You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/benefits-of-continuous-export.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Exporting alerts and recommendations with continuous export
3
3
description: Learn about the benefits of continuous export in Microsoft Defender for Cloud. Stream security data to Azure Monitor workspace for analysis and visualization.
4
-
ms.date: 03/20/2024
4
+
ms.date: 03/25/2024
5
5
author: dcurwin
6
6
ms.author: dacurwin
7
7
ms.topic: concept-article
@@ -30,7 +30,7 @@ You can use continuous export to export the following data types whenever they c
30
30
- Controls.
31
31
- Security alerts.
32
32
- Regulatory compliance.
33
-
-Security attack paths
33
+
-Attack paths
34
34
35
35
Recommendation severity, security findings and controls are *sub* categories that belong to a *parent* category. For example:
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/release-notes.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Release notes
3
3
description: This page is updated frequently with the latest updates in Defender for Cloud.
4
4
ms.topic: overview
5
-
ms.date: 03/20/2024
5
+
ms.date: 03/25/2024
6
6
---
7
7
8
8
# What's new in Microsoft Defender for Cloud?
@@ -24,7 +24,7 @@ If you're looking for items older than six months, you can find them in the [Arc
24
24
25
25
|Date | Update |
26
26
|--|--|
27
-
| March 21|[Continuous export now includes attack path data](#continuous-export-now-includes-attack-path-data)|
27
+
| March 25|[Continuous export now includes attack path data](#continuous-export-now-includes-attack-path-data)|
28
28
| March 21 |[Agentless scanning supports CMK encrypted VMs in Azure (preview)](#agentless-scanning-supports-cmk-encrypted-vms-in-azure)|
29
29
| March 18 |[New endpoint detection and response recommendations](#new-endpoint-detection-and-response-recommendations)|
30
30
| March 17 |[Custom recommendations based on KQL for Azure is now public preview](#custom-recommendations-based-on-kql-for-azure-is-now-public-preview)|
@@ -38,13 +38,15 @@ If you're looking for items older than six months, you can find them in the [Arc
38
38
39
39
### Continuous export now includes attack path data
40
40
41
+
March 25, 2024
42
+
41
43
We are announcing that continuous export now includes attack path data. This feature allows you to stream security data to Log Analytics in Azure Monitor, to Azure Event Hubs, or to another Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), or IT classic deployment model solution.
42
44
43
45
Learn more about [continuous export](benefits-of-continuous-export.md).
44
46
45
47
### Agentless scanning supports CMK encrypted VMs in Azure
46
48
47
-
March 21 2024
49
+
March 21, 2024
48
50
49
51
Until now agentless scanning covered CMK encrypted VMs in AWS and GCP. With this release we are completing support for Azure as well. The capability employs a unique scanning approach for CMK in Azure:
50
52
- Defender for Cloud does not handle the key or decryption process. Key handling and decryption is seamlessly handled by Azure Compute and is transparent to Defender for Cloud's agentless scanning service.
@@ -59,7 +61,7 @@ During public preview this capability is not automatically enabled. If you are u
59
61
60
62
### New endpoint detection and response recommendations
61
63
62
-
March 18 2024
64
+
March 18, 2024
63
65
64
66
We are announcing new endpoint detection and response recommendations that discover and assesses the configuration of supported endpoint detection and response solutions. If issues are found, these recommendations offer remediation steps.
0 commit comments