You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/enable-fips-nodes.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,6 +16,9 @@ The Federal Information Processing Standard (FIPS) 140-2 is a US government stan
16
16
17
17
* Azure CLI version 2.32.0 or later installed and configured. Run `az --version` to find the version. For more information about installing or upgrading the Azure CLI, see [Install Azure CLI][install-azure-cli].
18
18
19
+
> [!NOTE]
20
+
> AKS Monitoring Addon supports FIPS enabled node pools with Ubuntu, Azure Linux, and Windows starting with Agent version 3.1.17 (Linux) and Win-3.1.17 (Windows).
21
+
19
22
## Limitations
20
23
21
24
* FIPS-enabled node pools have the following limitations:
Copy file name to clipboardExpand all lines: articles/azure-monitor/containers/container-insights-overview.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,9 +24,7 @@ Container insights sends data to a [Log Analytics workspace](../logs/data-platfo
24
24
25
25
:::image type="content" source="media/container-insights-overview/aks-monitor-data.png" lightbox="media/container-insights-overview/aks-monitor-data.png" alt-text="Diagram of collection of monitoring data from Kubernetes cluster using Container insights and related services." border="false":::
26
26
27
-
28
-
29
-
### Supported configurations
27
+
## Supported configurations
30
28
Container insights supports the following environments:
31
29
32
30
-[Azure Kubernetes Service (AKS)](../../aks/index.yml)
@@ -46,6 +44,11 @@ Container insights supports the following environments:
46
44
>
47
45
> Container insights support for Windows Server 2022 operating system is in public preview.
48
46
47
+
## Security
48
+
49
+
- Container Insights supports FIPS enabled Linux and Windows node pools starting with Agent version 3.1.17 (Linux) & Win-3.1.17 (Windows).
50
+
- Starting with Agent version 3.1.17 (Linux) and Win-3.1.17 (Windows), Container Insights agents images (both Linux and Windows) are signed and for Windows agent, binaries inside the container are signed as well
51
+
49
52
## Access Container insights
50
53
51
54
Access Container insights in the Azure portal from **Containers** in the **Monitor** menu or directly from the selected AKS cluster by selecting **Insights**. The Azure Monitor menu gives you the global perspective of all the containers that are deployed and monitored. This information allows you to search and filter across your subscriptions and resource groups. You can then drill into Container insights from the selected container. Access Container insights for a particular cluster from its page in the Azure portal.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/alerts-suppression-rules.md
+5-7Lines changed: 5 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Suppressing false positives or other unwanted security alerts
3
-
description: This article explains how to use Microsoft Defender for Cloud's suppression rules to hide unwanted security alerts, such as false positives
4
-
ms.date: 01/09/2023
3
+
description: This article explains how to use Microsoft Defender for Cloud's suppression rules to hide unwanted security alerts, such as false positives.
4
+
ms.date: 03/11/2024
5
5
ms.topic: how-to
6
6
ms.author: dacurwin
7
7
author: dcurwin
@@ -69,11 +69,11 @@ To edit a rule you've created from the suppression rules page:
69
69
70
70
1. From Defender for Cloud's security alerts page, select **Suppression rules** at the top of the page.
71
71
72
-
:::image type="content" source="media/alerts-suppression-rules/suppression-rules-button.png" alt-text="Screenshot of the suppression rule button in the Security Alerts page.":::
72
+
:::image type="content" source="media/alerts-suppression-rules/suppression-rules-button.png" alt-text="Screenshot that shows the suppression rule button in the Security Alerts page." lightbox="media/alerts-suppression-rules/suppression-rules-button.png":::
73
73
74
74
1. The suppression rules page opens with all the rules for the selected subscriptions.
75
75
76
-
:::image type="content" source="media/alerts-suppression-rules/suppression-rules-page.png" alt-text="Screenshot of the Suppression rules page where you can review the suppression rules and create new ones." lightbox="media/alerts-suppression-rules/suppression-rules-page.png":::
76
+
:::image type="content" source="media/alerts-suppression-rules/suppression-rules-page.png" alt-text="Screenshot that shows the Suppression rules page where you can review the suppression rules and create new ones." lightbox="media/alerts-suppression-rules/suppression-rules-page.png":::
77
77
78
78
1. To edit a single rule, open the three dots (...) at the end of the rule and select **Edit**.
79
79
1. Change the details of the rule and select **Apply**.
@@ -101,6 +101,4 @@ For details and usage examples, see the [API documentation](/rest/api/defenderfo
101
101
102
102
This article described the suppression rules in Microsoft Defender for Cloud that automatically dismiss unwanted alerts.
103
103
104
-
Learn more about security alerts:
105
-
106
-
-[Security alerts generated by Defender for Cloud](alerts-reference.md)
104
+
Learn more about [security alerts generated by Defender for Cloud](alerts-reference.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/concept-regulatory-compliance.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,26 +2,26 @@
2
2
title: The Microsoft cloud security benchmark in Microsoft Defender for Cloud
3
3
description: Learn about the Microsoft cloud security benchmark in Microsoft Defender for Cloud.
4
4
ms.topic: conceptual
5
-
ms.date: 01/10/2023
5
+
ms.date: 03/13/2024
6
6
---
7
7
8
8
# Microsoft cloud security benchmark in Defender for Cloud
9
9
10
-
Industry standards, regulatory standards, and benchmarks are represented in Microsoft Defender for Cloud as [security standards](security-policy-concept.md), and are assigned to scopes such as Azure subscriptions, AWS accounts, and GCP projects.
10
+
Industry standards, regulatory standards, and benchmarks are represented in Microsoft Defender for Cloud as [security standards](security-policy-concept.md). These standards are assigned to scopes such as Azure subscriptions, AWS accounts, and GCP projects.
11
11
12
12
Defender for Cloud continuously assesses your hybrid cloud environment against these standards, and provides information about compliance in the **Regulatory compliance** dashboard.
13
13
14
14
When you onboard subscriptions and accounts to Defender for Cloud, the [Microsoft cloud security benchmark](/security/benchmark/azure/introduction) (MCSB) automatically starts to assess resources in scope.
15
15
16
16
This benchmark builds on the cloud security principles defined by the Azure Security Benchmark and applies these principles with detailed technical implementation guidance for Azure, for other cloud providers (such as AWS and GCP), and for other Microsoft clouds.
17
17
18
-
:::image type="content" source="media/concept-regulatory-compliance/microsoft-security-benchmark.png" alt-text="Image that shows the components that make up the Microsoft cloud security benchmark.":::
18
+
:::image type="content" source="media/concept-regulatory-compliance/microsoft-security-benchmark.png" alt-text="Image that shows the components that make up the Microsoft cloud security benchmark." lightbox="media/concept-regulatory-compliance/microsoft-security-benchmark.png":::
19
19
20
20
The compliance dashboard gives you a view of your overall compliance standing. Security for non-Azure platforms follows the same cloud-neutral security principles as Azure. Each control within the benchmark provides the same granularity and scope of technical guidance across Azure and other cloud resources.
21
21
22
22
:::image type="content" source="media/concept-regulatory-compliance/compliance-dashboard.png" alt-text="Screenshot of a sample regulatory compliance page in Defender for Cloud." lightbox="media/concept-regulatory-compliance/compliance-dashboard.png":::
23
23
24
-
From the compliance dashboard, you're able to manage all of your compliance requirements for your cloud deployments, including automatic, manual and shared responsibilities.
24
+
From the compliance dashboard, you're able to manage all of your compliance requirements for your cloud deployments, including automatic, manual, and shared responsibilities.
25
25
26
26
> [!NOTE]
27
27
> Shared responsibilities is only compatible with Azure.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-app-service-introduction.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Microsoft Defender for App Service - the benefits and features
3
-
description: Learn about the capabilities of Microsoft Defender for App Service and how to enable it on your subscription
4
-
ms.date: 01/10/2023
3
+
description: Learn about the capabilities of Microsoft Defender for App Service and how to enable it on your subscription.
4
+
ms.date: 03/12/2024
5
5
ms.topic: overview
6
6
ms.author: dacurwin
7
7
author: dcurwin
@@ -17,7 +17,7 @@ To protect your Azure App Service plan with Microsoft Defender for App Service,
17
17
18
18
- A supported App Service plan associated with dedicated machines. Supported plans are listed in [Availability](#availability).
19
19
20
-
- Defender for Cloud's enhanced protections enabled on your subscription as described in [Quickstart: Enable enhanced security features](enable-enhanced-security.md).
20
+
- Defender for Cloud's enhanced protections enabled on your subscription as described in [Enable enhanced security features](connect-azure-subscription.md).
21
21
22
22
> [!TIP]
23
23
> You can optionally enable individual Microsoft Defender plans, like Microsoft Defender for App Service.
@@ -35,11 +35,11 @@ To protect your Azure App Service plan with Microsoft Defender for App Service,
35
35
36
36
Azure App Service is a fully managed platform for building and hosting your web apps and APIs. Since the platform is fully managed, you don't have to worry about the infrastructure. It provides management, monitoring, and operational insights to meet enterprise-grade performance, security, and compliance requirements. For more information, see [Azure App Service](https://azure.microsoft.com/services/app-service/).
37
37
38
-
**Microsoft Defender for App Service** uses the scale of the cloud to identify attacks targeting applications running over App Service. Attackers probe web applications to find and exploit weaknesses. Before being routed to specific environments, requests to applications running in Azure go through several gateways, where they're inspected and logged. This data is then used to identify exploits and attackers, and to learn new patterns that will be used later.
38
+
**Microsoft Defender for App Service** uses the scale of the cloud to identify attacks targeting applications running over App Service. Attackers probe web applications to find and exploit weaknesses. Before being routed to specific environments, requests to applications running in Azure go through several gateways, where they're inspected and logged. This data is then used to identify exploits and attackers, and to learn new patterns that can be used later.
39
39
40
40
When you enable Microsoft Defender for App Service, you immediately benefit from the following services offered by this Defender plan:
41
41
42
-
-**Secure** - Defender for App Service assesses the resources covered by your App Service plan and generates security recommendations based on its findings. Use the detailed instructions in these recommendations to harden your App Service resources.
42
+
-**Secure** - Defender for App Service assesses the resources covered by your App Service plan and generates security recommendations based on its findings. To harden your App Service resources, use the detailed instructions in these recommendations.
43
43
44
44
-**Detect** - Defender for App Service detects a multitude of threats to your App Service resources by monitoring:
45
45
- the VM instance in which your App Service is running, and its management interface
@@ -65,7 +65,7 @@ Defender for Cloud monitors for many threats to your App Service resources. The
65
65
66
66
### Dangling DNS detection
67
67
68
-
Defender for App Service also identifies any DNS entries remaining in your DNS registrar when an App Service website is decommissioned - these are known as dangling DNS entries. When you remove a website and don't remove its custom domain from your DNS registrar, the DNS entry is pointing to a non-existent resource, and your subdomain is vulnerable to a takeover. Defender for Cloud doesn't scan your DNS registrar for *existing* dangling DNS entries; it alerts you when an App Service website is decommissioned and its custom domain (DNS entry) isn't deleted.
68
+
Defender for App Service also identifies any DNS entries remaining in your DNS registrar when an App Service website is decommissioned - these are known as dangling DNS entries. When you remove a website and don't remove its custom domain from your DNS registrar, the DNS entry is pointing to a nonexistent resource, and your subdomain is vulnerable to a takeover. Defender for Cloud doesn't scan your DNS registrar for *existing* dangling DNS entries; it alerts you when an App Service website is decommissioned and its custom domain (DNS entry) isn't deleted.
69
69
70
70
Subdomain takeovers are a common, high-severity threat for organizations. When a threat actor detects a dangling DNS entry, they create their own site at the destination address. The traffic intended for the organization’s domain is then directed to the threat actor's site, and they can use that traffic for a wide range of malicious activity.
71
71
@@ -89,6 +89,6 @@ In this article, you learned about Microsoft Defender for App Service.
89
89
90
90
For related material, see the following articles:
91
91
92
-
- To export your alerts to Microsoft Sentinel, any third-party SIEM, or any other external tool, follow the instructions in [Stream alerts to a SIEM, SOAR, or IT Service Management solution](export-to-siem.md).
92
+
- To export your alerts to Microsoft Sentinel, any third-party SIEM, or any other external tool, follow the instructions in [Stream alerts to monitoring solutions](export-to-siem.md).
93
93
- For a list of the Microsoft Defender for App Service alerts, see the [Reference table of alerts](alerts-reference.md#alerts-for-azure-app-service).
94
94
- For more information on App Service plans, see [App Service plans](https://azure.microsoft.com/pricing/details/app-service/plans/).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-devops-introduction.md
+9-11Lines changed: 9 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
---
2
2
title: Microsoft Defender for Cloud DevOps security - the benefits and features
3
-
description: Learn about the benefits and features of Microsoft DevOps security
4
-
ms.date: 01/24/2023
3
+
description: Learn about the benefits and features of Microsoft DevOps security.
4
+
ms.date: 03/11/2024
5
5
ms.topic: overview
6
6
ms.custom: references_regions
7
7
---
8
8
9
-
# Overview of Microsoft Defender for Cloud DevOps Security
9
+
# Overview of Microsoft Defender for Cloud DevOps security
10
10
11
11
Microsoft Defender for Cloud enables comprehensive visibility, posture management, and threat protection across multicloud environments including Azure, AWS, GCP, and on-premises resources.
12
12
@@ -40,7 +40,7 @@ Here, you can add [Azure DevOps](quickstart-onboard-devops.md), [GitHub](quickst
40
40
41
41
The DevOps inventory table allows you to review onboarded DevOps resources and the security information related to them.
42
42
43
-
:::image type="content" source="media/defender-for-devops-introduction/inventory-grid.png" alt-text="Screenshot of the devops inventory table on the DevOps security overview page." lightbox="media/defender-for-devops-introduction/bottom-of-page.png":::
43
+
:::image type="content" source="media/defender-for-devops-introduction/inventory-grid.png" alt-text="Screenshot that shows the Devops inventory table on the DevOps security overview page." lightbox="media/defender-for-devops-introduction/bottom-of-page.png":::
44
44
45
45
On this part of the screen you see:
46
46
@@ -67,7 +67,7 @@ On this part of the screen you see:
67
67
68
68
-**Findings** - Shows the total number of code, secrets, dependency, and infrastructure-as-code findings identified in the DevOps resource.
69
69
70
-
This table can be viewed as a flat view at the DevOps resource level (repositories for Azure DevOps and GitHub, projects for GitLab) or in a grouping view showing organizations/projects/groups hierarchy. Also, the table can be filtered by subscription, resource type, finding type, or severity.
70
+
This table can be viewed as a flat view at the DevOps resource level (repositories for Azure DevOps and GitHub, projects for GitLab) or in a grouping view showing organizations/projects/groups hierarchy. Also, you can filter the table by subscription, resource type, finding type, or severity.
71
71
72
72
## Learn more
73
73
@@ -77,12 +77,10 @@ This table can be viewed as a flat view at the DevOps resource level (repositori
77
77
78
78
- You can learn about [securing Azure Pipelines](/azure/devops/pipelines/security/overview).
79
79
80
-
- Learn about [security hardening practices for GitHub Actions](https://docs.github.com/actions/security-guides/security-hardening-for-github-actions).
80
+
- Learn about [security hardening practices for GitHub actions](https://docs.github.com/actions/security-guides/security-hardening-for-github-actions).
81
81
82
82
## Next steps
83
83
84
-
[Connect your Azure DevOps organizations](quickstart-onboard-devops.md).
85
-
86
-
[Connect your GitHub organizations](quickstart-onboard-github.md).
87
-
88
-
[Connect your GitLab groups](quickstart-onboard-gitlab.md).
84
+
-[Connect your Azure DevOps organizations](quickstart-onboard-devops.md).
85
+
-[Connect your GitHub organizations](quickstart-onboard-github.md).
86
+
-[Connect your GitLab groups](quickstart-onboard-gitlab.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-dns-introduction.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Microsoft Defender for DNS - the benefits and features
3
-
description: Learn about the benefits and features of Microsoft Defender for DNS
4
-
ms.date: 01/10/2023
3
+
description: Learn about the benefits and features of Microsoft Defender for DNS.
4
+
ms.date: 03/11/2024
5
5
ms.topic: overview
6
6
ms.author: dacurwin
7
7
author: dcurwin
@@ -11,9 +11,9 @@ author: dcurwin
11
11
12
12
[!INCLUDE [Defender for DNS note](./includes/defender-for-dns-note.md)]
13
13
14
-
Microsoft Defender for DNS provides an additional layer of protection for resources that use Azure DNS's [Azure-provided name resolution](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#azure-provided-name-resolution) capability.
14
+
Microsoft Defender for DNS provides another layer of protection for resources that use Azure DNS's [Azure-provided name resolution](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#azure-provided-name-resolution) capability.
15
15
16
-
From within Azure DNS, Defender for DNS monitors the queries from these resources and detects suspicious activities without the need for any additional agents on your resources.
16
+
From within Azure DNS, Defender for DNS monitors the queries from these resources and detects suspicious activities without the need for any extra agents on your resources.
0 commit comments