWS and GCP in Defender for Containers are now Generally Available (GA). For more information, see [Containers support matrix in Defender for Cloud](support-matrix-defender-for-containers.md).
120129

121-
In addition, there is a new authentication capability in AWS which simplifies provisioning. For more information, see [Configure Microsoft Defender for Containers components](/azure/defender-for-cloud/defender-for-containers-enable?branch=pr-en-us-269845&tabs=aks-deploy-portal%2Ck8s-deploy-asc%2Ck8s-verify-asc%2Ck8s-remove-arc%2Caks-removeprofile-api&pivots=defender-for-container-eks#deploying-the-defender-sensor).
130+
In addition, there's a new authentication capability in AWS which simplifies provisioning. For more information, see [Configure Microsoft Defender for Containers components](/azure/defender-for-cloud/defender-for-containers-enable?branch=pr-en-us-269845&tabs=aks-deploy-portal%2Ck8s-deploy-asc%2Ck8s-verify-asc%2Ck8s-remove-arc%2Caks-removeprofile-api&pivots=defender-for-container-eks#deploying-the-defender-sensor).
122131

123132
### Risk prioritization is now the default experience in Defender for Cloud
124133

@@ -264,13 +273,13 @@ Learn more about [continuous export](benefits-of-continuous-export.md).
264273

265274
March 21, 2024
266275

267-
Until now agentless scanning covered CMK encrypted VMs in AWS and GCP. With this release we're completing support for Azure as well. The capability employs a unique scanning approach for CMK in Azure:
276+
Until now agentless scanning covered CMK encrypted VMs in AWS and GCP. With this release, we're completing support for Azure as well. The capability employs a unique scanning approach for CMK in Azure:
268277

269278
- Defender for Cloud doesn't handle the key or decryption process. Key handling and decryption are seamlessly handled by Azure Compute and is transparent to Defender for Cloud's agentless scanning service.
270279
- The unencrypted VM disk data is never copied or re-encrypted with another key.
271280
- The original key isn't replicated during the process. Purging it eradicates the data on both your production VM and Defender for Cloud’s temporary snapshot.
272281

273-
During public preview this capability isn't automatically enabled. If you're using Defender for Servers P2 or Defender CSPM and your environment has VMs with CMK encrypted disks, you can now have them scanned for vulnerabilities, secrets and malware following these [enablement steps](enable-agentless-scanning-vms.md#agentless-vulnerability-assessment-on-azure).
282+
During public preview this capability isn't automatically enabled. If you're using Defender for Servers P2 or Defender CSPM and your environment has VMs with CMK encrypted disks, you can now have them scanned for vulnerabilities, secrets, and malware following these [enablement steps](enable-agentless-scanning-vms.md#agentless-vulnerability-assessment-on-azure).
274283

275284
- [Learn more on agentless scanning for VMs](concept-agentless-data-collection.md)
276285
- [Learn more on agentless scanning permissions](faq-permissions.yml#which-permissions-are-used-by-agentless-scanning-)
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
---
2+
title: Remediate security baseline recommendations powered by MDVM
3+
description: Learn how to secure your servers with security baselines in Microsoft Defender for Cloud powered by Microsoft Defender Vulnerability Management.
4+
ms.topic: how-to
5+
ms.author: dacurwin
6+
author: dcurwin
7+
ms.date: 05/26/2024
8+
# customer intent: As a user, I want to learn how to secure my servers with security baselines in Microsoft Defender for Cloud powered by Microsoft Defender Vulnerability Management.
9+
---
10+
11+
# Remediate security baseline recommendations powered by MDVM
12+
13+
Microsoft Defender for Cloud enhances the Center for Internet Security (CIS) benchmarks by providing security baselines that are powered by Microsoft Defender Vulnerability Management (MDVM). These security baselines help you secure your servers by providing recommendations that improve your security posture.
14+
15+
MDVM's security baselines features extensive coverage of benchmarks, which are continuously updated, along with comprehensive rule coverage. Each rule is accompanied with information that details the effect of the issue, a description of the problem, and detailed recommendation steps. These checks are integrated into the Microsoft Defender for Endpoint (MDE) agent, which allows Defender for Cloud to provide extra security checks within the same agent.
16+
17+
## Prerequisites
18+
19+
- [Enable Defender for Servers Plan 2](tutorial-enable-servers-plan.md).
20+
21+
- [Enable the Microsoft Defender for Endpoint agent on your servers](enable-defender-for-endpoint.md).
22+
23+
**Supported benchmark operating systems**:
24+
- windows_server_2008_r2
25+
- windows_server_2016
26+
- windows_server_2019
27+
- windows_server_2022
28+
29+
## Remediate security baseline recommendation
30+
31+
To ensure your servers are protected and secure, you should remediate all security baselines recommendation in Defender for Cloud.
32+
33+
1. Sign in to the [Azure portal](https://portal.azure.com/).
34+
35+
1. Navigate to **Microsoft Defender for Cloud** > **Recommendations**.
36+
37+
1. Search for and select **Machine should be configured securely (powered by MDVM)**.
38+
39+
1. Select **View recommendation for all resources**.
40+
41+
:::image type="content" source="media/remediate-security-baseline/view-all-resources.png" alt-text="Screenshot that shows where the view recommendation for all resources is located in the recommendation." lightbox="media/remediate-security-baseline/view-all-resources.png":::
42+
43+
1. Select one of the affected unhealthy resources.
44+
45+
1. Select a security check.
46+
47+
1. Follow the remediation step.
48+
49+
:::image type="content" source="media/remediate-security-baseline/remediation-steps.png" alt-text="Screenshot that shows where the remediation steps are located." lightbox="media/remediate-security-baseline/remediation-steps.png":::
50+
51+
1. Repeat the process for all affected resources.
52+
53+
## Next step
54+
55+
> [!div class="nextstepaction"]
56+
> [View and remediate findings from vulnerability assessment solutions on your VMs](remediate-vulnerability-findings-vm.md)

0 commit comments

Comments
 (0)