You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/release-notes.md
+20-1Lines changed: 20 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: memildin
5
5
manager: rkarlin
6
6
ms.service: security-center
7
7
ms.topic: reference
8
-
ms.date: 11/04/2021
8
+
ms.date: 11/07/2021
9
9
ms.author: memildin
10
10
---
11
11
# What's new in Microsoft Defender for Cloud?
@@ -32,6 +32,7 @@ Our Ignite release includes:
32
32
-[Expanded security control assessments with Azure Security Benchmark v3](#expanded-security-control-assessments-with-azure-security-benchmark-v3)
33
33
-[Microsoft Sentinel connector's optional bi-directional alert synchronization released for general availability (GA)](#microsoft-sentinel-connectors-optional-bi-directional-alert-synchronization-released-for-general-availability-ga)
34
34
-[New recommendation to push Azure Kubernetes Service (AKS) logs to Sentinel](#new-recommendation-to-push-azure-kubernetes-service-aks-logs-to-sentinel)
35
+
-[Recommendations mapped to the MITRE ATT&CK® framework - released for general availability (GA)](#recommendations-mapped-to-the-mitre-attck-framework---released-for-general-availability-ga)
35
36
36
37
Other changes in November include:
37
38
@@ -117,6 +118,24 @@ The new recommendation, "Diagnostic logs in Kubernetes services should be enable
117
118
We've also enhanced the "Auditing on SQL server should be enabled" recommendation with the same Sentinel streaming capabilities.
118
119
119
120
121
+
### Recommendations mapped to the MITRE ATT&CK® framework - released for general availability (GA)
122
+
123
+
Wherever relevant, we're added references information to recommendations to show their position on the MITRE ATT&CK® framework. This globally accessible knowledge base of adversary tactics and techniques based on real-world observations, provides more context to help you understand the associated risks of a recommendation.
124
+
125
+
You'll find this information in the locations where recommendation information is used:
126
+
127
+
-**Azure Resource Graph query results** for relevant recommendations include the MITRE ATT&CK® tactics and techniques.
128
+
129
+
-**Recommendation details pages** show the mapping for all relevant recommendations:
130
+
131
+
:::image type="content" source="media/review-security-recommendations/tactics-window.png" alt-text="Screenshot of the MITRE tactics mapping for a recommendation.":::
132
+
133
+
-**The recommendations page in Defender for Cloud** has a new :::image type="icon" source="media/review-security-recommendations/tactics-filter-recommendations-page.png" border="false"::: filter to select recommendations according to their associated tactic:
134
+
135
+
136
+
137
+
Learn more in [Review your security recommendations](review-security-recommendations.md).
138
+
120
139
### Microsoft Threat and Vulnerability Management added as vulnerability assessment solution - released for general availability (GA)
121
140
122
141
In October, [we announced](#microsoft-threat-and-vulnerability-management-added-as-vulnerability-assessment-solution-in-preview) an extension to the integration between [Microsoft Defender for servers](defender-for-servers-introduction.md) and Microsoft Defender for Endpoint, to support a new vulnerability assessment provider for your machines: [Microsoft threat and vulnerability management](/microsoft-365/security/defender-endpoint/next-gen-threat-and-vuln-mgt). This feature is now released for general availability (GA).
Copy file name to clipboardExpand all lines: articles/security-center/review-security-recommendations.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,6 +39,10 @@ Defender for Cloud analyzes the security state of your resources to identify pot
39
39
1.**Severity indicator**.
40
40
1.**Freshness interval** (where relevant).
41
41
1.**Count of exempted resources** if exemptions exist for this recommendation, this shows the number of resources that have been exempted.
42
+
1.**Mapping to MITRE ATT&CK ® tactics and techniques** if this recommendation has defined tactics and techniques, select the icon for links to the relevant pages on MITRE's site.
43
+
44
+
:::image type="content" source="media/review-security-recommendations/tactics-window.png" alt-text="Screenshot of the MITRE tactics mapping for a recommendation.":::
45
+
42
46
1.**Description** - A short description of the security issue.
43
47
1. When relevant, the details page also includes a table of **related recommendations**:
0 commit comments