You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/faq-general.yml
+1-3Lines changed: 1 addition & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -140,8 +140,6 @@ sections:
140
140
- Containers sharing sensitive host namespaces should be avoided
141
141
- Containers should listen on allowed ports only
142
142
- Default IP Filter Policy should be Deny
143
-
- EDR configuration issues should be resolved on virtual machines
144
-
- EDR solution should be installed on Virtual Machines
145
143
- File integrity monitoring should be enabled on machines
146
144
- Immutable (read-only) root filesystem should be enforced for containers
147
145
- IoT Devices - Open Ports On Device
@@ -371,7 +369,7 @@ sections:
371
369
- question: |
372
370
How does onboarding an AWS organization or management account to Microsoft Defender for Cloud work?
373
371
answer: |
374
-
Onboarding an organization or a management account to Microsoft Defender for Cloud initiates the process of [deploying a StackSet](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-getting-started-create.html). The SteckSet includes the necessary roles and permissions. The StackSet also propagates the required permissions across all accounts within the organization.
372
+
Onboarding an organization or a management account to Microsoft Defender for Cloud initiates the process of [deploying a StackSet](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-getting-started-create.html). The StackSet includes the necessary roles and permissions. The StackSet also propagates the required permissions across all accounts within the organization.
375
373
376
374
The included permissions allow Microsoft Defender for Cloud to deliver the selected security features through the created connector in Defender for Cloud. The permissions also allow Defender for Cloud to continuously monitor all accounts that might be added using the auto-provisioning service.
|July 31|Recommendation|GA|[[EDR solution should be installed on Virtual Machines](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/06e3a6db-6c0c-4ad9-943f-31d9d73ecf6c)](recommendations-reference-compute.md#edr-solution-should-be-installed-on-virtual-machineshttpsportalazurecomblademicrosoft_azure_securityrecommendationsbladeassessmentkey06e3a6db-6c0c-4ad9-943f-31d9d73ecf6c)|
52
+
|July 31|Recommendation|GA|[[EDR solution should be installed on EC2s](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/77d09952-2bc2-4495-8795-cc8391452f85)](recommendations-reference-compute.md#edr-solution-should-be-installed-on-ec2shttpsportalazurecomblademicrosoft_azure_securityrecommendationsbladeassessmentkey77d09952-2bc2-4495-8795-cc8391452f85)|
53
+
|July 31|Recommendation|GA|[[EDR solution should be installed on GCP Virtual Machines](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/68e595c1-a031-4354-b37c-4bdf679732f1)](recommendations-reference-compute.md#edr-solution-should-be-installed-on-gcp-virtual-machineshttpsportalazurecomblademicrosoft_azure_securityrecommendationsbladeassessmentkey68e595c1-a031-4354-b37c-4bdf679732f1)|
54
+
|July 31|Recommendation|GA|[[EDR configuration issues should be resolved on virtual machines](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/dc5357d0-3858-4d17-a1a3-072840bff5be)](recommendations-reference-compute.md#edr-configuration-issues-should-be-resolved-on-virtual-machineshttpsportalazurecomblademicrosoft_azure_securityrecommendationsbladeassessmentkeydc5357d0-3858-4d17-a1a3-072840bff5be)|
55
+
|July 31|Recommendation|GA|[[EDR configuration issues should be resolved on EC2s](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/695abd03-82bd-4d7f-a94c-140e8a17666c)](recommendations-reference-compute.md#edr-configuration-issues-should-be-resolved-on-ec2shttpsportalazurecomblademicrosoft_azure_securityrecommendationsbladeassessmentkey695abd03-82bd-4d7f-a94c-140e8a17666c)|
56
+
|July 31|Recommendation|GA|[[EDR configuration issues should be resolved on GCP virtual machines](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/f36a15fb-61a6-428c-b719-6319538ecfbc)](recommendations-reference-compute.md#edr-configuration-issues-should-be-resolved-on-gcp-virtual-machineshttpsportalazurecomblademicrosoft_azure_securityrecommendationsbladeassessmentkeyf36a15fb-61a6-428c-b719-6319538ecfbc)|
52
57
| July 31 | Recommendation | Upcoming deprecation |[Adaptive network hardening recommendations should be applied on internet facing virtual machines](recommendations-reference-networking.md#adaptive-network-hardening-recommendations-should-be-applied-on-internet-facing-virtual-machines)|
53
58
| July 31 | Alert | Upcoming deprecation |[Traffic detected from IP addresses recommended for blocking](alerts-azure-network-layer.md#traffic-detected-from-ip-addresses-recommended-for-blocking)|
54
59
| July 30 | Recommendation | Preview |[AWS Bedrock should use AWS PrivateLink](recommendations-reference-ai.md#aws-bedrock-should-use-aws-privatelink)|
@@ -158,3 +163,4 @@ New and updated recommendations and alerts are added to the table in date order.
158
163
## Related content
159
164
160
165
For information about new features, see [What's new in Defender for Cloud features](release-notes.md).
| July 31 | GA |[General availability of enhanced discovery and configuration recommendations for endpoint protection](#general-availability-of-enhanced-discovery-and-configuration-recommendations-for-endpoint-protection)|
34
35
| July 31 | Upcoming update |[Adaptive network hardening deprecation](#adaptive-network-hardening-deprecation)|
35
36
| July 22 | Preview |[Security assessments for GitHub no longer requires additional licensing](#preview-security-assessments-for-github-no-longer-requires-additional-licensing)|
36
37
| July 18 | Upcoming update |[Updated timelines toward MMA deprecation in Defender for Servers Plan 2](#updated-timelines-toward-mma-deprecation-in-defender-for-servers-plan-2)|
@@ -42,6 +43,19 @@ This article summarizes what's new in Microsoft Defender for Cloud. It includes
42
43
| July 9 | Upcoming update |[Inventory experience improvement](#inventory-experience-improvement)|
43
44
| July 8 | Upcoming update |[Container mapping tool to run by default in GitHub](#container-mapping-tool-to-run-by-default-in-github)|
44
45
46
+
### General availability of enhanced discovery and configuration recommendations for endpoint protection
47
+
48
+
July 31, 2024
49
+
50
+
Improved discovery features for endpoint protection solutions and enhanced identification of configuration issues are now GA and available for multicloud servers. These updates are included in the Defender for Servers Plan 2 and Defender Cloud Security Posture Management (CSPM).
51
+
52
+
The enhanced recommendations feature uses [agentless machine scanning](/azure/defender-for-cloud/concept-agentless-data-collection), enabling comprehensive discovery and assessment of the configuration of [supported endpoint detection and response solutions](/azure/defender-for-cloud/endpoint-detection-response). When configuration issues are identified, remediation steps are provided.
53
+
54
+
With this general availability release, the list of [supported solutions](/azure/defender-for-cloud/endpoint-detection-response) is expanded to include two more endpoint detection and response tools:
55
+
56
+
- Singularity Platform by SentinelOne
57
+
- Cortex XDR
58
+
45
59
### Adaptive network hardening deprecation
46
60
47
61
July 31, 2024
@@ -51,6 +65,7 @@ July 31, 2024
51
65
Defender for Server's adaptive network hardening is being deprecated.
52
66
53
67
The feature deprecation includes the following experiences:
68
+
54
69
-**Recommendation**: [Adaptive network hardening recommendations should be applied on internet facing virtual machines](recommendations-reference-networking.md#adaptive-network-hardening-recommendations-should-be-applied-on-internet-facing-virtual-machines)[assessment Key: f9f0eed0-f143-47bf-b856-671ea2eeed62]
55
70
-**Alert**: [Traffic detected from IP addresses recommended for blocking](alerts-azure-network-layer.md#traffic-detected-from-ip-addresses-recommended-for-blocking)
56
71
@@ -70,14 +85,13 @@ July 18, 2024
70
85
71
86
**Estimated date for change**: August 2024
72
87
73
-
74
88
With the [upcoming deprecation of Log Analytics agent in August](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/microsoft-defender-for-cloud-strategy-and-plan-towards-log/ba-p/3883341), all security value for server protection in Defender for Cloud will rely on integration with Microsoft Defender for Endpoint (MDE) as a single agent and on agentless capabilities provided by the cloud platform and agentless machine scanning.
75
89
76
-
The following capabilitieshave updated timelines and plans, thus the support for them over MMA will be extended for Defender for Cloud customers to the end of November 2024:
90
+
The following capabilitieshave updated timelines and plans, thus the support for them over MMA will be extended for Defender for Cloud customers to the end of November 2024:
77
91
78
-
-**File Integrity Monitoring (FIM):**Public preview release for FIM new version over MDE is planned for __August 2024__. The GA version of FIM powered by Log Analytics agent will continue to be supported for existing customers until the end of __November 2024__.
92
+
-**File Integrity Monitoring (FIM):**Public preview release for FIM new version over MDE is planned for **August 2024**. The GA version of FIM powered by Log Analytics agent will continue to be supported for existing customers until the end of **November 2024**.
79
93
80
-
-**Security Baseline:** as an alternative to the version based on MMA,the current preview version based on Guest Configuration will be released to general availability in __September 2024.__OS Security Baselines powered by Log Analytics agent will continue to be supported for existing customers until the end of **November 2024.**
94
+
-**Security Baseline:** as an alternative to the version based on MMA,the current preview version based on Guest Configuration will be released to general availability in **September 2024.**OS Security Baselines powered by Log Analytics agent will continue to be supported for existing customers until the end of **November 2024.**
81
95
82
96
For more information, see [Prepare for retirement of the Log Analytics agent](prepare-deprecation-log-analytics-mma-agent.md).
0 commit comments