Skip to content

Commit 864353b

Browse files
committed
Change image names to lowercase
1 parent 0c556d4 commit 864353b

20 files changed

+24
-24
lines changed

articles/defender-for-cloud/defender-for-storage-configure-malware-scan.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,17 +42,17 @@ Logic App based responses are a simple, no-code approach to setting up response.
4242

4343
1. Add role assignment to the Logic App to allow it to delete blobs from your storage account:
4444
1. Go to **Identity** in the side menu and select on **Azure role assignments**.
45-
:::image type="content" source="media/defender-for-storage-configure-malware-scan/SAM-response-1.png" alt-text="Screenshot showing how to set up a role assignment for workflow automation to respond to scan results.":::
45+
:::image type="content" source="media/defender-for-storage-configure-malware-scan/storage-account-malware-response-1.png" alt-text="Screenshot showing how to set up a role assignment for workflow automation to respond to scan results.":::
4646
1. Add role assignment in the subscription level with the **Storage Blob Data Contributor** role.
47-
:::image type="content" source="media/defender-for-storage-configure-malware-scan/SAM-response-2.png" alt-text="Screenshot showing how to set up the required role assignment for workflow automation to respond to scan results.":::
47+
:::image type="content" source="media/defender-for-storage-configure-malware-scan/storage-account-malware-response-2.png" alt-text="Screenshot showing how to set up the required role assignment for workflow automation to respond to scan results.":::
4848
1. Create workflow automation for Microsoft Defender for Cloud alerts:
4949

5050
1. Go to **Microsoft Defender for Cloud** in the Azure portal.
5151

5252
1. Go to **Workflow automation** in the side menu.
5353
1. Add a new workflow. In the **Alert name contains** field, fill in **Malicious file uploaded to storage account** and choose your Logic app in the **Actions** section.
5454

55-
:::image type="content" source="media/defender-for-storage-configure-malware-scan/SAM-response-3.png" alt-text="Screenshot showing how to set up workflow automation to respond to scan results.":::
55+
:::image type="content" source="media/defender-for-storage-configure-malware-scan/storage-account-malware-response-3.png" alt-text="Screenshot showing how to set up workflow automation to respond to scan results.":::
5656

5757
#### Option 2: Function App based on Event Grid events
5858

@@ -93,7 +93,7 @@ Learn more about using [Webhook event delivery and validating your endpoint](../
9393
You can set up an intermediary storage account for untrusted content (DMZ) and direct uploading traffic to the DMZ.
9494
On the untrusted storage account, enable Malware Scanning and connect Event Grid and Function App to move only blobs scanned with the “no threat found” result to the destination storage account.
9595

96-
:::image type="content" source="media/defender-for-storage-configure-malware-scan/SAM-response-4.png" alt-text="Diagram showing how to set up an intermediary storage account as a DMZ.":::
96+
:::image type="content" source="media/defender-for-storage-configure-malware-scan/storage-account-malware-response-4.png" alt-text="Diagram showing how to set up an intermediary storage account as a DMZ.":::
9797

9898
## Next steps
9999

articles/defender-for-cloud/defender-for-storage-introduction.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Defender for Storage includes:
2323
- Sensitive data threat detection (preview feature, new plan only)
2424
- Malware Scanning (preview feature, new plan only)
2525

26-
:::image type="content" source="media/defender-for-storage-introduction/DF-Storage-Overview.gif" alt-text="Animated diagram showing how Defender for Storage protects against common threats to data.":::
26+
:::image type="content" source="media/defender-for-storage-introduction/defender-for-storage-overview.gif" alt-text="Animated diagram showing how Defender for Storage protects against common threats to data.":::
2727

2828
## Getting started
2929

@@ -47,7 +47,7 @@ With a simple agentless setup at scale, you can [enable Defender for Storage](..
4747

4848
## What are the benefits of Microsoft Defender for Storage?
4949

50-
:::image type="content" source="media/defender-for-storage-introduction/DF-Storage Benefits.png" alt-text="Diagram showing the benefits of using Defender for Storage to protect your data.":::
50+
:::image type="content" source="media/defender-for-storage-introduction/defender-for-storage-benefits.png" alt-text="Diagram showing the benefits of using Defender for Storage to protect your data.":::
5151

5252
Defender for Storage provides the following:
5353

@@ -69,7 +69,7 @@ Defender for Storage provides the following:
6969

7070
Defender for Storage continuously analyzes data and control plane logs from protected storage accounts when enabled. There's no need to turn on resource logs for security benefits. Using Microsoft Threat Intelligence, it identifies suspicious signatures such as malicious IP addresses, Tor exit nodes, and potentially dangerous apps. It also builds data models and uses statistical and machine-learning methods to spot baseline activity anomalies, which may indicate malicious behavior. You'll receive security alerts for suspicious activities, but Defender for Storage ensures you won't get too many similar alerts. Activity monitoring won't affect performance, ingestion capacity, or access to your data.
7171

72-
:::image type="content" source="media/defender-for-storage-introduction/Activity-monitoring.png" alt-text="Diagram showing how activity monitoring identifies threats to your data.":::
72+
:::image type="content" source="media/defender-for-storage-introduction/activity-monitoring.png" alt-text="Diagram showing how activity monitoring identifies threats to your data.":::
7373

7474
### Malware Scanning (powered by Microsoft Defender Antivirus)
7575

articles/defender-for-cloud/defender-for-storage-malware-scan.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Malware Scanning in Defender for Storage helps protect your storage accounts fro
1313

1414
The Malware Scanning capability is an agentless SaaS solution that allows simple setup at scale, with zero maintenance, and supports automating response at scale.
1515

16-
:::image type="content" source="media/defender-for-storage-malware-scan/Malware-Scanning.png" alt-text="Diagram showing how malware scanning protects your data from malicious code.":::
16+
:::image type="content" source="media/defender-for-storage-malware-scan/malware-scanning.png" alt-text="Diagram showing how malware scanning protects your data from malicious code.":::
1717

1818
## Malware upload is a top threat on cloud storage
1919

@@ -104,7 +104,7 @@ You may choose to configure extra scan result methods, such as **Event Grid** an
104104

105105
[Blob index tags](../storage/blobs/storage-blob-index-how-to.md) are metadata fields on a blob. They categorize data in your storage account using key-value tag attributes. These tags are automatically indexed and exposed as a searchable multi-dimensional index to easily find data. The scan results are concise, displaying **Malware Scanning scan result** and **Malware Scanning scan time UTC** in the blob metadata. Other result types (alerts, events, logs) provide more information on the malware type and file upload operation.
106106

107-
:::image type="content" source="media/defender-for-storage-malware-scan/MS-Index-Tags.png" alt-text="Screenshot showing how Blob index tags are shown in the Azure portal.":::
107+
:::image type="content" source="media/defender-for-storage-malware-scan/index-tags.png" alt-text="Screenshot showing how Blob index tags are shown in the Azure portal.":::
108108

109109
Malware Scanning Index Tags Keys added:
110110

@@ -157,7 +157,7 @@ Learn more about [setting up Event Grid](../event-grid/create-view-manage-system
157157

158158
You may want to log your scan results for compliance evidence or investigating scan results. By setting up a Log Analytics Workspace destination, you can store every scan result in a centralized log repository that is easy to query. You can view the results by navigating to the Log Analytics destination workspace and looking for the `StorageAntimalwareScanResults` table.
159159

160-
:::image type="content" source="media/defender-for-storage-malware-scan/Log-Analytics-results.png" alt-text="Screenshot showing how Log Analytics results are shown in the Azure portal." lightbox="media/defender-for-storage-malware-scan/Log-Analytics-results.png":::
160+
:::image type="content" source="media/defender-for-storage-malware-scan/log-analytics-results.png" alt-text="Screenshot showing how Log Analytics results are shown in the Azure portal." lightbox="media/defender-for-storage-malware-scan/log-analytics-results.png":::
161161

162162
Learn more about [setting up Log Analytics results](../azure-monitor/logs/quick-create-workspace.md).
163163

articles/defender-for-cloud/defender-for-storage-test.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Follow these steps to test Malware Scanning after enabling the feature:
3535

3636
1. If you don't see the new blob index tags, select the **Refresh** button.
3737

38-
:::image type="content" source="media/defender-for-storage-test/Testing-malware.png" alt-text="Screenshot showing how to upload a file to test the Malware Scan.":::
38+
:::image type="content" source="media/defender-for-storage-test/testing-malware.png" alt-text="Screenshot showing how to upload a file to test the Malware Scan.":::
3939

4040
> [!NOTE]
4141
> Index tags are not supported for ADLS Gen. To test and validate your protection for premium block blobs, look at the generated security alert.
@@ -104,13 +104,13 @@ To test the sensitive data threat detection feature by uploading test data that
104104

105105
1. Add the following string to the file: `ASD 100-22-3333 SSN Text` - this is a test US (United States) SSN (Social Security Number).
106106

107-
:::image type="content" source="media/defender-for-storage-test/Testing-sensitivity-2.png" alt-text="Screenshot showing how to test a file in Malware Scanning for Social Security Number information.":::
107+
:::image type="content" source="media/defender-for-storage-test/testing-sensitivity-2.png" alt-text="Screenshot showing how to test a file in Malware Scanning for Social Security Number information.":::
108108

109109
1. Save the file with the updated information.
110110

111111
1. Upload the file you created to the **test-container** in the storage account.
112112

113-
:::image type="content" source="media/defender-for-storage-test/Testing-sensitivity-3.png" alt-text="Screenshot showing how to upload a file in Malware Scanning to test for Social Security Number information.":::
113+
:::image type="content" source="media/defender-for-storage-test/testing-sensitivity-3.png" alt-text="Screenshot showing how to upload a file in Malware Scanning to test for Social Security Number information.":::
114114

115115
1. Enable Defender for Storage:
116116

@@ -126,7 +126,7 @@ To test the sensitive data threat detection feature by uploading test data that
126126

127127
1. Right-click on the **test-container** and select **Change the access level**.
128128

129-
:::image type="content" source="media/defender-for-storage-test/Testing-sensitivity-1.png" alt-text="Screenshot showing how to change the access level for a test of Malware Scanning.":::
129+
:::image type="content" source="media/defender-for-storage-test/testing-sensitivity-1.png" alt-text="Screenshot showing how to change the access level for a test of Malware Scanning.":::
130130

131131
1. Choose the **Container (anonymous read access for containers and blobs)** option and select **OK**.
132132

0 commit comments

Comments
 (0)