Skip to content

Commit a3ad3d4

Browse files
authored
Merge pull request #94080 from memildin/asc-melvyn-daily
For after Ignite Keynote - cumulative updates
2 parents 2dc787f + aac9cc0 commit a3ad3d4

File tree

62 files changed

+1031
-414
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

62 files changed

+1031
-414
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26604,6 +26604,11 @@
2660426604
"redirect_url": "/azure/security-center/security-center-features-retirement-july2019#custom-alert-rules-preview",
2660526605
"redirect_document_id": false
2660626606
},
26607+
{
26608+
"source_path": "articles/security-center/security-center-policies-overview.md",
26609+
"redirect_url": "/azure/security-center/tutorial-security-policy.md",
26610+
"redirect_document_id": false
26611+
},
2660726612
{
2660826613
"source_path": "articles/virtual-network/virtual-network-deploy-multinic-arm-cli.md",
2660926614
"redirect_url": "/azure/virtual-machines/linux/multiple-nics",

articles/security-center/TOC.yml

Lines changed: 35 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,14 @@
4040
href: security-center-using-recommendations.md
4141
- name: Cross-tenant management
4242
href: security-center-cross-tenant-management.md
43+
- name: Container security
44+
items:
45+
- name: Container security overview
46+
href: container-security.md
47+
- name: Integration with Azure Container Registry
48+
href: azure-container-registry-integration.md
49+
- name: Integration with Azure Kubernetes Service
50+
href: azure-kubernetes-service-integration.md
4351
- name: Threat detection alerts and incidents
4452
items:
4553
- name: Security alerts overview
@@ -54,7 +62,7 @@
5462
href: security-center-alerts-compute.md
5563
- name: Threat detection for data services
5664
href: security-center-alerts-data-services.md
57-
- name: Threat detection for Azure service layer
65+
- name: Threat detection for Azure service layers
5866
href: security-center-alerts-service-layer.md
5967
- name: Integration with Azure Security Products
6068
href: security-center-alerts-integration.md
@@ -71,33 +79,47 @@
7179
href: security-center-secure-score.md
7280
- name: Upgrade to advanced security
7381
href: security-center-onboarding.md
74-
- name: Server protection with Microsoft Defender ATP
82+
- name: Protect your servers with Microsoft Defender ATP
7583
href: security-center-wdatp.md
76-
- name: Advanced data security for SQL on Azure VMs (Public Preview)
84+
- name: Use advanced data security for SQL on Azure VMs
7785
href: security-center-iaas-advanced-data.md
7886
- name: Use App Service to protect your applications
7987
href: security-center-app-services.md
80-
- name: Working with security policies
81-
href: tutorial-security-policy.md
88+
- name: Use security policies
89+
items:
90+
- name: Overview of security policies
91+
href: tutorial-security-policy.md
92+
- name: Use built-in security policies
93+
href: security-center-policy-definitions.md
94+
- name: Create custom security policies
95+
href: custom-security-policies.md
96+
- name: Manage policies with the Azure Policy REST API
97+
href: configure-security-policy-azure-policy.md
98+
- name: Add dynamic compliance packages
99+
href: update-regulatory-compliance-packages.md
82100
- name: Customize the information protection policy
83101
href: security-center-info-protection-policy.md
84102
- name: Manage security solutions
85103
href: security-center-partner-integration.md
86104
- name: Automate onboarding using PowerShell
87105
href: security-center-powershell-onboarding.md
88-
- name: Security Center settings
89-
href: security-center-policies-overview.md
106+
- name: Integrate with Windows Admin Center
107+
href: windows-admin-center-integration.md
90108
- name: Compare baselines using File Integrity Monitoring
91109
href: security-center-file-integrity-monitoring-baselines.md
92-
- name: Data collection
110+
- name: Automate responses to alerts and recommendations
111+
href: workflow-automation.md
112+
- name: Export alerts and recommendations
113+
href: continuous-export.md
114+
- name: Configure your data collection
93115
href: security-center-enable-data-collection.md
94-
- name: Built-in security policies
95-
href: security-center-policy-definitions.md
96-
- name: Email notifications
116+
- name: Set up advanced threat protection for Azure Key Vault
117+
href: advanced-threat-protection-key-vault.md
118+
- name: Set up email notifications
97119
href: security-center-provide-security-contact-details.md
98120
- name: Pricing
99121
href: security-center-pricing.md
100-
- name: Tenant-wide visibility
122+
- name: Gain tenant-wide visibility
101123
href: security-center-management-groups.md
102124
- name: Implement security recommendations
103125
items:
@@ -167,7 +189,7 @@
167189
- name: Manage user data
168190
href: security-center-privacy.md
169191
- name: Azure Security Center for IoT documentation
170-
href: https://docs.microsoft.com/en-us/azure/asc-for-iot/
192+
href: https://docs.microsoft.com/azure/asc-for-iot/
171193
- name: FAQ
172194
href: security-center-faq.md
173195
- name: Azure security documentation
Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
---
2+
title: How to set up advanced threat protection for Azure Key Vault | Microsoft Docs
3+
description: This article explains how to set up advanced threat protection for Azure Key Vault in Azure Security Center
4+
services: security-center
5+
author: memildin
6+
manager: rkarlin
7+
ms.service: security-center
8+
ms.topic: conceptual
9+
ms.date: 11/04/2019
10+
ms.author: memildin
11+
12+
---
13+
# How to set up advanced threat protection for Azure Key Vault (Preview)
14+
15+
Advanced threat protection for Azure Key Vault provides an additional layer of security intelligence. This tool detects potentially harmful attempts to access or exploit Key Vault accounts. Using Security Center's native advanced threat protection, you can address threats without being a security expert, and without learning additional security monitoring systems.
16+
17+
When Security Center detects anomalous activity, it displays alerts. It also emails the subscription administrator with details of the suspicious activity and recommendations for how to investigate and remediate the identified threats.
18+
19+
> [!NOTE]
20+
> Advanced threat protection for Azure Key Vault is currently only available in North America regions.
21+
22+
## To set up advanced threat protection from Azure Security Center
23+
24+
By default, advanced threat protection is enabled for all of your Key Vault accounts when you subscribe to Security Center's Standard tier (see [pricing](security-center-pricing.md)).
25+
26+
To enable or disable the protection for a specific subscription:
27+
28+
1. From Security Center's sidebar, click **Pricing & settings**.
29+
1. Select the subscription with the storage accounts for which you want to enable or disable threat protection.
30+
1. Click **Pricing tier**.
31+
1. From the **Select pricing tier by resource type** group, find the Key Vaults row and click **Enabled** or **Disabled**.
32+
[![Enabling or disabling the advanced threat protection for Key Vault in Azure Security Center](media/advanced-threat-protection-key-vault/atp-for-akv-enable-atp-for-akv.png)](media/advanced-threat-protection-key-vault/atp-for-akv-enable-atp-for-akv.png#lightbox)
33+
1. Click **Save**.
34+
35+
36+
## Next steps
37+
38+
In this article, you learned how to enable and disable advanced threat protection for Azure Key Vault.
39+
40+
For other related material, see the following article:
41+
42+
- [Threat detection for the Azure services layers in Security Center](security-center-alerts-service-layer.md) - This article describes the alerts related to advanced threat protection for Azure Key Vault
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
---
2+
title: Azure Security Center and Azure Container Registry | Microsoft Docs
3+
description: "Learn about Azure Security Center's integration with Azure Container Registry"
4+
services: security-center
5+
documentationcenter: na
6+
author: memildin
7+
manager: rkarlin
8+
ms.service: security-center
9+
ms.devlang: na
10+
ms.topic: conceptual
11+
ms.tgt_pltfrm: na
12+
ms.workload: na
13+
ms.date: 11/04/2019
14+
ms.author: memildin
15+
16+
---
17+
18+
# Azure Container Registry integration with Security Center (Preview)
19+
20+
Azure Container Registry (ACR) is a managed, private Docker registry service that stores and manages your container images for Azure deployments in a central registry. It's based on the open-source Docker Registry 2.0.
21+
22+
When using ACR together with Azure Security Center's standard tier (see [pricing](security-center-pricing.md)), you gain deeper visibility into your registry and images' vulnerabilities.
23+
24+
[![Azure Container Registry (ACR) recommendations inside Azure Security Center](media/azure-container-registry-integration/container-security-acr-page.png)](media/azure-container-registry-integration/container-security-acr-page.png#lightbox)
25+
26+
## Benefits of integration
27+
28+
Security Center identifies ACR registries in your subscription and seamlessly provides:
29+
30+
* **Azure-native vulnerability scanning** for all pushed Linux images. Security Center scans the image using a scanner from the industry-leading vulnerability scanning vendor, Qualys. This native solution is seamlessly integrated by default.
31+
32+
* **Security recommendations** for Linux images with known vulnerabilities. Security Center provides details of each reported vulnerability and a severity classification. Additionally, it gives guidance for how to remediate the specific vulnerabilities found on each image pushed to registry.
33+
34+
![Azure Security Center and Azure Container Registry (ACR) high-level overview](./media/azure-container-registry-integration/aks-acr-integration-detailed.png)
35+
36+
## Next steps
37+
38+
To learn more about Security Center's container security features, see:
39+
40+
* [Azure Security Center and container security](container-security.md)
41+
42+
* [Integration with Azure Kubernetes Service](azure-kubernetes-service-integration.md)
43+
44+
* [Virtual Machine protection](security-center-virtual-machine-protection.md) - Describes Security Center's recommendations
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
---
2+
title: Azure Security Center and Azure Kubernetes Service | Microsoft Docs
3+
description: "Learn about Azure Security Center's integration with Azure Kubernetes Services"
4+
services: security-center
5+
documentationcenter: na
6+
author: memildin
7+
manager: rkarlin
8+
ms.service: security-center
9+
ms.devlang: na
10+
ms.topic: conceptual
11+
ms.tgt_pltfrm: na
12+
ms.workload: na
13+
ms.date: 11/04/2019
14+
ms.author: memildin
15+
16+
---
17+
18+
# Azure Kubernetes Services integration with Security Center (Preview)
19+
Azure Kubernetes Service (AKS) is Microsoft’s managed service for developing, deploying, and managing containerized applications.
20+
21+
Use AKS together with Azure Security Center's standard tier (see [pricing](security-center-pricing.md)) to gain deeper visibility to your AKS nodes, cloud traffic, and security controls.
22+
23+
Security Center brings security benefits to your AKS clusters using data already gathered by the AKS master node.
24+
25+
![Azure Security Center and Azure Kubernetes Service (AKS) high-level overview](./media/azure-kubernetes-service-integration/aks-asc-integration-overview.png)
26+
27+
Together, these two tools form the best cloud-native Kubernetes security offering.
28+
29+
## Benefits of integration
30+
31+
Using the two services together provides:
32+
33+
* **Security recommendations** - Security Center identifies your AKS resources and categorizes them: from clusters to individual virtual machines. You can then view security recommendations per resource. For more information, see [How to implement security recommendations](security-center-recommendations.md).
34+
35+
> [!NOTE]
36+
> If the name of a Security Center recommendation ends with a "(Preview)" tag, it's referring to the preview nature of the recommendation; not the feature.
37+
38+
* **Environment hardening** - Security Center constantly monitors the configuration of your Kubernetes clusters, and generates security recommendations that reflect industry standards.
39+
40+
* **Run-time protection** - Through continuous analysis of the following AKS sources, Security Center alerts you to threats and malicious activity detected at the host *and* AKS cluster level (for more information, see [Azure container service](https://docs.microsoft.com/azure/security-center/security-center-alerts-compute#azure-container-service-)):
41+
* Raw security events, such as network data and process creation
42+
* The Kubernetes audit log
43+
44+
![Azure Security Center and Azure Kubernetes Service (AKS) in more detail](./media/azure-kubernetes-service-integration/aks-asc-integration-detailed.png)
45+
46+
> [!NOTE]
47+
> Some of the data scanned by Azure Security Center from your Kubernetes environment may contain sensitive information.
48+
49+
## Next steps
50+
51+
To learn more about Security Center's container security features, see:
52+
53+
* [Azure Security Center and container security](container-security.md)
54+
55+
* [Integration with Azure Container Registry](azure-container-registry-integration.md)
56+
57+
* [Virtual Machine protection](security-center-virtual-machine-protection.md) - Describes Security Center's recommendations
58+
59+
* [Data management at Microsoft](https://www.microsoft.com/trust-center/privacy/data-management) - Describes the data policies of Microsoft services (including Azure, Intune, and Office 365), details of Microsoft’s data management, and the retention policies that affect your data
Lines changed: 137 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,137 @@
1+
---
2+
title: Create and edit Azure Policy security policies using the REST API | Microsoft Docs
3+
description: Learn about Azure Policy policy management via a REST API.
4+
services: security-center
5+
author: memildin
6+
manager: rkarlin
7+
ms.service: security-center
8+
ms.topic: conceptual
9+
ms.date: 11/04/2019
10+
ms.author: memildin
11+
---
12+
13+
# Configure a security policy in Azure Policy using the REST API
14+
15+
As part of the native integration with Azure Policy, Azure Security Center enables you to take advantage Azure Policy’s REST API to create policy assignments. The following instructions walk you through creation of policy assignments, as well as customization of existing assignments.
16+
17+
Important concepts in Azure Policy:
18+
19+
- A **policy definition** is a rule
20+
21+
- An **initiative** is a collection of policy definitions (rules)
22+
23+
- An **assignment** is an application of an initiative or a policy to a specific scope (management group, subscription, etc.)
24+
25+
Security Center has a built-in initiative that includes all of its security policies. To assess Security Center’s policies on your Azure resources, you should create an assignment on the management group, or subscription you want to assess.
26+
27+
The built-in initiative has all of Security Center’s policies enabled by default. You can choose to disable certain policies from the built-in initiative. For example, to apply all of Security Center’s policies except **web application firewall**, change the value of the policy’s effect parameter to **Disabled**.
28+
29+
## API examples
30+
31+
In the following examples, replace these variables:
32+
33+
- **{scope}** enter the name of the management group or subscription to which you're applying the policy.
34+
- **{policyAssignmentName}** enter the [name of the relevant policy assignment](#policy-names).
35+
- **{name}** enter your name, or the name of the administrator who approved the policy change.
36+
37+
This example shows you how to assign the built-in Security Center initiative on a subscription or management group
38+
39+
```
40+
PUT
41+
https://management.azure.com/{scope}/providers/Microsoft.Authorization/policyAssignments/{policyAssignmentName}?api-version=2018-05-01
42+
43+
Request Body (JSON)
44+
45+
{
46+
47+
"properties":{
48+
49+
"displayName":"Enable Monitoring in Azure Security Center",
50+
51+
"metadata":{
52+
53+
"assignedBy":"{Name}"
54+
55+
},
56+
57+
"policyDefinitionId":"/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8",
58+
59+
"parameters":{},
60+
61+
}
62+
63+
}
64+
```
65+
66+
This example shows you how to assign the built-in Security Center initiative on a subscription, with the following policies disabled:
67+
68+
- System updates (“systemUpdatesMonitoringEffect”)
69+
70+
- Security configurations ("systemConfigurationsMonitoringEffect")
71+
72+
- Endpoint protection ("endpointProtectionMonitoringEffect")
73+
74+
```
75+
PUT https://management.azure.com/{scope}/providers/Microsoft.Authorization/policyAssignments/{policyAssignmentName}?api-version=2018-05-01
76+
77+
Request Body (JSON)
78+
79+
{
80+
81+
"properties":{
82+
83+
"displayName":"Enable Monitoring in Azure Security Center",
84+
85+
"metadata":{
86+
87+
"assignedBy":"{Name}"
88+
89+
},
90+
91+
"policyDefinitionId":"/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8",
92+
93+
"parameters":{
94+
95+
"systemUpdatesMonitoringEffect":{"value":"Disabled"},
96+
97+
"systemConfigurationsMonitoringEffect":{"value":"Disabled"},
98+
99+
"endpointProtectionMonitoringEffect":{"value":"Disabled"},
100+
101+
},
102+
103+
}
104+
105+
}
106+
```
107+
This example shows you how to remove an assignment:
108+
```
109+
DELETE
110+
https://management.azure.com/{scope}/providers/Microsoft.Authorization/policyAssignments/{policyAssignmentName}?api-version=2018-05-01
111+
```
112+
113+
## Policy names reference <a name="policy-names"></a>
114+
115+
|Policy name in Security Center|Policy name displayed in Azure Policy |Policy effect parameter name|
116+
|----|----|----|
117+
|SQL Encryption |Monitor unencrypted SQL database in Azure Security Center |sqlEncryptionMonitoringEffect|
118+
|SQL Auditing |Monitor unaudited SQL database in Azure Security Center |sqlAuditingMonitoringEffect|
119+
|System updates |Monitor missing system updates in Azure Security Center |systemUpdatesMonitoringEffect|
120+
|Storage encryption |Audit missing blob encryption for storage accounts |storageEncryptionMonitoringEffect|
121+
|JIT Network access |Monitor possible network just-in-time (JIT) access in Azure Security Center |jitNetworkAccessMonitoringEffect |
122+
|Adaptive application controls |Monitor possible app Whitelisting in Azure Security Center |adaptiveApplicationControlsMonitoringEffect|
123+
|Network security groups |Monitor permissive network access in Azure Security Center |networkSecurityGroupsMonitoringEffect|
124+
|Security configurations |Monitor OS vulnerabilities in Azure Security Center |systemConfigurationsMonitoringEffect|
125+
|Endpoint protection |Monitor missing Endpoint Protection in Azure Security Center |endpointProtectionMonitoringEffect |
126+
|Disk encryption |Monitor unencrypted VM Disks in Azure Security Center |diskEncryptionMonitoringEffect|
127+
|Vulnerability assessment |Monitor VM Vulnerabilities in Azure Security Center |vulnerabilityAssessmentMonitoringEffect|
128+
|Web application firewall |Monitor unprotected web application in Azure Security Center |webApplicationFirewallMonitoringEffect |
129+
|Next generation firewall |Monitor unprotected network endpoints in Azure Security Center| |
130+
131+
132+
## Next steps
133+
134+
For other related material, see the following articles:
135+
136+
- [Custom security policies](custom-security-policies.md)
137+
- [Security policy overview](tutorial-security-policy.md)

0 commit comments

Comments
 (0)