You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-storage-configure-malware-scan.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,17 +42,17 @@ Logic App based responses are a simple, no-code approach to setting up response.
42
42
43
43
1. Add role assignment to the Logic App to allow it to delete blobs from your storage account:
44
44
1. Go to **Identity** in the side menu and select on **Azure role assignments**.
45
-
:::image type="content" source="media/defender-for-storage-configure-malware-scan/SAM-response-1.png" alt-text="Screenshot showing how to set up a role assignment for workflow automation to respond to scan results.":::
45
+
:::image type="content" source="media/defender-for-storage-configure-malware-scan/storage-account-malware-response-1.png" alt-text="Screenshot showing how to set up a role assignment for workflow automation to respond to scan results.":::
46
46
1. Add role assignment in the subscription level with the **Storage Blob Data Contributor** role.
47
-
:::image type="content" source="media/defender-for-storage-configure-malware-scan/SAM-response-2.png" alt-text="Screenshot showing how to set up the required role assignment for workflow automation to respond to scan results.":::
47
+
:::image type="content" source="media/defender-for-storage-configure-malware-scan/storage-account-malware-response-2.png" alt-text="Screenshot showing how to set up the required role assignment for workflow automation to respond to scan results.":::
48
48
1. Create workflow automation for Microsoft Defender for Cloud alerts:
49
49
50
50
1. Go to **Microsoft Defender for Cloud** in the Azure portal.
51
51
52
52
1. Go to **Workflow automation** in the side menu.
53
53
1. Add a new workflow. In the **Alert name contains** field, fill in **Malicious file uploaded to storage account** and choose your Logic app in the **Actions** section.
54
54
55
-
:::image type="content" source="media/defender-for-storage-configure-malware-scan/SAM-response-3.png" alt-text="Screenshot showing how to set up workflow automation to respond to scan results.":::
55
+
:::image type="content" source="media/defender-for-storage-configure-malware-scan/storage-account-malware-response-3.png" alt-text="Screenshot showing how to set up workflow automation to respond to scan results.":::
56
56
57
57
#### Option 2: Function App based on Event Grid events
58
58
@@ -93,7 +93,7 @@ Learn more about using [Webhook event delivery and validating your endpoint](../
93
93
You can set up an intermediary storage account for untrusted content (DMZ) and direct uploading traffic to the DMZ.
94
94
On the untrusted storage account, enable Malware Scanning and connect Event Grid and Function App to move only blobs scanned with the “no threat found” result to the destination storage account.
95
95
96
-
:::image type="content" source="media/defender-for-storage-configure-malware-scan/SAM-response-4.png" alt-text="Diagram showing how to set up an intermediary storage account as a DMZ.":::
96
+
:::image type="content" source="media/defender-for-storage-configure-malware-scan/storage-account-malware-response-4.png" alt-text="Diagram showing how to set up an intermediary storage account as a DMZ.":::
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-storage-introduction.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ Defender for Storage includes:
23
23
- Sensitive data threat detection (preview feature, new plan only)
24
24
- Malware Scanning (preview feature, new plan only)
25
25
26
-
:::image type="content" source="media/defender-for-storage-introduction/DF-Storage-Overview.gif" alt-text="Animated diagram showing how Defender for Storage protects against common threats to data.":::
26
+
:::image type="content" source="media/defender-for-storage-introduction/defender-for-storage-overview.gif" alt-text="Animated diagram showing how Defender for Storage protects against common threats to data.":::
27
27
28
28
## Getting started
29
29
@@ -47,7 +47,7 @@ With a simple agentless setup at scale, you can [enable Defender for Storage](..
47
47
48
48
## What are the benefits of Microsoft Defender for Storage?
49
49
50
-
:::image type="content" source="media/defender-for-storage-introduction/DF-Storage Benefits.png" alt-text="Diagram showing the benefits of using Defender for Storage to protect your data.":::
50
+
:::image type="content" source="media/defender-for-storage-introduction/defender-for-storage-benefits.png" alt-text="Diagram showing the benefits of using Defender for Storage to protect your data.":::
51
51
52
52
Defender for Storage provides the following:
53
53
@@ -69,7 +69,7 @@ Defender for Storage provides the following:
69
69
70
70
Defender for Storage continuously analyzes data and control plane logs from protected storage accounts when enabled. There's no need to turn on resource logs for security benefits. Using Microsoft Threat Intelligence, it identifies suspicious signatures such as malicious IP addresses, Tor exit nodes, and potentially dangerous apps. It also builds data models and uses statistical and machine-learning methods to spot baseline activity anomalies, which may indicate malicious behavior. You'll receive security alerts for suspicious activities, but Defender for Storage ensures you won't get too many similar alerts. Activity monitoring won't affect performance, ingestion capacity, or access to your data.
71
71
72
-
:::image type="content" source="media/defender-for-storage-introduction/Activity-monitoring.png" alt-text="Diagram showing how activity monitoring identifies threats to your data.":::
72
+
:::image type="content" source="media/defender-for-storage-introduction/activity-monitoring.png" alt-text="Diagram showing how activity monitoring identifies threats to your data.":::
73
73
74
74
### Malware Scanning (powered by Microsoft Defender Antivirus)
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-storage-malware-scan.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ Malware Scanning in Defender for Storage helps protect your storage accounts fro
13
13
14
14
The Malware Scanning capability is an agentless SaaS solution that allows simple setup at scale, with zero maintenance, and supports automating response at scale.
15
15
16
-
:::image type="content" source="media/defender-for-storage-malware-scan/Malware-Scanning.png" alt-text="Diagram showing how malware scanning protects your data from malicious code.":::
16
+
:::image type="content" source="media/defender-for-storage-malware-scan/malware-scanning.png" alt-text="Diagram showing how malware scanning protects your data from malicious code.":::
17
17
18
18
## Malware upload is a top threat on cloud storage
19
19
@@ -104,7 +104,7 @@ You may choose to configure extra scan result methods, such as **Event Grid** an
104
104
105
105
[Blob index tags](../storage/blobs/storage-blob-index-how-to.md) are metadata fields on a blob. They categorize data in your storage account using key-value tag attributes. These tags are automatically indexed and exposed as a searchable multi-dimensional index to easily find data. The scan results are concise, displaying **Malware Scanning scan result** and **Malware Scanning scan time UTC** in the blob metadata. Other result types (alerts, events, logs) provide more information on the malware type and file upload operation.
106
106
107
-
:::image type="content" source="media/defender-for-storage-malware-scan/MS-Index-Tags.png" alt-text="Screenshot showing how Blob index tags are shown in the Azure portal.":::
107
+
:::image type="content" source="media/defender-for-storage-malware-scan/index-tags.png" alt-text="Screenshot showing how Blob index tags are shown in the Azure portal.":::
108
108
109
109
Malware Scanning Index Tags Keys added:
110
110
@@ -157,7 +157,7 @@ Learn more about [setting up Event Grid](../event-grid/create-view-manage-system
157
157
158
158
You may want to log your scan results for compliance evidence or investigating scan results. By setting up a Log Analytics Workspace destination, you can store every scan result in a centralized log repository that is easy to query. You can view the results by navigating to the Log Analytics destination workspace and looking for the `StorageAntimalwareScanResults` table.
159
159
160
-
:::image type="content" source="media/defender-for-storage-malware-scan/Log-Analytics-results.png" alt-text="Screenshot showing how Log Analytics results are shown in the Azure portal." lightbox="media/defender-for-storage-malware-scan/Log-Analytics-results.png":::
160
+
:::image type="content" source="media/defender-for-storage-malware-scan/log-analytics-results.png" alt-text="Screenshot showing how Log Analytics results are shown in the Azure portal." lightbox="media/defender-for-storage-malware-scan/log-analytics-results.png":::
161
161
162
162
Learn more about [setting up Log Analytics results](../azure-monitor/logs/quick-create-workspace.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-storage-test.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ Follow these steps to test Malware Scanning after enabling the feature:
35
35
36
36
1. If you don't see the new blob index tags, select the **Refresh** button.
37
37
38
-
:::image type="content" source="media/defender-for-storage-test/Testing-malware.png" alt-text="Screenshot showing how to upload a file to test the Malware Scan.":::
38
+
:::image type="content" source="media/defender-for-storage-test/testing-malware.png" alt-text="Screenshot showing how to upload a file to test the Malware Scan.":::
39
39
40
40
> [!NOTE]
41
41
> Index tags are not supported for ADLS Gen. To test and validate your protection for premium block blobs, look at the generated security alert.
@@ -104,13 +104,13 @@ To test the sensitive data threat detection feature by uploading test data that
104
104
105
105
1. Add the following string to the file: `ASD 100-22-3333 SSN Text` - this is a test US (United States) SSN (Social Security Number).
106
106
107
-
:::image type="content" source="media/defender-for-storage-test/Testing-sensitivity-2.png" alt-text="Screenshot showing how to test a file in Malware Scanning for Social Security Number information.":::
107
+
:::image type="content" source="media/defender-for-storage-test/testing-sensitivity-2.png" alt-text="Screenshot showing how to test a file in Malware Scanning for Social Security Number information.":::
108
108
109
109
1. Save the file with the updated information.
110
110
111
111
1. Upload the file you created to the **test-container** in the storage account.
112
112
113
-
:::image type="content" source="media/defender-for-storage-test/Testing-sensitivity-3.png" alt-text="Screenshot showing how to upload a file in Malware Scanning to test for Social Security Number information.":::
113
+
:::image type="content" source="media/defender-for-storage-test/testing-sensitivity-3.png" alt-text="Screenshot showing how to upload a file in Malware Scanning to test for Social Security Number information.":::
114
114
115
115
1. Enable Defender for Storage:
116
116
@@ -126,7 +126,7 @@ To test the sensitive data threat detection feature by uploading test data that
126
126
127
127
1. Right-click on the **test-container** and select **Change the access level**.
128
128
129
-
:::image type="content" source="media/defender-for-storage-test/Testing-sensitivity-1.png" alt-text="Screenshot showing how to change the access level for a test of Malware Scanning.":::
129
+
:::image type="content" source="media/defender-for-storage-test/testing-sensitivity-1.png" alt-text="Screenshot showing how to change the access level for a test of Malware Scanning.":::
130
130
131
131
1. Choose the **Container (anonymous read access for containers and blobs)** option and select **OK**.
0 commit comments