You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/adaptive-application-controls.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This document helps you use adaptive application control in Microso
4
4
author: dcurwin
5
5
ms.author: dacurwin
6
6
ms.topic: how-to
7
-
ms.date: 06/14/2023
7
+
ms.date: 08/09/2023
8
8
9
9
---
10
10
# Use adaptive application controls to reduce your machines' attack surfaces
@@ -114,14 +114,16 @@ To edit the rules for a group of machines:
114
114
115
115

116
116
117
-
1. If you're defining a known safe path, change the **Rule type** to 'Path' and enter a single path. You can include wildcards in the path.
118
-
117
+
1. If you're defining a known safe path, change the **Rule type** to 'Path' and enter a single path. You can include wildcards in the path. The following screens show some examples of how to use wildcards.
118
+
119
+
:::image type="content" source="media/adaptive-application/wildcard-examples.png" alt-text="Screenshot that shows examples of using wildcards." lightbox="media/adaptive-application/wildcard-examples.png":::
120
+
119
121
> [!TIP]
120
122
> Some scenarios for which wildcards in a path might be useful:
121
123
>
122
124
> - Using a wildcard at the end of a path to allow all executables within this folder and sub-folders.
123
125
> - Using a wildcard in the middle of a path to enable a known executable name with a changing folder name (for example, personal user folders containing a known executable, automatically generated folder names, etc).
124
-
126
+
125
127
1. Define the allowed users and protected file types.
126
128
127
129
1. When you've finished defining the rule, select **Add**.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/secret-scanning.md
+21-12Lines changed: 21 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,24 +1,24 @@
1
1
---
2
-
title: Manage secrets with agentless secret scanning
2
+
title: Manage secrets with agentless secret scanning (preview)
3
3
description: Learn how to scan your servers for secrets with Defender for Server's agentless secret scanning.
4
4
ms.topic: overview
5
-
ms.date: 07/18/2023
5
+
ms.date: 08/15/2023
6
6
---
7
7
8
-
# Manage secrets with agentless secret scanning
8
+
# Manage secrets with agentless secret scanning (preview)
9
9
10
10
Attackers can move laterally across networks, find sensitive data, and exploit vulnerabilities to damage critical information systems by accessing internet-facing workloads and exploiting exposed credentials and secrets.
11
11
12
12
Defender for Cloud's agentless secret scanning for Virtual Machines (VM) locates plaintext secrets that exist in your environment. If secrets are detected, Defender for Cloud can assist your security team to prioritize and take actionable remediation steps to minimize the risk of lateral movement, all without affecting your machine's performance.
13
13
14
14
By using agentless secret scanning, you can proactively discover the following types of secrets across your environments:
15
15
16
-
-**Insecure SSH private keys** - supports RSA algorithm for PuTTy files, PKCS#8 and PKCS#1 standards
In addition to detecting SSH private keys, the agentless scanner verifies whether they can be used to move laterally in the network. Keys that we didn't successfully verify are categorized as **unverified** in the **Recommendation** pane.
24
24
@@ -68,6 +68,12 @@ Agentless secret scanning for AWS instances supports the following attack path s
68
68
69
69
-`Vulnerable EC2 instance has insecure secrets that are used to authenticate to an AWS RDS server`.
70
70
71
+
### GCP instances supported attack path scenarios
72
+
73
+
Agentless secret scanning for GCP VM instances supports the following attack path scenarios:
74
+
75
+
-`Exposed Vulnerable GCP VM instance has an insecure SSH private key that is used to authenticate to a GCP VM instance`.
76
+
71
77
**To investigate secrets with Attack path**:
72
78
73
79
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -88,6 +94,8 @@ If a secret is found on your resource, that resource triggers an affiliated reco
88
94
89
95
-**AWS resources**: `EC2 instances should have secret findings resolved`
90
96
97
+
-**GCP resources**: `VM instances should have secret findings resolved`
98
+
91
99
**To remediate secrets from the recommendations page**:
92
100
93
101
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -101,6 +109,7 @@ If a secret is found on your resource, that resource triggers an affiliated reco
101
109
-**Azure resources**: `Machines should have secrets findings resolved`
102
110
103
111
-**AWS resources**: `EC2 instances should have secret findings resolved`
112
+
-**GCP resources**: `VM instances should have secret findings resolved`
104
113
105
114
:::image type="content" source="media/secret-scanning/recommendation-findings.png" alt-text="Screenshot that shows either of the two results under the Remediate vulnerabilities security control." lightbox="media/secret-scanning/recommendation-findings.png":::
106
115
@@ -130,9 +139,9 @@ The [cloud security explorer](concept-attack-path.md#what-is-cloud-security-expl
130
139
131
140
1. Select one of the following templates:
132
141
133
-
-**VM with plaintext secret that can authenticate to another VM** - Returns all Azure VMs or AWS EC2 instances with plaintext secret that can access other VMs or EC2s.
134
-
-**VM with plaintext secret that can authenticate to a storage account** - Returns all Azure VMs or AWS EC2 instances with plaintext secret that can access storage accounts.
135
-
-**VM with plaintext secret that can authenticate to a SQL database** - Returns all Azure VMs or AWS EC2 instances with plaintext secret that can access SQL databases.
142
+
-**VM with plaintext secret that can authenticate to another VM** - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access other VMs or EC2s.
143
+
-**VM with plaintext secret that can authenticate to a storage account** - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access storage accounts.
144
+
-**VM with plaintext secret that can authenticate to a SQL database** - Returns all Azure VMs, AWS EC2 instances, or GCP VM instances with plaintext secret that can access SQL databases.
136
145
137
146
If you don't want to use any of the available templates, you can also [build your own query](how-to-manage-cloud-security-explorer.md) on the cloud security explorer.
@@ -817,11 +817,11 @@ Use [az group delete](/cli/azure/group#az-group-delete) to remove the resource g
817
817
818
818
```azurecli-interactive
819
819
# Delete the resource group and all the resources it contains.
820
-
az group delete --name myResourceGroup --yes --no-wait
820
+
az group delete --name 'myResourceGroup' --yes --no-wait
821
821
```
822
822
823
823
---
824
824
825
825
## Next steps
826
826
- To learn about other Network Watcher tools, see [Azure Network Watcher overview](network-watcher-monitoring-overview.md).
827
-
- To learn how to troubleshoot virtual machine routing problems, see [Diagnose a virtual machine network routing problem](diagnose-vm-network-routing-problem.md).
827
+
- To learn how to troubleshoot virtual machine routing problems, see [Diagnose a virtual machine network routing problem](diagnose-vm-network-routing-problem.md).
Copy file name to clipboardExpand all lines: articles/reliability/includes/reliability-recommendations-include.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@
10
10
---
11
11
12
12
13
-
This section contains recommendations for achieving resiliency and availability for your Azure Virtual Machines. All recommendations fall into one of two categories:
13
+
This section contains recommendations for achieving resiliency and availability. Each recommendation falls into one of two categories:
14
14
15
15
-**Health items** cover areas such as configuration items and the proper function of the major components that make up your Azure Workload, such as Azure Resource configuration settings, dependencies on other services, and so on.
Copy file name to clipboardExpand all lines: articles/vpn-gateway/bgp-howto.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.author: cherylmc
11
11
---
12
12
# How to configure BGP for Azure VPN Gateway
13
13
14
-
This article helps you enable BGP on cross-premises site-to-site (S2S) VPN connections and VNet-to-VNet connections using the Azure portal. This article helps you enable BGP on cross-premises site-to-site (S2S) VPN connections and VNet-to-VNet connections using Azure PowerShell. You can also create this configuration using the [Azure portal](bgp-howto.md) or [PowerShell](vpn-gateway-bgp-resource-manager-ps.md) steps.
14
+
This article helps you enable BGP on cross-premises site-to-site (S2S) VPN connections and VNet-to-VNet connections using the Azure portal. You can also create this configuration using the [Azure CLI](bgp-how-to-cli.md) or [PowerShell](vpn-gateway-bgp-resource-manager-ps.md) steps.
15
15
16
16
BGP is the standard routing protocol commonly used in the Internet to exchange routing and reachability information between two or more networks. BGP enables the VPN gateways and your on-premises VPN devices, called BGP peers or neighbors, to exchange "routes" that will inform both gateways on the availability and reachability for those prefixes to go through the gateways or routers involved. BGP can also enable transit routing among multiple networks by propagating routes a BGP gateway learns from one BGP peer to all other BGP peers.
17
17
@@ -155,15 +155,15 @@ In this step, you create a new connection that has BGP enabled. If you already h
155
155
#### To create a connection
156
156
157
157
1. To create a new connection, go to your virtual network gateway **Connections** page.
158
-
1.Click**+Add** to open the **Add a connection page**.
158
+
1.Select**+Add** to open the **Add a connection page**.
159
159
1. Fill in the necessary values.
160
160
1. Select **Enable BGP** to enable BGP on this connection.
161
-
1.Click**OK** to save changes.
161
+
1.Select**OK** to save changes.
162
162
163
163
#### To update an existing connection
164
164
165
165
1. Go to your virtual network gateway **Connections** page.
166
-
1.Click the connection you want to modify.
166
+
1.Select the connection you want to modify.
167
167
1. Go to the **Configuration** page for the connection.
0 commit comments