Skip to content

Commit ab6d59f

Browse files
Merge pull request #223265 from ElazarK/WI58488-freshness-batch1
freshness update
2 parents 1e4524c + 23f7789 commit ab6d59f

File tree

3 files changed

+19
-16
lines changed

3 files changed

+19
-16
lines changed

articles/defender-for-cloud/other-threat-protections.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
2-
title: Additional threat protections from Microsoft Defender for Cloud
2+
title: Other threat protections from Microsoft Defender for Cloud
33
description: Learn about the threat protections available from Microsoft Defender for Cloud
44
ms.topic: overview
5-
ms.date: 12/05/2022
5+
ms.date: 01/08/2023
66
---
7-
# Additional threat protections in Microsoft Defender for Cloud
7+
# Other threat protections in Microsoft Defender for Cloud
88

99
In addition to its built-in [advanced protection plans](defender-for-cloud-introduction.md), Microsoft Defender for Cloud also offers the following threat protection capabilities.
1010

@@ -14,7 +14,7 @@ In addition to its built-in [advanced protection plans](defender-for-cloud-intro
1414
<a name="network-layer"></a>
1515

1616
## Threat protection for Azure network layer
17-
Defender for Cloud network-layer analytics are based on sample [IPFIX data](https://en.wikipedia.org/wiki/IP_Flow_Information_Export), which are packet headers collected by Azure core routers. Based on this data feed, Defender for Cloud uses machine learning models to identify and flag malicious traffic activities. Defender for Cloud also uses the Microsoft Threat Intelligence database to enrich IP addresses.
17+
Defenders for Cloud network-layer analytics are based on sample [IPFIX data](https://en.wikipedia.org/wiki/IP_Flow_Information_Export), which are packet headers collected by Azure core routers. Based on this data feed, Defender for Cloud uses machine learning models to identify and flag malicious traffic activities. Defender for Cloud also uses the Microsoft Threat Intelligence database to enrich IP addresses.
1818

1919
Some network configurations restrict Defender for Cloud from generating alerts on suspicious network activity. For Defender for Cloud to generate network alerts, ensure that:
2020

@@ -29,7 +29,7 @@ For a list of the Azure network layer alerts, see the [Reference table of alerts
2929

3030
Microsoft Defender for Cloud Apps (formerly known as Microsoft Cloud App Security) is a cloud access security broker (CASB) that supports various deployment modes including log collection, API connectors, and reverse proxy. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your Microsoft and third-party cloud services.
3131

32-
If you've enabled Microsoft Defender for Cloud Apps, and selected the integration from within Defender for Cloud's settings, your hardening recommendations from Defender for Cloud will appear in Defender for Cloud Apps with no additional configuration needed.
32+
Once Microsoft Defender for Cloud Apps has been enabled, you can then select the integration from within Defender for Cloud's settings. Your hardened recommendations from Defender for Cloud will appear in Defender for Cloud Apps with no other configuration needed.
3333

3434
> [!NOTE]
3535
> Defender for Cloud stores security-related customer data in the same geo as its resource. If Microsoft hasn't yet deployed Defender for Cloud in the resource's geo, then it stores the data in the United States. When Microsoft Defender for Cloud Apps is enabled, this information is stored in accordance with the geo location rules of Microsoft Defender for Cloud Apps. For more information, see [Data storage for non-regional services](https://azuredatacentermap.azurewebsites.net/).
@@ -47,7 +47,7 @@ Azure Application Gateway offers a web application firewall (WAF) that provides
4747

4848
Web applications are increasingly targeted by malicious attacks that exploit commonly known vulnerabilities. The Application Gateway WAF is based on Core Rule Set 3.0 or 2.2.9 from the Open Web Application Security Project. The WAF is updated automatically to protect against new vulnerabilities.
4949

50-
If you have created [WAF Security solution](partner-integration.md#add-data-sources), your WAF alerts are streamed to Defender for Cloud with no additional configurations. For more information on the alerts generated by WAF, see [Web application firewall CRS rule groups and rules](../web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md?tabs=owasp31#crs911-31).
50+
If you have created [WAF Security solution](partner-integration.md#add-data-sources), your WAF alerts are streamed to Defender for Cloud with no other configurations. For more information on the alerts generated by WAF, see [Web application firewall CRS rule groups and rules](../web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md?tabs=owasp31#crs911-31).
5151

5252
> [!NOTE]
5353
> Only WAF v1 is supported and will work with Microsoft Defender for Cloud.
@@ -60,11 +60,11 @@ Distributed denial of service (DDoS) attacks are known to be easy to execute. Th
6060

6161
To defend against DDoS attacks, purchase a license for Azure DDoS Protection and ensure you're following application design best practices. DDoS Protection provides different service tiers. For more information, see [Azure DDoS Protection overview](../ddos-protection/ddos-protection-overview.md).
6262

63-
If you have Azure DDoS Protection enabled, your DDoS alerts are streamed to Defender for Cloud with no additional configuration needed. For more information on the alerts generated by DDoS Protection, see [Reference table of alerts](alerts-reference.md#alerts-azureddos).
63+
If you have Azure DDoS Protection enabled, your DDoS alerts are streamed to Defender for Cloud with no other configuration needed. For more information on the alerts generated by DDoS Protection, see [Reference table of alerts](alerts-reference.md#alerts-azureddos).
6464

6565
## Entra Permission Management (formerly Cloudknox)
6666

67-
[Microsoft Entra Permissions Management](../active-directory/cloud-infrastructure-entitlement-management/index.yml) is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility and control over permissions for any identity and any resource in Azure, AWS, and GCP.
67+
[Microsoft Entra Permissions Management](../active-directory/cloud-infrastructure-entitlement-management/index.yml) is a cloud infrastructure entitlement management (CIEM) solution. Entra Permission Management provides comprehensive visibility and control over permissions for any identity and any resource in Azure, AWS, and GCP.
6868

6969
As part of the integration, each onboarded Azure subscription, AWS account, and GCP project give you a view of your [Permission Creep Index (PCI)](../active-directory/cloud-infrastructure-entitlement-management/ui-dashboard.md). The PCI is an aggregated metric that periodically evaluates the level of risk associated with the number of unused or excessive permissions across identities and resources. PCI measures how risky identities can potentially be, based on the permissions available to them.
7070

articles/defender-for-cloud/tutorial-protect-resources.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Access & application controls tutorial - Microsoft Defender for Cloud
33
description: This tutorial shows you how to configure a just-in-time VM access policy and an application control policy.
44
ms.topic: tutorial
55
ms.custom: mvc
6-
ms.date: 11/09/2021
6+
ms.date: 01/08/2023
77

88
---
99
# Tutorial: Protect your resources with Microsoft Defender for Cloud
@@ -22,7 +22,7 @@ To step through the features covered in this tutorial, you must have Defender fo
2222
## Manage VM access
2323
JIT VM access can be used to lock down inbound traffic to your Azure VMs, reducing exposure to attacks while providing easy access to connect to VMs when needed.
2424

25-
Management ports do not need to be open at all times. They only need to be open while you are connected to the VM, for example to perform management or maintenance tasks. When just-in-time is enabled, Defender for Cloud uses Network Security Group (NSG) rules, which restrict access to management ports so they cannot be targeted by attackers.
25+
Management ports don't need to be open always. They only need to be open while you're connected to the VM, for example to perform management or maintenance tasks. When just-in-time is enabled, Defender for Cloud uses Network Security Group (NSG) rules, which restrict access to management ports so they can't be targeted by attackers.
2626

2727
Follow the guidance in [Secure your management ports with just-in-time access](just-in-time-access-usage.md).
2828

articles/defender-for-cloud/tutorial-security-incident.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,14 @@ description: In this tutorial, you'll learn how to triage security alerts and de
44
ms.assetid: 181e3695-cbb8-4b4e-96e9-c4396754862f
55
ms.topic: tutorial
66
ms.custom: ignite-2022
7-
ms.date: 11/09/2021
7+
ms.date: 01/08/2023
88
---
99

1010
# Tutorial: Triage, investigate, and respond to security alerts
1111

1212
Microsoft Defender for Cloud continuously analyzes your hybrid cloud workloads using advanced analytics and threat intelligence to alert you about potentially malicious activities in your cloud resources. You can also integrate alerts from other security products and services into Defender for Cloud. Once an alert is raised, swift action is needed to investigate and remediate the potential security issue.
1313

14-
In this tutorial, you will learn how to:
14+
In this tutorial, you'll learn how to:
1515

1616
> [!div class="checklist"]
1717
> * Triage security alerts
@@ -21,7 +21,9 @@ In this tutorial, you will learn how to:
2121
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/) before you begin.
2222

2323
## Prerequisites
24-
To step through the features covered in this tutorial, you must have Defender for Cloud's enhanced security features enabled. You can try these at no cost. To learn more, see the [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/). The quickstart [Get started with Defender for Cloud](get-started.md) walks you through how to upgrade.
24+
To step through the features covered in this tutorial, you must have Defender for Cloud's enhanced security features enabled. To learn more about Defender for Cloud's pricing, see the [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/).
25+
26+
The quickstart, [Get started with Defender for Cloud](get-started.md) walks you through the upgrade process.
2527

2628

2729
## Triage security alerts
@@ -78,7 +80,7 @@ After you've investigated a security alert and understood its scope, you can res
7880

7981
:::image type="content" source="./media/tutorial-security-incident/set-status-dismissed.png" alt-text="Setting an alert's status":::
8082

81-
This removes the alert from the main alerts list. You can use the filter from the alerts list page to view all alerts with **Dismissed** status.
83+
The alert is then removed from the main list of alerts. You can use the filter from the alerts list page to view all alerts with **Dismissed** status.
8284

8385
1. We encourage you to provide feedback about the alert to Microsoft:
8486
1. Marking the alert as **Useful** or **Not useful**.
@@ -89,7 +91,7 @@ After you've investigated a security alert and understood its scope, you can res
8991
> [!TIP]
9092
> We review your feedback to improve our algorithms and provide better security alerts.
9193

92-
## End the tutorial
94+
## CLean up resources
9395

9496
Other quickstarts and tutorials in this collection build upon this quickstart. If you plan to continue to work with subsequent quickstarts and tutorials, keep automatic provisioning and Defender for Cloud's enhanced security features enabled.
9597

@@ -115,7 +117,8 @@ If you don't plan to continue, or you want to disable either of these features:
115117
> Disabling extensions does not remove the Log Analytics agent from Azure VMs that already have the agent, but does limits security monitoring for your resources.
116118
117119
## Next steps
118-
In this tutorial, you learned about Defender for Cloud features to be used when responding to a security alert. For related material see:
120+
121+
In this tutorial, you learned about Defender for Cloud features to be used when responding to a security alert. For related material, see:
119122

120123
- [Respond to Microsoft Defender for Key Vault alerts](defender-for-key-vault-usage.md)
121124
- [Security alerts - a reference guide](alerts-reference.md)

0 commit comments

Comments
 (0)