Skip to content

Commit 967784b

Browse files
authored
Merge pull request #274346 from Eitan-Shteinberg/docs-editor/defender-for-storage-malware-s-1714982001
Update defender-for-storage-malware-scan.md
2 parents 04c691e + 3c0fb6e commit 967784b

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/defender-for-cloud/defender-for-storage-malware-scan.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,8 +64,10 @@ You can [enable and configure Malware Scanning at scale](tutorial-enable-storage
6464

6565
#### On-upload triggers
6666

67-
When a blob is uploaded to a protected storage account - a malware scan is triggered. All upload methods trigger the scan. Modifying a blob is an upload operation and therefore the modified content is scanned after the update.
67+
Malware scans are triggered in a protected storage account by any operation that results in a `BlobCreated` event, as specified in the [Azure Blob Storage as an Event Grid source](/azure/event-grid/event-schema-blob-storage?toc=%2Fazure%2Fstorage%2Fblobs%2Ftoc.json&tabs=cloud-event-schema) page. These operations include the initial uploading of new blobs, overwriting existing blobs, and finalizing changes to blobs through specific operations. Finalizing operations might involve `PutBlockList`, which assembles block blobs from multiple blocks, or `FlushWithClose`, which commits data appended to a blob in Azure Data Lake Storage Gen2.
6868

69+
> [!NOTE]
70+
> Incremental operations such as `AppendFile` in Azure Data Lake Storage Gen2 and `PutBlock` in Azure BlockBlob, which allow data to be added without immediate finalization, do not trigger a malware scan on their own. A malware scan is initiated only when these additions are officially committed: `FlushWithClose` commits and finalizes `AppendFile` operations, triggering a scan, and `PutBlockList` commits blocks in BlockBlob, initiating a scan. Understanding this distinction is critical for managing scanning costs effectively, as each commit can lead to a new scan and potentially increase expenses due to multiple scans of incrementally updated data.
6971
#### Scan regions and data retention
7072

7173
The malware scanning service that uses Microsoft Defender Antivirus technologies reads the blob. Malware Scanning scans the content "in-memory" and deletes scanned files immediately after scanning. The content isn't retained. The scanning occurs within the same region of the storage account. In some cases, when a file is suspicious, and more data is required, Malware Scanning might share file metadata outside the scanning region, including metadata classified as customer data (for example, SHA-256 hash), with Microsoft Defender for Endpoint.

0 commit comments

Comments
 (0)