You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/data-aware-security-dashboard-overview.md
+21-28Lines changed: 21 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,17 +4,17 @@ description: Learn about the capabilities and functions of the data-aware securi
4
4
author: AlizaBernstein
5
5
ms.author: v-bernsteina
6
6
ms.topic: conceptual
7
-
ms.date: 12/18/2023
7
+
ms.date: 02/11/2024
8
8
---
9
9
10
10
# Data security dashboard
11
11
12
-
The data security dashboard addresses the need for an interactive, data-centric security dashboard that illuminates significant risks to customers' sensitive data. This tool effectively prioritizes alerts and potential attack paths for data across multicloud data resources, making data protection management less overwhelming and more effective.
12
+
Microsoft Defender for Cloud's data security dashboard provides an interactive view of significant risks to sensitive data. It prioritizes alerts and potential attack paths across multicloud data resources, making data protection management more effective.
13
13
14
-
## Capabilities
14
+
With the data security dashboard you can:
15
15
16
-
-You can view a centralized summary of your cloud data estate that identifies the location of sensitive data, so that you can discover the most critical data resources affected.
17
-
-You can identify the data resources that are at risk and that require attention, so that you can prioritize actions that explore, prevent and respond to sensitive data breaches.
16
+
-Easily locate and summarize sensitive data resources in your cloud data estate.
17
+
-Identify and prioritize data resources at risk to prevent and respond to sensitive data breaches.
18
18
- Investigate active high severity threats that lead to sensitive data
19
19
- Explore potential threats data by highlighting [attack paths](concept-attack-path.md) that lead to sensitive data.
20
20
- Explore useful data insights by highlighting useful data queries in the [security explorer](how-to-manage-cloud-security-explorer.md).
@@ -24,42 +24,35 @@ You can select any element on the page to get more detailed information.
24
24
| Aspect | Details |
25
25
|---------|---------|
26
26
|Release state: | Public Preview |
27
-
| Prerequisites: | Defender for CSPM fully enabled, including sensitive data discovery <br/> Workload protection for database and storage to explore active risks |
28
-
| Required roles and permissions: | No other roles needed on top of what is required for the security explorer. |
27
+
| Required roles and permissions: | Security explorer. |
In order to view the dashboard, you must enable Defender CSPM and also enable the sensitive data discovery extensions button underneath. In addition, to receive the alerts for data sensitivity, you must also enable the Defender for Storage plan.
32
+
**To view the dashboard**:
34
33
35
-
:::image type="content" source="media/data-aware-security-dashboard/select-sensitive-data-discovery.png" alt-text="Screenshot that shows where to turn on the sensitive data discovery extension." lightbox="media/data-aware-security-dashboard/select-sensitive-data-discovery.png":::
34
+
- You must [enable Defender CSPM](tutorial-enable-cspm-plan.md).
35
+
-[Enable sensitive data discovery](tutorial-enable-cspm-plan.md#enable-the-components-of-the-defender-cspm-plan) within the Defender CSPM plan.
36
36
37
-
The feature is turned on at the subscription level.
37
+
**To receive the alerts for data sensitivity**:
38
+
- You must [enable Defender for Storage](tutorial-enable-storage-plan.md).
38
39
39
-
## Required permissions and roles
40
-
41
-
- To view the dashboard you must have either one of the following:
42
-
43
-
- permissions:
40
+
> [!NOTE]
41
+
> The data security dashboard feature is turned on at the subscription level.
- the minimum required privileged RBAC role of **Security Reader**.
43
+
## Required permissions and roles
50
44
51
-
- Each Azure subscription must be registered for the **Microsoft.Security** resource provider:
45
+
To view the dashboard you must have either of the following:
52
46
53
-
1. Sign-in to the Azure portal.
54
-
1. Select the affected subscription.
55
-
1. In the left-side menu, select the resource provider.
47
+
**Permissions**:
56
48
57
-
:::image type="content" source="media/data-aware-security-dashboard/select-resource-provider.png" alt-text="Screenshot that shows where to select the resource provider." lightbox="media/data-aware-security-dashboard/select-resource-provider.png":::
1. Search for and select the **Microsoft.Security** resource provider from the list.
60
-
1. Select **Register**.
53
+
-**Role** - the minimum required privileged RBAC role of **Security Reader**.
61
54
62
-
Learn more about [how to register for Azure resource provider](/azure/azure-resource-manager/management/resource-providers-and-types#register-resource-provider).
55
+
Register each relevant Azure subscription to the [Microsoft.Security resource provider](/azure/azure-resource-manager/management/resource-providers-and-types#register-resource-provider).
0 commit comments