Skip to content

Commit ae1b42a

Browse files
author
your name
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into yelevin/sap-incident-response-playbooks
2 parents 41578fa + 34918ad commit ae1b42a

29 files changed

+586
-120
lines changed

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 225 additions & 0 deletions
Large diffs are not rendered by default.

articles/defender-for-cloud/TOC.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -39,13 +39,13 @@
3939
- name: Connect your hybrid and multicloud environments
4040
expanded: false
4141
items:
42-
- name: Connect your on-premises machine
42+
- name: Connect your on-premises machines
4343
displayName: azure stack, ash, windows, linux, hybrid, arc, on-premises
4444
href: quickstart-onboard-machines.md
45-
- name: Connect your AWS account
45+
- name: Connect your AWS accounts
4646
displayName: hybrid, multicloud, multicloud, amazon, arc, AWS, accounts
4747
href: quickstart-onboard-aws.md
48-
- name: Connect your GCP project
48+
- name: Connect your GCP projects
4949
displayName: hybrid, multicloud, multicloud, google, gcp
5050
href: quickstart-onboard-gcp.md
5151
- name: Connect non-Azure machines with Defender for Endpoint
@@ -60,7 +60,7 @@
6060
- name: Protect your resources with Defender CSPM
6161
displayName: CSPM, cloud security posture management, enable
6262
href: tutorial-enable-cspm-plan.md
63-
- name: Protect servers with Defender for Servers
63+
- name: Protect your servers with Defender for Servers
6464
displayName: servers, server, enable
6565
href: tutorial-enable-servers-plan.md
6666
- name: Protect your applications with Defender for App Service
@@ -69,20 +69,20 @@
6969
- name: Protect your databases with Defender for Databases
7070
displayName: Databases, Cosmos, DB, SQL servers, Azure SQL, SQL, Open-source relational databases
7171
href: tutorial-enable-databases-plan.md
72-
- name: Protect your storage with Defender for Storage
72+
- name: Protect your storage accounts with Defender for Storage
7373
displayName: storage, enable
7474
href: tutorial-enable-storage-plan.md
7575
- name: Protect containers with Defender for Containers
7676
items:
7777
- name: Protect your Azure containers (AKS)
7878
href: tutorial-enable-containers-azure.md
79-
- name: Protect your on-premises and IaaS (ARC) devices
79+
- name: Protect your on-premises and IaaS (Arc) devices
8080
href: tutorial-enable-containers-arc.md
8181
- name: Protect your Amazon Web Service (AWS) accounts containers
8282
href: tutorial-enable-container-aws.md
8383
- name: Protect your Google Cloud Platform (GCP) project containers
8484
href: tutorial-enable-container-gcp.md
85-
- name: Protect your key vault with Defender for Key Vault
85+
- name: Protect your key vaults with Defender for Key Vault
8686
displayName: enable, key, vault, key vault
8787
href: tutorial-enable-key-vault-plan.md
8888
- name: Protect your Domain Name System (DNS) with Defender for DNS

articles/defender-for-cloud/alert-validation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ You can simulate alerts for both of the control plane, and workload alerts with
9898
**Prerequisites**
9999

100100
- Ensure the Defender for Containers plan is enabled.
101-
- **ARC only** - Ensure the Defender extension is installed.
101+
- **Arc only** - Ensure the Defender extension is installed.
102102
- **EKS or GKE only** - Ensure the default audit log collection autoprovisioning options are enabled.
103103

104104
**To simulate a Kubernetes control plane security alert**:

articles/defender-for-cloud/includes/defender-for-containers-assign-workspace-arc.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -26,27 +26,27 @@ When you enable the auto-provision option, a default workspace will be automatic
2626

2727
1. Search for, and select **Policy**.
2828

29-
:::image type="content" source="../media/defender-for-containers/find-policy.png" alt-text="Screenshot that shows how to locate the policy page for ARC." lightbox="../media/defender-for-containers/find-policy.png":::
29+
:::image type="content" source="../media/defender-for-containers/find-policy.png" alt-text="Screenshot that shows how to locate the policy page for Arc." lightbox="../media/defender-for-containers/find-policy.png":::
3030

3131
1. Select **Definitions**.
3232

3333
1. Search for policy ID `708b60a6-d253-4fe0-9114-4be4c00f012c`.
3434

35-
:::image type="content" source="../media/defender-for-containers/policy-search-arc.png" alt-text="Screenshot that shows where to search for the policy by ID number for ARC." lightbox="../media/defender-for-containers/policy-search-arc.png":::
35+
:::image type="content" source="../media/defender-for-containers/policy-search-arc.png" alt-text="Screenshot that shows where to search for the policy by ID number for Arc." lightbox="../media/defender-for-containers/policy-search-arc.png":::
3636

3737
1. Select **Configure Azure Arc enabled Kubernetes clusters to install Microsoft Defender for Cloud extension.**.
3838

3939
1. Select **Assignments**.
4040

41-
:::image type="content" source="../media/defender-for-containers/assignments-tab-arc.png" alt-text="Screenshot that shows where the assignments tab is for ARC." lightbox="../media/defender-for-containers/assignments-tab-arc.png":::
41+
:::image type="content" source="../media/defender-for-containers/assignments-tab-arc.png" alt-text="Screenshot that shows where the assignments tab is for Arc." lightbox="../media/defender-for-containers/assignments-tab-arc.png":::
4242

4343
1. Follow the [Create a new assignment with custom workspace](#create-a-new-assignment-with-custom-workspace) steps if the policy hasn't yet been assigned to the relevant scope. Or, follow the [Update assignment with custom workspace](#update-assignment-with-custom-workspace) steps if the policy is already assigned and you want to change it to use a custom workspace.
4444

4545
#### Create a new assignment with custom workspace
4646

4747
If the policy hasn't been assigned, you'll see `Assignments (0)`.
4848

49-
:::image type="content" source="../media/defender-for-containers/no-assignment-arc.png" alt-text="Screenshot showing that no workspace has been assigned for ARC." lightbox="../media/defender-for-containers/no-assignment-arc.png":::
49+
:::image type="content" source="../media/defender-for-containers/no-assignment-arc.png" alt-text="Screenshot showing that no workspace has been assigned for Arc." lightbox="../media/defender-for-containers/no-assignment-arc.png":::
5050

5151
**To assign custom workspace**:
5252

@@ -56,7 +56,7 @@ If the policy hasn't been assigned, you'll see `Assignments (0)`.
5656

5757
1. Select a LogAnalyticsWorkspaceResource ID from the dropdown menu.
5858

59-
:::image type="content" source="../media/defender-for-containers/drop-down-menu-arc.png" alt-text="Screenshot showing where the dropdown menu is located for ARC." lightbox="../media/defender-for-containers/drop-down-menu-arc.png":::
59+
:::image type="content" source="../media/defender-for-containers/drop-down-menu-arc.png" alt-text="Screenshot showing where the dropdown menu is located for Arc." lightbox="../media/defender-for-containers/drop-down-menu-arc.png":::
6060

6161
1. Select **Review + create**.
6262

@@ -69,21 +69,21 @@ If the policy has already been assigned to a workspace, you'll see `Assignments
6969
> [!NOTE]
7070
> If you have more than one subscription the number may be higher. If you have a number 1 or higher, the assignment may still not be on the relevant scope. If this is the case, you will want to follow the [Create a new assignment with custom workspace](#create-a-new-assignment-with-custom-workspace) steps.
7171
72-
:::image type="content" source="../media/defender-for-containers/already-assigned-arc.png" alt-text="Screenshot that shows Assignment (1), meaning a workspace has already been assigned for ARC." lightbox="../media/defender-for-containers/already-assigned-arc.png":::
72+
:::image type="content" source="../media/defender-for-containers/already-assigned-arc.png" alt-text="Screenshot that shows Assignment (1), meaning a workspace has already been assigned for Arc." lightbox="../media/defender-for-containers/already-assigned-arc.png":::
7373

7474
**To assign custom workspace**:
7575

7676
1. Select the relevant assignment.
7777

78-
:::image type="content" source="../media/defender-for-containers/relevant-assignment-arc.png" alt-text="Screenshot that shows where to select the relevant assignment from for ARC." lightbox="../media/defender-for-containers/relevant-assignment-arc.png":::
78+
:::image type="content" source="../media/defender-for-containers/relevant-assignment-arc.png" alt-text="Screenshot that shows where to select the relevant assignment from for Arc." lightbox="../media/defender-for-containers/relevant-assignment-arc.png":::
7979

8080
1. Select **Edit assignment**.
8181

8282
1. In the **Parameters** tab, deselect the **Only show parameters that need input or review** option.
8383

8484
1. Select a LogAnalyticsWorkspaceResource ID from the dropdown menu.
8585

86-
:::image type="content" source="../media/defender-for-containers/drop-down-menu-arc.png" alt-text="Screenshot showing where the dropdown menu is located for ARC." lightbox="../media/defender-for-containers/drop-down-menu-arc.png":::
86+
:::image type="content" source="../media/defender-for-containers/drop-down-menu-arc.png" alt-text="Screenshot showing where the dropdown menu is located for Arc." lightbox="../media/defender-for-containers/drop-down-menu-arc.png":::
8787

8888
1. Select **Review + save**.
8989

articles/defender-for-cloud/quickstart-onboard-aws.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ For a reference list of all the recommendations Defender for Cloud can provide f
128128
- (Optional) Select **Configure**, to edit the configuration as required.
129129

130130
> [!NOTE]
131-
> The respective Azure Arc servers for EC2 instances or GCP virtual machines that no longer exist (and the respective Azure Arc servers with a status of ["Disconnected" or "Expired"](/azure/azure-arc/servers/overview)) will be removed after 7 days. This process removes irrelevant Azure ARC entities, ensuring only Azure Arc servers related to existing instances are displayed.
131+
> The respective Azure Arc servers for EC2 instances or GCP virtual machines that no longer exist (and the respective Azure Arc servers with a status of ["Disconnected" or "Expired"](/azure/azure-arc/servers/overview)) will be removed after 7 days. This process removes irrelevant Azure Arc entities, ensuring only Azure Arc servers related to existing instances are displayed.
132132
133133
- By default the **Containers** plan is set to **On**. This is necessary to have Defender for Containers protect your AWS EKS clusters. Ensure you've fulfilled the [network requirements](./defender-for-containers-enable.md?pivots=defender-for-container-eks&source=docs&tabs=aks-deploy-portal%2ck8s-deploy-asc%2ck8s-verify-asc%2ck8s-remove-arc%2caks-removeprofile-api#network-requirements) for the Defender for Containers plan.
134134

articles/defender-for-cloud/quickstart-onboard-gcp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ To have full visibility to Microsoft Defender for Servers security content, ensu
110110
- **Manual installation** - You can manually connect your VM instances to Azure Arc for servers. Instances in projects with Defender for Servers plan enabled that aren't connected to Arc are surfaced by the recommendation `GCP VM instances should be connected to Azure Arc`. Select the **Fix** option in the recommendation to install Azure Arc on the selected machines.
111111

112112
> [!NOTE]
113-
> The respective Azure Arc servers for EC2 instances or GCP virtual machines that no longer exist (and the respective Azure Arc servers with a status of ["Disconnected" or "Expired"](/azure/azure-arc/servers/overview)) will be removed after 7 days. This process removes irrelevant Azure ARC entities, ensuring only Azure Arc servers related to existing instances are displayed.
113+
> The respective Azure Arc servers for EC2 instances or GCP virtual machines that no longer exist (and the respective Azure Arc servers with a status of ["Disconnected" or "Expired"](/azure/azure-arc/servers/overview)) will be removed after 7 days. This process removes irrelevant Azure Arc entities, ensuring only Azure Arc servers related to existing instances are displayed.
114114
115115
- Ensure you've fulfilled the [network requirements for Azure Arc](../azure-arc/servers/network-requirements.md?tabs=azure-cloud).
116116

articles/defender-for-cloud/quickstart-onboard-machines.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Connect your on-premises machine to Defender for Cloud
2+
title: Connect your on-premises machines to Defender for Cloud
33
description: Learn how to connect your on-premises machines to Microsoft Defender for Cloud
44
ms.topic: install-set-up-deploy
55
ms.date: 06/29/2023
66
ms.custom: mode-other
77
---
88

9-
# Connect your non-Azure machine to Microsoft Defender for Cloud
9+
# Connect your non-Azure machines to Microsoft Defender for Cloud
1010

1111
Defender for Cloud can monitor the security posture of your non-Azure computers, but first you need to connect them to Azure.
1212

articles/defender-for-cloud/tutorial-enable-app-service-plan.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.date: 06/29/2023
88

99
# Protect your applications with Defender for App Service
1010

11-
Defender for App Service in Microsoft Defender for Cloud is a fully managed platform for building and hosting your web apps and APIs. It provides management, monitoring, and operational insights to meet enterprise-grade performance, security, and compliance requirements. For more information, see [Azure App Service](https://azure.microsoft.com/services/app-service/).
11+
Azure App Service is a fully managed platform for building and hosting your web apps and APIs. It provides management, monitoring, and operational insights to meet enterprise-grade performance, security, and compliance requirements. For more information, see [Azure App Service](https://azure.microsoft.com/services/app-service/).
1212

1313
**Microsoft Defender for App Service** uses the scale of the cloud to identify attacks targeting applications running over App Service. Attackers probe web applications to find and exploit weaknesses. Before being routed to specific environments, requests to applications running in Azure go through several gateways, where they're inspected and logged. The data is then used to identify exploits and attackers, and to learn new patterns that are used later.
1414

@@ -17,10 +17,10 @@ When you enable Microsoft Defender for App Service, you immediately benefit from
1717
- **Secure** - Defender for App Service assesses the resources covered by your App Service plan and generates security recommendations based on its findings. Use the detailed instructions in these recommendations to harden your App Service resources.
1818

1919
- **Detect** - Defender for App Service detects a multitude of threats to your App Service resources by monitoring:
20-
- the VM instance in which your App Service is running, and its management interface
21-
- the requests and responses sent to and from your App Service apps
22-
- the underlying sandboxes and VMs
23-
- App Service internal logs - available thanks to the visibility that Azure has as a cloud provider
20+
- the VM instance in which your App Service is running, and its management interface
21+
- the requests and responses sent to and from your App Service apps
22+
- the underlying sandboxes and VMs
23+
- App Service internal logs - available thanks to the visibility that Azure has as a cloud provider
2424

2525
As a cloud-native solution, Defender for App Service can identify attack methodologies applying to multiple targets. For example, from a single host it would be difficult to identify a distributed attack from a small subset of IPs, crawling to similar endpoints on multiple hosts.
2626

articles/defender-for-cloud/tutorial-enable-key-vault-plan.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,16 @@
11
---
2-
title: Protect your key vault with the Defender for Key Vault plan - Microsoft Defender for Cloud
2+
title: Protect your key vaults with the Defender for Key Vault plan - Microsoft Defender for Cloud
33
titleSuffix: Microsoft Defender for Cloud
44
description: Learn how to enable the Defender for Key Vault plan on your Azure subscription for Microsoft Defender for Cloud.
55
ms.topic: install-set-up-deploy
66
ms.date: 06/29/2023
77
---
88

9-
# Protect your key vault with Defender for Key Vault
9+
# Protect your key vaults with Defender for Key Vault
1010

11-
Defender for Key Vault in Microsoft Defender for Cloud is a cloud service that safeguards encryption keys and secrets like certificates, connection strings, and passwords.
11+
Azure Key Vault is a cloud service that safeguards encryption keys and secrets like certificates, connection strings, and passwords.
12+
13+
Enable Microsoft Defender for Key Vault for Azure-native, advanced threat protection for Azure Key Vault, providing an additional layer of security intelligence.
1214

1315
Learn more about [Microsoft Defender for Key Vault](defender-for-key-vault-introduction.md).
1416

articles/defender-for-cloud/tutorial-enable-resource-manager-plan.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,9 @@ ms.date: 06/29/2023
88

99
# Protect your resources with Defender for Resource Manager
1010

11-
Defender for Resource Manager in Microsoft Defender for Cloud is the deployment and management service for Azure. [Azure Resource Manager](../azure-resource-manager/management/overview.md) provides a management layer that enables you to create, update, and delete resources in your Azure account. You use management features, like access control, locks, and tags, to secure and organize your resources after deployment.
11+
[Azure Resource Manager](../azure-resource-manager/management/overview.md) is the deployment and management service for Azure. It provides a management layer that enables you to create, update, and delete resources in your Azure account. You use management features, like access control, locks, and tags, to secure and organize your resources after deployment.
12+
13+
Microsoft Defender for Resource Manager automatically monitors the resource management operations in your organization, whether they're performed through the Azure portal, Azure REST APIs, Azure CLI, or other Azure programmatic clients. Defender for Cloud runs advanced security analytics to detect threats and alerts you about suspicious activity.
1214

1315
Learn more about [Microsoft Defender for Resource Manager](defender-for-resource-manager-introduction.md).
1416

0 commit comments

Comments
 (0)