Skip to content

Commit 869d6e6

Browse files
authored
Merge pull request #270759 from MicrosoftDocs/main
Publish to live, Sunday 4:00PM PDT, 03/31
2 parents 46c097e + a72fc59 commit 869d6e6

File tree

61 files changed

+668
-388
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+668
-388
lines changed

articles/defender-for-cloud/alerts-schemas.md

Lines changed: 19 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,30 @@
11
---
2-
title: Schemas for the Microsoft Defender for Cloud alerts
2+
title: Alerts schema
33
description: This article describes the different schemas used by Microsoft Defender for Cloud for security alerts.
4-
ms.topic: conceptual
4+
ms.topic: concept-article
55
ms.author: dacurwin
66
author: dcurwin
7-
ms.date: 11/09/2021
7+
ms.date: 03/25/2024
8+
#customer intent: As a reader, I want to understand the different schemas used by Microsoft Defender for Cloud for security alerts so that I can effectively work with the alerts.
89
---
910

10-
# Security alerts schemas
11+
# Alerts schemas
1112

12-
If your subscription has Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads) enabled, you receive security alerts when Defender for Cloud detects threats to their resources.
1313

14-
You can view these security alerts in Microsoft Defender for Cloud's pages - [overview dashboard](overview-page.md), [alerts](managing-and-responding-alerts.md), [resource health pages](investigate-resource-health.md), or [workload protections dashboard](workload-protections-dashboard.md) - and through external tools such as:
14+
Defender for Cloud provides alerts that help you identify, understand, and respond to security threats. Alerts are generated when Defender for Cloud detects suspicious activity or a security-related issue in your environment. You can view these alerts in the Defender for Cloud portal, or you can export them to external tools for further analysis and response.
15+
16+
You can review security alerts from the [overview dashboard](overview-page.md), [alerts](managing-and-responding-alerts.md) page, [resource health pages](investigate-resource-health.md), or [workload protections dashboard](workload-protections-dashboard.md).
17+
18+
The following external tools can be used to consume alerts from Defender for Cloud:
1519

1620
- [Microsoft Sentinel](../sentinel/index.yml) - Microsoft's cloud-native SIEM. The Sentinel Connector gets alerts from Microsoft Defender for Cloud and sends them to the [Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md) for Microsoft Sentinel.
1721
- Third-party SIEMs - Send data to [Azure Event Hubs](../event-hubs/index.yml). Then integrate your Event Hubs data with a third-party SIEM. Learn more in [Stream alerts to a SIEM, SOAR, or IT Service Management solution](export-to-siem.md).
1822
- [The REST API](/rest/api/defenderforcloud/operation-groups?view=rest-defenderforcloud-2020-01-01&preserve-view=true) - If you're using the REST API to access alerts, see the [online Alerts API documentation](/rest/api/defenderforcloud/alerts).
1923

20-
If you're using any programmatic methods to consume the alerts, you need the correct schema to find the fields that are relevant to you. Also, if you're exporting to an Event Hubs or trying to trigger Workflow Automation with generic HTTP connectors, use the schemas to properly parse the JSON objects.
24+
If you're using any programmatic methods to consume the alerts, you need the correct schema to find the fields that are relevant to you. Also, if you're exporting to an Event Hubs or trying to trigger Workflow Automation with generic HTTP connectors, schemas should be utilized to properly parse the JSON objects.
2125

2226
>[!IMPORTANT]
23-
> The schema is slightly different for each of these scenarios, so make sure you select the relevant tab.
27+
> Since the schema is different for each of these scenarios, ensure you select the relevant tab.
2428
2529
## The schemas
2630

@@ -148,13 +152,13 @@ The schema and a JSON representation for security alerts sent to MS Graph, are a
148152

149153
---
150154

151-
## Next steps
152-
153-
This article described the schemas that Microsoft Defenders for Cloud's threat protection tools use when sending security alert information.
154-
155-
For more information on the ways to access security alerts from outside Defender for Cloud, see:
155+
## Related articles
156156

157+
- [Log Analytics workspaces](../azure-monitor/logs/quick-create-workspace.md) - Azure Monitor stores log data in a Log Analytics workspace, a container that includes data and configuration information
157158
- [Microsoft Sentinel](../sentinel/index.yml) - Microsoft's cloud-native SIEM
158159
- [Azure Event Hubs](../event-hubs/index.yml) - Microsoft's fully managed, real-time data ingestion service
159-
- [Continuously export Defender for Cloud data](continuous-export.md)
160-
- [Log Analytics workspaces](../azure-monitor/logs/quick-create-workspace.md) - Azure Monitor stores log data in a Log Analytics workspace, a container that includes data and configuration information
160+
161+
## Next step
162+
163+
> [!div class="nextstepaction"]
164+
> [Continuously export Defender for Cloud data](continuous-export.md)

articles/defender-for-cloud/investigate-resource-health.md

Lines changed: 33 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Tutorial - Investigate the health of your resources
33
description: 'Tutorial: Learn how to investigate the health of your resources using Microsoft Defender for Cloud.'
44
ms.topic: tutorial
5-
ms.date: 01/24/2023
5+
ms.date: 02/21/2024
66
---
77

88
# Tutorial: Investigate the health of your resources
99

1010
The resource health page provides a snapshot view of the overall health of a single resource. You can review detailed information about the resource and all recommendations that apply to that resource. Also, if you're using any of the [advanced protection plans of Microsoft Defender for Cloud](defender-for-cloud-introduction.md), you can see outstanding security alerts for that specific resource too.
1111

12-
This single page, currently in preview, in Defender for Cloud's portal pages shows:
12+
This single page, in Defender for Cloud's portal pages shows:
1313

1414
1. **Resource information** - The resource group and subscription it's attached to, the geographic location, and more.
1515
1. **Applied security feature** - Whether a Microsoft Defender plan is enabled for the resource.
@@ -31,21 +31,31 @@ In this tutorial you'll learn how to:
3131
To step through the features covered in this tutorial:
3232

3333
- You need an Azure subscription. If you don’t have an Azure subscription, create a [free account](https://azure.microsoft.com/free/) before you begin.
34-
- To apply security recommendations, you must be signed in with an account that has the relevant permissions (Resource Group Contributor, Resource Group Owner, Subscription Contributor, or Subscription Owner)
35-
- To dismiss alerts, you must be signed in with an account that has the relevant permissions (Security Admin, Subscription Contributor, or Subscription Owner)
34+
35+
- [Microsoft Defender for Cloud enabled on your subscription](connect-azure-subscription.md).
36+
37+
- **To apply security recommendations**: you must be signed in with an account that has the relevant permissions (Resource Group Contributor, Resource Group Owner, Subscription Contributor, or Subscription Owner)
38+
39+
- **To dismiss alerts**: you must be signed in with an account that has the relevant permissions (Security Admin, Subscription Contributor, or Subscription Owner)
3640

3741
## Access the health information for a resource
3842

3943
> [!TIP]
4044
> In the following screenshots, we're opening a virtual machine, but the resource health page can show you the details for all resource types.
4145
42-
To open the resource health page for a resource:
46+
**To open the resource health page for a resource**:
47+
48+
1. Sign in to the [Azure portal](https://portal.azure.com).
49+
50+
1. Search for and select **Microsoft Defender for Cloud**.
51+
52+
1. Select **Inventory**.
4353

44-
1. Select any resource from the [asset inventory page](asset-inventory.md).
54+
1. Select any resource.
4555

4656
:::image type="content" source="media/investigate-resource-health/inventory-select-resource.png" alt-text="Select a resource from the asset inventory to view the resource health page." lightbox="./media/investigate-resource-health/inventory-select-resource.png":::
4757

48-
1. Use the left pane of the resource health page for an overview of the subscription, status, and monitoring information about the resource. You can also see whether enhanced security features are enabled for the resource:
58+
1. Review the left pane of the resource health page for an overview of the subscription, status, and monitoring information about the resource. You can also see whether enhanced security features are enabled for the resource:
4959

5060
:::image type="content" source="media/investigate-resource-health/resource-health-left-pane.png" alt-text="The left pane of Microsoft Defender for Cloud's resource health page shows the subscription, status, and monitoring information about the resource. It also includes the total number of outstanding security recommendations and security alerts.":::
5161

@@ -62,18 +72,24 @@ To open the resource health page for a resource:
6272

6373
The resource health page lists the recommendations for which your resource is "unhealthy" and the alerts that are active.
6474

65-
- To ensure your resource is hardened according to the policies applied to your subscriptions, fix the issues described in the recommendations:
66-
1. From the right pane, select a recommendation.
67-
1. Continue as instructed on screen.
75+
### Harden a resource
76+
77+
To ensure your resource is hardened according to the policies applied to your subscriptions, fix the issues described in the recommendations:
78+
79+
1. From the right pane, select a recommendation.
80+
81+
1. Continue as instructed on screen.
82+
83+
> [!TIP]
84+
> The instructions for fixing issues raised by security recommendations differ for each of Defender for Cloud's recommendations.
85+
>
86+
> To decide which recommendations to resolve first, look at the severity of each one and its [potential impact on your secure score](secure-score-security-controls.md).
87+
88+
### Investigate a security alert
6889

69-
> [!TIP]
70-
> The instructions for fixing issues raised by security recommendations differ for each of Defender for Cloud's recommendations.
71-
>
72-
> To decide which recommendations to resolve first, look at the severity of each one and its [potential impact on your secure score](secure-score-security-controls.md).
90+
1. From the right pane, select an alert.
7391

74-
- To investigate a security alert:
75-
1. From the right pane, select an alert.
76-
1. Follow the instructions in [Respond to security alerts](managing-and-responding-alerts.md#respond-to-a-security-alert).
92+
1. Follow the instructions in [Respond to security alerts](managing-and-responding-alerts.md#respond-to-a-security-alert).
7793

7894
## Next steps
7995

articles/defender-for-cloud/sql-azure-vulnerability-assessment-find.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Find vulnerabilities in your Azure SQL databases
33
description: Learn how to find software vulnerabilities with the express configuration on Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics.
44
author: dcurwin
55
ms.author: dacurwin
6-
ms.date: 11/29/2022
6+
ms.date: 03/25/2024
77
ms.service: defender-for-cloud
88
ms.topic: how-to
99
---

articles/defender-for-cloud/sql-information-protection-policy.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,14 @@
11
---
22
title: SQL information protection policy
3-
description: Learn how to customize information protection policies in Microsoft Defender for Cloud.
3+
description: Learn how to customize information protection policies in Microsoft Defender for Cloud to secure your data effectively and meet compliance requirements.
44
ms.topic: how-to
55
ms.custom: devx-track-azurepowershell
66
author: dcurwin
77
ms.author: dacurwin
8-
ms.date: 11/09/2021
8+
ms.date: 03/25/2024
9+
#customer intent: As a user, I want to learn how to customize information protection policies in Microsoft Defender for Cloud so that I can secure my data effectively.
910
---
11+
1012
# SQL information protection policy in Microsoft Defender for Cloud
1113

1214
SQL information protection's [data discovery and classification mechanism](/azure/azure-sql/database/data-discovery-and-classification-overview) provides advanced capabilities for discovering, classifying, labeling, and reporting the sensitive data in your databases. It's built into [Azure SQL Database](/azure/azure-sql/database/sql-database-paas-overview), [Azure SQL Managed Instance](/azure/azure-sql/managed-instance/sql-managed-instance-paas-overview), and [Azure Synapse Analytics](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is.md).
@@ -127,11 +129,13 @@ Learn more in [Grant and request tenant-wide visibility](tenant-wide-permissions
127129
- [Get-AzSqlInformationProtectionPolicy](/powershell/module/az.security/get-azsqlinformationprotectionpolicy): Retrieves the effective tenant SQL information protection policy.
128130
- [Set-AzSqlInformationProtectionPolicy](/powershell/module/az.security/set-azsqlinformationprotectionpolicy): Sets the effective tenant SQL information protection policy.
129131

130-
## Next steps
132+
## Related articles
133+
134+
- [Azure SQL Database Data Discovery and Classification](/azure/azure-sql/database/data-discovery-and-classification-overview)
131135

132-
In this article, you learned about defining an information protection policy in Microsoft Defender for Cloud. To learn more about using SQL Information Protection to classify and protect sensitive data in your SQL databases, see [Azure SQL Database Data Discovery and Classification](/azure/azure-sql/database/data-discovery-and-classification-overview).
136+
- [Microsoft Defender for Cloud data security](data-security.md)
133137

134-
For more information on security policies and data security in Defender for Cloud, see the following articles:
138+
## Next step
135139

136-
- [Setting security policies in Microsoft Defender for Cloud](tutorial-security-policy.md): Learn how to configure security policies for your Azure subscriptions and resource groups
137-
- [Microsoft Defender for Cloud data security](data-security.md): Learn how Defender for Cloud manages and safeguards data
140+
> [!div class="nextstepaction"]
141+
> [Setting security policies in Microsoft Defender for Cloud](tutorial-security-policy.md)

articles/defender-for-iot/device-builders/concept-recommendations.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,6 @@ Security recommendations are actionable and aim to aid customers in complying wi
1212

1313
In this article, you will find a list of recommendations, which can be triggered on your IoT Hub.
1414

15-
> [!NOTE]
16-
> The Microsoft Defender for IoT legacy experience under IoT Hub has been replaced by our new Defender for IoT standalone experience, in the Defender for IoT area of the Azure portal. The legacy experience under IoT Hub will not be supported after **March 31, 2023**.
17-
1815
## Built in recommendations in IoT Hub
1916

2017
Recommendation alerts provide insight and suggestions for actions to improve the security posture of your environment.

articles/defender-for-iot/device-builders/how-to-investigate-cis-benchmark.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,6 @@ ms.topic: how-to
99

1010
Perform basic and advanced investigations based on OS baseline recommendations.
1111

12-
> [!NOTE]
13-
> The Microsoft Defender for IoT legacy experience under IoT Hub has been replaced by our new Defender for IoT standalone experience, in the Defender for IoT area of the Azure portal. The legacy experience under IoT Hub will not be supported after **March 31, 2023**.
14-
1512
## Basic OS baseline security recommendation investigation
1613

1714
You can investigate OS baseline recommendations by navigating to [Defender for IoT in the Azure portal](https://portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started). For more information, see how to [Investigate security recommendations](quickstart-investigate-security-recommendations.md).

articles/defender-for-iot/device-builders/how-to-investigate-device.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,11 +15,6 @@ In this guide, use the investigation suggestions provided to help determine the
1515
> * Find your device data
1616
> * Investigate using KQL queries
1717
18-
> [!NOTE]
19-
> The Microsoft Defender for IoT legacy experience under IoT Hub has been replaced by our new Defender for IoT standalone experience, in the Defender for IoT area of the Azure portal. The legacy experience under IoT Hub will not be supported after **March 31, 2023**.
20-
>
21-
> For more information, see [Tutorial: Investigate security recommendations](tutorial-investigate-security-recommendations.md) and [Tutorial: Investigate security alerts](tutorial-investigate-security-alerts.md).
22-
2318
## How can I access my data?
2419

2520
By default, Defender for IoT stores your security alerts and recommendations in your Log Analytics workspace. You can also choose to store your raw security data.

articles/defender-for-iot/device-builders/how-to-security-data-access.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,6 @@ ms.date: 03/28/2022
99

1010
Defender for IoT stores security alerts, recommendations, and raw security data (if you choose to save it) in your Log Analytics workspace.
1111

12-
> [!NOTE]
13-
> The Microsoft Defender for IoT legacy experience under IoT Hub has been replaced by our new Defender for IoT standalone experience, in the Defender for IoT area of the Azure portal. The legacy experience under IoT Hub will not be supported after **March 31, 2023**.
14-
>
15-
> For more information, see [Tutorial: Configure Microsoft Defender for IoT agent-based solution](tutorial-configure-agent-based-solution.md).
1612
## Log Analytics
1713

1814
To configure which Log Analytics workspace is used:
@@ -32,7 +28,7 @@ For details on querying data from Log Analytics, see [Get started with log queri
3228

3329
Security alerts are stored in _AzureSecurityOfThings.SecurityAlert_ table in the Log Analytics workspace configured for the Defender for IoT solution.
3430

35-
We've provided a number of useful queries to help you get started exploring security alerts.
31+
We provide many useful queries to help you get started exploring security alerts.
3632

3733
### Sample records
3834

@@ -111,7 +107,7 @@ SecurityAlert
111107

112108
Security recommendations are stored in _AzureSecurityOfThings.SecurityRecommendation_ table in the Log Analytics workspace configured for the Defender for IoT solution.
113109

114-
We've provided a number of useful queries to help you get start exploring security recommendations.
110+
We provide many useful queries to help you get start exploring security recommendations.
115111

116112
### Sample records
117113

@@ -135,8 +131,8 @@ SecurityRecommendation
135131

136132
| TimeGenerated | IoTHubId | DeviceId | RecommendationSeverity | RecommendationState | RecommendationDisplayName | Description | RecommendationAdditionalData |
137133
|---------------|----------|----------|------------------------|---------------------|---------------------------|-------------|------------------------------|
138-
| 2019-03-22T10:21:06.060 | /subscriptions/<subscription_id>/resourceGroups/<resource_group>/providers/Microsoft.Devices/IotHubs/<iot_hub> | <device_name> | Medium | Active | Permissive firewall rule in the input chain was found | A rule in the firewall has been found that contains a permissive pattern for a wide range of IP addresses or Ports | {"Rules":"[{\"SourceAddress\":\"\",\"SourcePort\":\"\",\"DestinationAddress\":\"\",\"DestinationPort\":\"1337\"}]"} |
139-
| 2019-03-22T10:50:27.237 | /subscriptions/<subscription_id>/resourceGroups/<resource_group>/providers/Microsoft.Devices/IotHubs/<iot_hub> | <device_name> | Medium | Active | Permissive firewall rule in the input chain was found | A rule in the firewall has been found that contains a permissive pattern for a wide range of IP addresses or Ports | {"Rules":"[{\"SourceAddress\":\"\",\"SourcePort\":\"\",\"DestinationAddress\":\"\",\"DestinationPort\":\"1337\"}]"} |
134+
| 2019-03-22T10:21:06.060 | /subscriptions/<subscription_id>/resourceGroups/<resource_group>/providers/Microsoft.Devices/IotHubs/<iot_hub> | <device_name> | Medium | Active | Permissive firewall rule in the input chain was found | A rule in the firewall was found that contains a permissive pattern for a wide range of IP addresses or Ports | {"Rules":"[{\"SourceAddress\":\"\",\"SourcePort\":\"\",\"DestinationAddress\":\"\",\"DestinationPort\":\"1337\"}]"} |
135+
| 2019-03-22T10:50:27.237 | /subscriptions/<subscription_id>/resourceGroups/<resource_group>/providers/Microsoft.Devices/IotHubs/<iot_hub> | <device_name> | Medium | Active | Permissive firewall rule in the input chain was found | A rule in the firewall was found that contains a permissive pattern for a wide range of IP addresses or Ports | {"Rules":"[{\"SourceAddress\":\"\",\"SourcePort\":\"\",\"DestinationAddress\":\"\",\"DestinationPort\":\"1337\"}]"} |
140136

141137
### Device summary
142138

articles/defender-for-iot/device-builders/quickstart-create-custom-alerts.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,6 @@ ms.date: 01/01/2023
99

1010
Using custom security groups and alerts, takes full advantage of the end-to-end security information and categorical device knowledge to ensure better security across your IoT solution.
1111

12-
> [!NOTE]
13-
> The Microsoft Defender for IoT legacy experience under IoT Hub has been replaced by our new Defender for IoT standalone experience, in the Defender for IoT area of the Azure portal. The legacy experience under IoT Hub will not be supported after **March 31, 2023**.
1412
## Why use custom alerts?
1513

1614
You know your IoT devices best.

0 commit comments

Comments
 (0)