You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/release-notes.md
+18-1Lines changed: 18 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: memildin
5
5
manager: rkarlin
6
6
ms.service: security-center
7
7
ms.topic: reference
8
-
ms.date: 11/04/2021
8
+
ms.date: 11/07/2021
9
9
ms.author: memildin
10
10
---
11
11
# What's new in Microsoft Defender for Cloud?
@@ -32,6 +32,7 @@ Our Ignite release includes:
32
32
-[Expanded security control assessments with Azure Security Benchmark v3](#expanded-security-control-assessments-with-azure-security-benchmark-v3)
33
33
-[Microsoft Sentinel connector's optional bi-directional alert synchronization released for general availability (GA)](#microsoft-sentinel-connectors-optional-bi-directional-alert-synchronization-released-for-general-availability-ga)
34
34
-[New recommendation to push Azure Kubernetes Service (AKS) logs to Sentinel](#new-recommendation-to-push-azure-kubernetes-service-aks-logs-to-sentinel)
35
+
-[Recommendations mapped to the MITRE ATT&CK® framework - released for general availability (GA)](#recommendations-mapped-to-the-mitre-attck-framework---released-for-general-availability-ga)
35
36
36
37
Other changes in November include:
37
38
@@ -117,6 +118,22 @@ The new recommendation, "Diagnostic logs in Kubernetes services should be enable
117
118
We've also enhanced the "Auditing on SQL server should be enabled" recommendation with the same Sentinel streaming capabilities.
118
119
119
120
121
+
### Recommendations mapped to the MITRE ATT&CK® framework - released for general availability (GA)
122
+
123
+
We've enhanced Defender for Cloud's security recommendations to show their position on the MITRE ATT&CK® framework. This globally accessible knowledge base of threat actors' tactics and techniques based on real-world observations, provides more context to help you understand the associated risks of the recommendations for your environment.
124
+
125
+
You'll find these tactics wherever you access recommendation information:
126
+
127
+
-**Azure Resource Graph query results** for relevant recommendations include the MITRE ATT&CK® tactics and techniques.
128
+
129
+
-**Recommendation details pages** show the mapping for all relevant recommendations:
130
+
131
+
:::image type="content" source="media/review-security-recommendations/tactics-window.png" alt-text="Screenshot of the MITRE tactics mapping for a recommendation.":::
132
+
133
+
-**The recommendations page in Defender for Cloud** has a new :::image type="icon" source="media/review-security-recommendations/tactics-filter-recommendations-page.png" border="false"::: filter to select recommendations according to their associated tactic:
134
+
135
+
Learn more in [Review your security recommendations](review-security-recommendations.md).
136
+
120
137
### Microsoft Threat and Vulnerability Management added as vulnerability assessment solution - released for general availability (GA)
121
138
122
139
In October, [we announced](#microsoft-threat-and-vulnerability-management-added-as-vulnerability-assessment-solution-in-preview) an extension to the integration between [Microsoft Defender for servers](defender-for-servers-introduction.md) and Microsoft Defender for Endpoint, to support a new vulnerability assessment provider for your machines: [Microsoft threat and vulnerability management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt). This feature is now released for general availability (GA).
Copy file name to clipboardExpand all lines: articles/security-center/review-security-recommendations.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: memildin
5
5
manager: rkarlin
6
6
ms.service: security-center
7
7
ms.topic: conceptual
8
-
ms.date: 10/20/2021
8
+
ms.date: 11/07/2021
9
9
ms.author: memildin
10
10
---
11
11
# Review your security recommendations
@@ -38,7 +38,11 @@ Defender for Cloud analyzes the security state of your resources to identify pot
38
38
-**Open query** - All recommendations have the option to view the detailed information about the affected resources using Azure Resource Graph Explorer.
39
39
1.**Severity indicator**.
40
40
1.**Freshness interval** (where relevant).
41
-
1.**Count of exempted resources** if exemptions exist for this recommendation, this shows the number of resources that have been exempted.
41
+
1.**Count of exempted resources** if exemptions exist for a recommendation, this shows the number of resources that have been exempted with a link to view the specific resources.
42
+
1.**Mapping to MITRE ATT&CK ® tactics and techniques** if a recommendation has defined tactics and techniques, select the icon for links to the relevant pages on MITRE's site.
43
+
44
+
:::image type="content" source="media/review-security-recommendations/tactics-window.png" alt-text="Screenshot of the MITRE tactics mapping for a recommendation.":::
45
+
42
46
1.**Description** - A short description of the security issue.
43
47
1. When relevant, the details page also includes a table of **related recommendations**:
44
48
@@ -58,7 +62,6 @@ Defender for Cloud analyzes the security state of your resources to identify pot
58
62
1.**Affected resources** - Your resources are grouped into tabs:
59
63
-**Healthy resources** – Relevant resources which either aren't impacted or on which you've already remediated the issue.
60
64
-**Unhealthy resources** – Resources which are still impacted by the identified issue.
61
-
-**Removed** - Resources that were deleted between assessment cycles (as defined by the freshness interval).
62
65
-**Not applicable resources** – Resources for which the recommendation can't give a definitive answer. The not applicable tab also includes reasons for each resource.
63
66
64
67
:::image type="content" source="./media/review-security-recommendations/recommendations-not-applicable-reasons.png" alt-text="Not applicable resources with reasons.":::
0 commit comments