You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/other-threat-protections.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
-
title: Additional threat protections from Microsoft Defender for Cloud
2
+
title: Other threat protections from Microsoft Defender for Cloud
3
3
description: Learn about the threat protections available from Microsoft Defender for Cloud
4
4
ms.topic: overview
5
-
ms.date: 12/05/2022
5
+
ms.date: 01/08/2023
6
6
---
7
-
# Additional threat protections in Microsoft Defender for Cloud
7
+
# Other threat protections in Microsoft Defender for Cloud
8
8
9
9
In addition to its built-in [advanced protection plans](defender-for-cloud-introduction.md), Microsoft Defender for Cloud also offers the following threat protection capabilities.
10
10
@@ -14,7 +14,7 @@ In addition to its built-in [advanced protection plans](defender-for-cloud-intro
14
14
<aname="network-layer"></a>
15
15
16
16
## Threat protection for Azure network layer
17
-
Defender for Cloud network-layer analytics are based on sample [IPFIX data](https://en.wikipedia.org/wiki/IP_Flow_Information_Export), which are packet headers collected by Azure core routers. Based on this data feed, Defender for Cloud uses machine learning models to identify and flag malicious traffic activities. Defender for Cloud also uses the Microsoft Threat Intelligence database to enrich IP addresses.
17
+
Defenders for Cloud network-layer analytics are based on sample [IPFIX data](https://en.wikipedia.org/wiki/IP_Flow_Information_Export), which are packet headers collected by Azure core routers. Based on this data feed, Defender for Cloud uses machine learning models to identify and flag malicious traffic activities. Defender for Cloud also uses the Microsoft Threat Intelligence database to enrich IP addresses.
18
18
19
19
Some network configurations restrict Defender for Cloud from generating alerts on suspicious network activity. For Defender for Cloud to generate network alerts, ensure that:
20
20
@@ -29,7 +29,7 @@ For a list of the Azure network layer alerts, see the [Reference table of alerts
29
29
30
30
Microsoft Defender for Cloud Apps (formerly known as Microsoft Cloud App Security) is a cloud access security broker (CASB) that supports various deployment modes including log collection, API connectors, and reverse proxy. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your Microsoft and third-party cloud services.
31
31
32
-
If you've enabled Microsoft Defender for Cloud Apps, and selected the integration from within Defender for Cloud's settings, your hardening recommendations from Defender for Cloud will appear in Defender for Cloud Apps with no additional configuration needed.
32
+
Once Microsoft Defender for Cloud Apps has been enabled, you can then select the integration from within Defender for Cloud's settings. Your hardened recommendations from Defender for Cloud will appear in Defender for Cloud Apps with no other configuration needed.
33
33
34
34
> [!NOTE]
35
35
> Defender for Cloud stores security-related customer data in the same geo as its resource. If Microsoft hasn't yet deployed Defender for Cloud in the resource's geo, then it stores the data in the United States. When Microsoft Defender for Cloud Apps is enabled, this information is stored in accordance with the geo location rules of Microsoft Defender for Cloud Apps. For more information, see [Data storage for non-regional services](https://azuredatacentermap.azurewebsites.net/).
@@ -47,7 +47,7 @@ Azure Application Gateway offers a web application firewall (WAF) that provides
47
47
48
48
Web applications are increasingly targeted by malicious attacks that exploit commonly known vulnerabilities. The Application Gateway WAF is based on Core Rule Set 3.0 or 2.2.9 from the Open Web Application Security Project. The WAF is updated automatically to protect against new vulnerabilities.
49
49
50
-
If you have created [WAF Security solution](partner-integration.md#add-data-sources), your WAF alerts are streamed to Defender for Cloud with no additional configurations. For more information on the alerts generated by WAF, see [Web application firewall CRS rule groups and rules](../web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md?tabs=owasp31#crs911-31).
50
+
If you have created [WAF Security solution](partner-integration.md#add-data-sources), your WAF alerts are streamed to Defender for Cloud with no other configurations. For more information on the alerts generated by WAF, see [Web application firewall CRS rule groups and rules](../web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md?tabs=owasp31#crs911-31).
51
51
52
52
> [!NOTE]
53
53
> Only WAF v1 is supported and will work with Microsoft Defender for Cloud.
@@ -60,11 +60,11 @@ Distributed denial of service (DDoS) attacks are known to be easy to execute. Th
60
60
61
61
To defend against DDoS attacks, purchase a license for Azure DDoS Protection and ensure you're following application design best practices. DDoS Protection provides different service tiers. For more information, see [Azure DDoS Protection overview](../ddos-protection/ddos-protection-overview.md).
62
62
63
-
If you have Azure DDoS Protection enabled, your DDoS alerts are streamed to Defender for Cloud with no additional configuration needed. For more information on the alerts generated by DDoS Protection, see [Reference table of alerts](alerts-reference.md#alerts-azureddos).
63
+
If you have Azure DDoS Protection enabled, your DDoS alerts are streamed to Defender for Cloud with no other configuration needed. For more information on the alerts generated by DDoS Protection, see [Reference table of alerts](alerts-reference.md#alerts-azureddos).
[Microsoft Entra Permissions Management](../active-directory/cloud-infrastructure-entitlement-management/index.yml) is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility and control over permissions for any identity and any resource in Azure, AWS, and GCP.
67
+
[Microsoft Entra Permissions Management](../active-directory/cloud-infrastructure-entitlement-management/index.yml) is a cloud infrastructure entitlement management (CIEM) solution. Entra Permission Management provides comprehensive visibility and control over permissions for any identity and any resource in Azure, AWS, and GCP.
68
68
69
69
As part of the integration, each onboarded Azure subscription, AWS account, and GCP project give you a view of your [Permission Creep Index (PCI)](../active-directory/cloud-infrastructure-entitlement-management/ui-dashboard.md). The PCI is an aggregated metric that periodically evaluates the level of risk associated with the number of unused or excessive permissions across identities and resources. PCI measures how risky identities can potentially be, based on the permissions available to them.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/tutorial-protect-resources.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Access & application controls tutorial - Microsoft Defender for Cloud
3
3
description: This tutorial shows you how to configure a just-in-time VM access policy and an application control policy.
4
4
ms.topic: tutorial
5
5
ms.custom: mvc
6
-
ms.date: 11/09/2021
6
+
ms.date: 01/08/2023
7
7
8
8
---
9
9
# Tutorial: Protect your resources with Microsoft Defender for Cloud
@@ -22,7 +22,7 @@ To step through the features covered in this tutorial, you must have Defender fo
22
22
## Manage VM access
23
23
JIT VM access can be used to lock down inbound traffic to your Azure VMs, reducing exposure to attacks while providing easy access to connect to VMs when needed.
24
24
25
-
Management ports do not need to be open at all times. They only need to be open while you are connected to the VM, for example to perform management or maintenance tasks. When just-in-time is enabled, Defender for Cloud uses Network Security Group (NSG) rules, which restrict access to management ports so they cannot be targeted by attackers.
25
+
Management ports don't need to be open always. They only need to be open while you're connected to the VM, for example to perform management or maintenance tasks. When just-in-time is enabled, Defender for Cloud uses Network Security Group (NSG) rules, which restrict access to management ports so they can't be targeted by attackers.
26
26
27
27
Follow the guidance in [Secure your management ports with just-in-time access](just-in-time-access-usage.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/tutorial-security-incident.md
+9-6Lines changed: 9 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,14 +4,14 @@ description: In this tutorial, you'll learn how to triage security alerts and de
4
4
ms.assetid: 181e3695-cbb8-4b4e-96e9-c4396754862f
5
5
ms.topic: tutorial
6
6
ms.custom: ignite-2022
7
-
ms.date: 11/09/2021
7
+
ms.date: 01/08/2023
8
8
---
9
9
10
10
# Tutorial: Triage, investigate, and respond to security alerts
11
11
12
12
Microsoft Defender for Cloud continuously analyzes your hybrid cloud workloads using advanced analytics and threat intelligence to alert you about potentially malicious activities in your cloud resources. You can also integrate alerts from other security products and services into Defender for Cloud. Once an alert is raised, swift action is needed to investigate and remediate the potential security issue.
13
13
14
-
In this tutorial, you will learn how to:
14
+
In this tutorial, you'll learn how to:
15
15
16
16
> [!div class="checklist"]
17
17
> * Triage security alerts
@@ -21,7 +21,9 @@ In this tutorial, you will learn how to:
21
21
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/) before you begin.
22
22
23
23
## Prerequisites
24
-
To step through the features covered in this tutorial, you must have Defender for Cloud's enhanced security features enabled. You can try these at no cost. To learn more, see the [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/). The quickstart [Get started with Defender for Cloud](get-started.md) walks you through how to upgrade.
24
+
To step through the features covered in this tutorial, you must have Defender for Cloud's enhanced security features enabled. To learn more about Defender for Cloud's pricing, see the [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/).
25
+
26
+
The quickstart, [Get started with Defender for Cloud](get-started.md) walks you through the upgrade process.
25
27
26
28
27
29
## Triage security alerts
@@ -78,7 +80,7 @@ After you've investigated a security alert and understood its scope, you can res
78
80
79
81
:::image type="content" source="./media/tutorial-security-incident/set-status-dismissed.png" alt-text="Setting an alert's status":::
80
82
81
-
This removes the alert from the main alerts list. You can use the filter from the alerts list page to view all alerts with **Dismissed** status.
83
+
The alert is then removed from the main list of alerts. You can use the filter from the alerts list page to view all alerts with **Dismissed** status.
82
84
83
85
1. We encourage you to provide feedback about the alert to Microsoft:
84
86
1. Marking the alert as **Useful** or **Not useful**.
@@ -89,7 +91,7 @@ After you've investigated a security alert and understood its scope, you can res
89
91
> [!TIP]
90
92
> We review your feedback to improve our algorithms and provide better security alerts.
91
93
92
-
## End the tutorial
94
+
## CLean up resources
93
95
94
96
Other quickstarts and tutorials in this collection build upon this quickstart. If you plan to continue to work with subsequent quickstarts and tutorials, keep automatic provisioning and Defender for Cloud's enhanced security features enabled.
95
97
@@ -115,7 +117,8 @@ If you don't plan to continue, or you want to disable either of these features:
115
117
> Disabling extensions does not remove the Log Analytics agent from Azure VMs that already have the agent, but does limits security monitoring for your resources.
116
118
117
119
## Next steps
118
-
In this tutorial, you learned about Defender for Cloud features to be used when responding to a security alert. For related material see:
120
+
121
+
In this tutorial, you learned about Defender for Cloud features to be used when responding to a security alert. For related material, see:
119
122
120
123
-[Respond to Microsoft Defender for Key Vault alerts](defender-for-key-vault-usage.md)
121
124
-[Security alerts - a reference guide](alerts-reference.md)
0 commit comments