Skip to content

Commit 7c9be48

Browse files
Merge pull request #263061 from dcurwin/fix-protect-network-resources-jan11-2024
Fix protect network resources
2 parents a2f09a8 + 5e419f3 commit 7c9be48

File tree

1 file changed

+15
-17
lines changed

1 file changed

+15
-17
lines changed

articles/defender-for-cloud/protect-network-resources.md

Lines changed: 15 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -12,19 +12,18 @@ For a full list of the recommendations for Networking, see [Networking recommend
1212

1313
This article addresses recommendations that apply to your Azure resources from a network security perspective. Networking recommendations center around next generation firewalls, Network Security Groups, JIT VM access, overly permissive inbound traffic rules, and more. For a list of networking recommendations and remediation actions, see [Managing security recommendations in Microsoft Defender for Cloud](review-security-recommendations.md).
1414

15-
The **Networking** features of Defender for Cloud include:
15+
The **Networking** features of Defender for Cloud include:
1616

1717
- Network map (requires [Microsoft Defender for Servers Plan 2](plan-defender-for-servers-select-plan.md#plan-features))
1818
- [Adaptive network hardening](adaptive-network-hardening.md) (requires [Microsoft Defender for Servers Plan 2](plan-defender-for-servers-select-plan.md#plan-features))
1919
- Networking security recommendations
20-
20+
2121
## View your networking resources and their recommendations
2222

2323
From the [asset inventory page](asset-inventory.md), use the resource type filter to select the networking resources that you want to investigate:
2424

2525
:::image type="content" source="./media/protect-network-resources/network-filters-inventory.png" alt-text="Asset inventory network resource types." lightbox="./media/protect-network-resources/network-filters-inventory.png":::
2626

27-
2827
## Network map
2928

3029
The interactive network map provides a graphical view with security overlays giving you recommendations and insights for hardening your network resources. Using the map you can see the network topology of your Azure workloads, connections between your virtual machines and subnets, and the capability to drill down from the map into specific resources and the recommendations for those resources.
@@ -38,7 +37,7 @@ To open the Network map:
3837
:::image type="content" source="media/protect-network-resources/workload-protection-network-map.png" alt-text="Screenshot showing selection of network map from workload protections." lightbox="media/protect-network-resources/workload-protection-network-map.png":::
3938

4039
1. Select the **Layers** menu choose **Topology**.
41-
40+
4241
The default view of the topology map displays:
4342

4443
- Currently selected subscriptions - The map is optimized for the subscriptions you selected in the portal. If you modify your selection, the map is regenerated with the new selections.
@@ -51,33 +50,33 @@ The default view of the topology map displays:
5150

5251
## Understanding the network map
5352

54-
The network map can show you your Azure resources in a **Topology** view and a **Traffic** view.
53+
The network map can show you your Azure resources in a **Topology** view and a **Traffic** view.
5554

5655
### The topology view
5756

5857
In the **Topology** view of the networking map, you can view the following insights about your networking resources:
5958

6059
- In the inner circle, you can see all the VNets within your selected subscriptions, the next circle is all the subnets, the outer circle is all the virtual machines.
61-
- The lines connecting the resources in the map let you know which resources are associated with each other, and how your Azure network is structured.
60+
- The lines connecting the resources in the map let you know which resources are associated with each other, and how your Azure network is structured.
6261
- Use the severity indicators to quickly get an overview of which resources have open recommendations from Defender for Cloud.
63-
- You can click any of the resources to drill down into them and view the details of that resource and its recommendations directly, and in the context of the Network map.
62+
- You can select any of the resources to drill down into them and view the details of that resource and its recommendations directly, and in the context of the Network map.
6463
- If there are too many resources being displayed on the map, Microsoft Defender for Cloud uses its proprietary algorithm to 'smart cluster' your resources, highlighting the ones that are in the most critical state, and have the most high severity recommendations.
6564

6665
Because the map is interactive and dynamic, every node is clickable, and the view can change based on the filters:
6766

6867
1. You can modify what you see on the network map by using the filters at the top. You can focus the map based on:
6968

70-
- **Security health**: You can filter the map based on Severity (High, Medium, Low) of your Azure resources.
69+
- **Security health**: You can filter the map based on Severity (High, Medium, Low) of your Azure resources.
7170
- **Recommendations**: You can select which resources are displayed based on which recommendations are active on those resources. For example, you can view only resources for which Defender for Cloud recommends you enable Network Security Groups.
7271
- **Network zones**: By default, the map displays only Internet facing resources, you can select internal VMs as well.
73-
74-
2. You can click **Reset** in top left corner at any time to return the map to its default state.
72+
73+
1. You can select **Reset** in top left corner at any time to return the map to its default state.
7574

7675
To drill down into a resource:
7776

78-
1. When you select a specific resource on the map, the right pane opens and gives you general information about the resource, connected security solutions if there are any, and the recommendations relevant to the resource. It's the same type of behavior for each type of resource you select.
77+
1. When you select a specific resource on the map, the right pane opens and gives you general information about the resource, connected security solutions if there are any, and the recommendations relevant to the resource. It's the same type of behavior for each type of resource you select.
7978
2. When you hover over a node in the map, you can view general information about the resource, including subscription, resource type, and resource group.
80-
3. Use the link to zoom into the tool tip and refocus the map on that specific node.
79+
3. Use the link to zoom into the tool tip and refocus the map on that specific node.
8180
4. To refocus the map away from a specific node, zoom out.
8281

8382
### The Traffic view
@@ -86,22 +85,21 @@ The **Traffic** view provides you with a map of all the possible traffic between
8685

8786
### Uncover unwanted connections
8887

89-
The strength of this view is in its ability to show you these allowed connections together with the vulnerabilities that exist, so you can use this cross-section of data to perform the necessary hardening on your resources.
88+
The strength of this view is in its ability to show you these allowed connections together with the vulnerabilities that exist, so you can use this cross-section of data to perform the necessary hardening on your resources.
9089

9190
For example, you might detect two machines that you weren’t aware could communicate, enabling you to better isolate the workloads and subnets.
9291

9392
### Investigate resources
9493

9594
To drill down into a resource:
9695

97-
1. When you select a specific resource on the map, the right pane opens and gives you general information about the resource, connected security solutions if there are any, and the recommendations relevant to the resource. It's the same type of behavior for each type of resource you select.
98-
2. Click **Traffic** to see the list of possible outbound and inbound traffic on the resource - this is a comprehensive list of who can communicate with the resource and who it can communicate with, and through which protocols and ports. For example, when you select a VM, all the VMs it can communicate with are shown, and when you select a subnet, all the subnets which it can communicate with are shown.
96+
1. When you select a specific resource on the map, the right pane opens and gives you general information about the resource, connected security solutions if there are any, and the recommendations relevant to the resource. It's the same type of behavior for each type of resource you select.
97+
2. Select **Traffic** to see the list of possible outbound and inbound traffic on the resource - this is a comprehensive list of who can communicate with the resource and who it can communicate with, and through which protocols and ports. For example, when you select a VM, all the VMs it can communicate with are shown, and when you select a subnet, all the subnets which it can communicate with are shown.
9998

100-
**This data is based on analysis of the Network Security Groups as well as advanced machine learning algorithms that analyze multiple rules to understand their crossovers and interactions.**
99+
**This data is based on analysis of the Network Security Groups as well as advanced machine learning algorithms that analyze multiple rules to understand their crossovers and interactions.**
101100

102101
[![Networking traffic map.](./media/protect-network-resources/network-map-traffic.png)](./media/protect-network-resources/network-map-traffic.png#lightbox)
103102

104-
105103
## Next steps
106104

107105
To learn more about recommendations that apply to other Azure resource types, see the following:

0 commit comments

Comments
 (0)