Skip to content

Commit 9cef6ff

Browse files
committed
added more to freshness
1 parent d81ac8f commit 9cef6ff

9 files changed

+15
-15
lines changed

articles/defender-for-cloud/defender-for-resource-manager-usage.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: How to respond to Microsoft Defender for Resource Manager alerts
33
description: Learn about the steps necessary for responding to alerts from Microsoft Defender for Resource Manager
4-
ms.date: 11/09/2021
4+
ms.date: 05/30/2024
55
ms.topic: how-to
66
ms.author: dacurwin
77
author: dcurwin
@@ -11,13 +11,13 @@ author: dcurwin
1111

1212
When you receive an alert from Microsoft Defender for Resource Manager, we recommend you investigate and respond to the alert as described below. Defender for Resource Manager protects all connected resources, so even if you're familiar with the application or user that triggered the alert, it's important to verify the situation surrounding every alert.
1313

14-
## Step 1: Contact
14+
## Contact
1515

1616
1. Contact the resource owner to determine whether the behavior was expected or intentional.
1717
1. If the activity is expected, dismiss the alert.
1818
1. If the activity is unexpected, treat the related user accounts, subscriptions, and virtual machines as compromised and mitigate as described in the following step.
1919

20-
## Step 2: Investigate alerts from Microsoft Defender for Resource Manager
20+
## Investigate alerts from Microsoft Defender for Resource Manager
2121

2222
Security alerts from Defender for Resource Manager are based on threats detected by monitoring Azure Resource Manager operations. Defender for Cloud uses internal log sources of Azure Resource Manager as well as Azure Activity log, a platform log in Azure that provides insight into subscription-level events.
2323

@@ -45,7 +45,7 @@ To investigate security alerts from Defender for Resource Manager:
4545
> [!TIP]
4646
> For a better, richer investigation experience, stream your Azure activity logs to Microsoft Sentinel as described in [Connect data from Azure Activity log](../sentinel/data-connectors/azure-activity.md).
4747
48-
## Step 3: Immediate mitigation
48+
## Mitigate immediately
4949

5050
1. Remediate compromised user accounts:
5151
- If they’re unfamiliar, delete them as they might have been created by a threat actor

articles/defender-for-cloud/information-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Use Microsoft Purview's data sensitivity classifications in Microso
44
author: dcurwin
55
ms.author: dacurwin
66
ms.topic: overview
7-
ms.date: 06/29/2022
7+
ms.date: 05/30/2024
88
---
99
# Leverage Purview Catalog to protect sensitive data (Preview)
1010

articles/defender-for-cloud/plan-multicloud-security-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about designing a solution for securing and protecting your m
44
ms.topic: how-to
55
author: dcurwin
66
ms.author: dacurwin
7-
ms.date: 10/03/2022
7+
ms.date: 05/30/2024
88
---
99

1010
# Get started

articles/defender-for-cloud/powershell-sample-vulnerability-assessment-baselines.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: In this article, learn how to set up baselines for vulnerability as
44
ms.topic: sample
55
author: dcurwin
66
ms.author: dacurwin
7-
ms.date: 11/29/2022
7+
ms.date: 05/30/2024
88
ms.custom: not-for-toc, devx-track-azurepowershell
99
---
1010

articles/defender-for-cloud/privacy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Manage user data
33
description: Learn how to manage the user data in Microsoft Defender for Cloud. Managing user data includes the ability to access, delete, or export data.
4-
ms.topic: conceptual
5-
ms.date: 01/08/2023
4+
ms.topic: concept-article
5+
ms.date: 05/30/2024
66
---
77

88
# Manage user data in Microsoft Defender for Cloud

articles/defender-for-cloud/quickstart-onboard-github.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Connect your GitHub organizations
33
description: Learn how to connect your GitHub Environment to Defender for Cloud and enhance the security of your GitHub resources.
4-
ms.date: 05/16/2024
4+
ms.date: 05/30/2024
55
ms.topic: quickstart
66
ms.custom: ignite-2023
77
#customer intent: As a user, I want to learn how to connect my GitHub Environment to Defender for Cloud so that I can enhance the security of my GitHub resources.

articles/defender-for-cloud/quickstart-onboard-gitlab.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Connect your GitLab groups
33
description: Learn how to connect your GitLab Environment to Defender for Cloud.
4-
ms.date: 01/24/2023
4+
ms.date: 05/30/2024
55
ms.topic: quickstart
66
ms.custom: ignite-2023
77
---

articles/defender-for-cloud/windows-admin-center-integration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: How to protect Windows Admin Center servers
33
description: This article explains how to integrate Microsoft Defender for Cloud with Windows Admin Center
4-
ms.topic: conceptual
5-
ms.date: 01/08/2023
4+
ms.topic: concept-article
5+
ms.date: 05/30/2024
66
---
77

88
# Protect Windows Admin Center resources with Microsoft Defender for Cloud

articles/defender-for-cloud/zero-trust.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Zero trust infrastructure and integrations
33
description: Independent software vendors (ISVs) can integrate their solutions with Microsoft Defender for Cloud to help customers adopt a Zero Trust model and keep their organizations secure.
4-
ms.date: 02/26/2023
5-
ms.topic: conceptual
4+
ms.date: 05/30/2024
5+
ms.topic: concept-article
66
ms.collection:
77
- zerotrust-services
88
---

0 commit comments

Comments
 (0)