You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/includes/defender-for-containers-assign-workspace-arc.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,27 +26,27 @@ When you enable the auto-provision option, a default workspace will be automatic
26
26
27
27
1. Search for, and select **Policy**.
28
28
29
-
:::image type="content" source="../media/defender-for-containers/find-policy.png" alt-text="Screenshot that shows how to locate the policy page for ARC." lightbox="../media/defender-for-containers/find-policy.png":::
29
+
:::image type="content" source="../media/defender-for-containers/find-policy.png" alt-text="Screenshot that shows how to locate the policy page for Arc." lightbox="../media/defender-for-containers/find-policy.png":::
30
30
31
31
1. Select **Definitions**.
32
32
33
33
1. Search for policy ID `708b60a6-d253-4fe0-9114-4be4c00f012c`.
34
34
35
-
:::image type="content" source="../media/defender-for-containers/policy-search-arc.png" alt-text="Screenshot that shows where to search for the policy by ID number for ARC." lightbox="../media/defender-for-containers/policy-search-arc.png":::
35
+
:::image type="content" source="../media/defender-for-containers/policy-search-arc.png" alt-text="Screenshot that shows where to search for the policy by ID number for Arc." lightbox="../media/defender-for-containers/policy-search-arc.png":::
36
36
37
37
1. Select **Configure Azure Arc enabled Kubernetes clusters to install Microsoft Defender for Cloud extension.**.
38
38
39
39
1. Select **Assignments**.
40
40
41
-
:::image type="content" source="../media/defender-for-containers/assignments-tab-arc.png" alt-text="Screenshot that shows where the assignments tab is for ARC." lightbox="../media/defender-for-containers/assignments-tab-arc.png":::
41
+
:::image type="content" source="../media/defender-for-containers/assignments-tab-arc.png" alt-text="Screenshot that shows where the assignments tab is for Arc." lightbox="../media/defender-for-containers/assignments-tab-arc.png":::
42
42
43
43
1. Follow the [Create a new assignment with custom workspace](#create-a-new-assignment-with-custom-workspace) steps if the policy hasn't yet been assigned to the relevant scope. Or, follow the [Update assignment with custom workspace](#update-assignment-with-custom-workspace) steps if the policy is already assigned and you want to change it to use a custom workspace.
44
44
45
45
#### Create a new assignment with custom workspace
46
46
47
47
If the policy hasn't been assigned, you'll see `Assignments (0)`.
48
48
49
-
:::image type="content" source="../media/defender-for-containers/no-assignment-arc.png" alt-text="Screenshot showing that no workspace has been assigned for ARC." lightbox="../media/defender-for-containers/no-assignment-arc.png":::
49
+
:::image type="content" source="../media/defender-for-containers/no-assignment-arc.png" alt-text="Screenshot showing that no workspace has been assigned for Arc." lightbox="../media/defender-for-containers/no-assignment-arc.png":::
50
50
51
51
**To assign custom workspace**:
52
52
@@ -56,7 +56,7 @@ If the policy hasn't been assigned, you'll see `Assignments (0)`.
56
56
57
57
1. Select a LogAnalyticsWorkspaceResource ID from the dropdown menu.
58
58
59
-
:::image type="content" source="../media/defender-for-containers/drop-down-menu-arc.png" alt-text="Screenshot showing where the dropdown menu is located for ARC." lightbox="../media/defender-for-containers/drop-down-menu-arc.png":::
59
+
:::image type="content" source="../media/defender-for-containers/drop-down-menu-arc.png" alt-text="Screenshot showing where the dropdown menu is located for Arc." lightbox="../media/defender-for-containers/drop-down-menu-arc.png":::
60
60
61
61
1. Select **Review + create**.
62
62
@@ -69,21 +69,21 @@ If the policy has already been assigned to a workspace, you'll see `Assignments
69
69
> [!NOTE]
70
70
> If you have more than one subscription the number may be higher. If you have a number 1 or higher, the assignment may still not be on the relevant scope. If this is the case, you will want to follow the [Create a new assignment with custom workspace](#create-a-new-assignment-with-custom-workspace) steps.
71
71
72
-
:::image type="content" source="../media/defender-for-containers/already-assigned-arc.png" alt-text="Screenshot that shows Assignment (1), meaning a workspace has already been assigned for ARC." lightbox="../media/defender-for-containers/already-assigned-arc.png":::
72
+
:::image type="content" source="../media/defender-for-containers/already-assigned-arc.png" alt-text="Screenshot that shows Assignment (1), meaning a workspace has already been assigned for Arc." lightbox="../media/defender-for-containers/already-assigned-arc.png":::
73
73
74
74
**To assign custom workspace**:
75
75
76
76
1. Select the relevant assignment.
77
77
78
-
:::image type="content" source="../media/defender-for-containers/relevant-assignment-arc.png" alt-text="Screenshot that shows where to select the relevant assignment from for ARC." lightbox="../media/defender-for-containers/relevant-assignment-arc.png":::
78
+
:::image type="content" source="../media/defender-for-containers/relevant-assignment-arc.png" alt-text="Screenshot that shows where to select the relevant assignment from for Arc." lightbox="../media/defender-for-containers/relevant-assignment-arc.png":::
79
79
80
80
1. Select **Edit assignment**.
81
81
82
82
1. In the **Parameters** tab, deselect the **Only show parameters that need input or review** option.
83
83
84
84
1. Select a LogAnalyticsWorkspaceResource ID from the dropdown menu.
85
85
86
-
:::image type="content" source="../media/defender-for-containers/drop-down-menu-arc.png" alt-text="Screenshot showing where the dropdown menu is located for ARC." lightbox="../media/defender-for-containers/drop-down-menu-arc.png":::
86
+
:::image type="content" source="../media/defender-for-containers/drop-down-menu-arc.png" alt-text="Screenshot showing where the dropdown menu is located for Arc." lightbox="../media/defender-for-containers/drop-down-menu-arc.png":::
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/quickstart-onboard-aws.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,7 +128,7 @@ For a reference list of all the recommendations Defender for Cloud can provide f
128
128
- (Optional) Select **Configure**, to edit the configuration as required.
129
129
130
130
> [!NOTE]
131
-
> The respective Azure Arc servers for EC2 instances or GCP virtual machines that no longer exist (and the respective Azure Arc servers with a status of ["Disconnected" or "Expired"](/azure/azure-arc/servers/overview)) will be removed after 7 days. This process removes irrelevant Azure ARC entities, ensuring only Azure Arc servers related to existing instances are displayed.
131
+
> The respective Azure Arc servers for EC2 instances or GCP virtual machines that no longer exist (and the respective Azure Arc servers with a status of ["Disconnected" or "Expired"](/azure/azure-arc/servers/overview)) will be removed after 7 days. This process removes irrelevant Azure Arc entities, ensuring only Azure Arc servers related to existing instances are displayed.
132
132
133
133
- By default the **Containers** plan is set to **On**. This is necessary to have Defender for Containers protect your AWS EKS clusters. Ensure you've fulfilled the [network requirements](./defender-for-containers-enable.md?pivots=defender-for-container-eks&source=docs&tabs=aks-deploy-portal%2ck8s-deploy-asc%2ck8s-verify-asc%2ck8s-remove-arc%2caks-removeprofile-api#network-requirements) for the Defender for Containers plan.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/quickstart-onboard-gcp.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -110,7 +110,7 @@ To have full visibility to Microsoft Defender for Servers security content, ensu
110
110
-**Manual installation** - You can manually connect your VM instances to Azure Arc for servers. Instances in projects with Defender for Servers plan enabled that aren't connected to Arc are surfaced by the recommendation `GCP VM instances should be connected to Azure Arc`. Select the **Fix** option in the recommendation to install Azure Arc on the selected machines.
111
111
112
112
> [!NOTE]
113
-
> The respective Azure Arc servers for EC2 instances or GCP virtual machines that no longer exist (and the respective Azure Arc servers with a status of ["Disconnected" or "Expired"](/azure/azure-arc/servers/overview)) will be removed after 7 days. This process removes irrelevant Azure ARC entities, ensuring only Azure Arc servers related to existing instances are displayed.
113
+
> The respective Azure Arc servers for EC2 instances or GCP virtual machines that no longer exist (and the respective Azure Arc servers with a status of ["Disconnected" or "Expired"](/azure/azure-arc/servers/overview)) will be removed after 7 days. This process removes irrelevant Azure Arc entities, ensuring only Azure Arc servers related to existing instances are displayed.
114
114
115
115
- Ensure you've fulfilled the [network requirements for Azure Arc](../azure-arc/servers/network-requirements.md?tabs=azure-cloud).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/tutorial-enable-app-service-plan.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.date: 06/29/2023
8
8
9
9
# Protect your applications with Defender for App Service
10
10
11
-
Defender for App Service in Microsoft Defender for Cloud is a fully managed platform for building and hosting your web apps and APIs. It provides management, monitoring, and operational insights to meet enterprise-grade performance, security, and compliance requirements. For more information, see [Azure App Service](https://azure.microsoft.com/services/app-service/).
11
+
Azure App Service is a fully managed platform for building and hosting your web apps and APIs. It provides management, monitoring, and operational insights to meet enterprise-grade performance, security, and compliance requirements. For more information, see [Azure App Service](https://azure.microsoft.com/services/app-service/).
12
12
13
13
**Microsoft Defender for App Service** uses the scale of the cloud to identify attacks targeting applications running over App Service. Attackers probe web applications to find and exploit weaknesses. Before being routed to specific environments, requests to applications running in Azure go through several gateways, where they're inspected and logged. The data is then used to identify exploits and attackers, and to learn new patterns that are used later.
14
14
@@ -17,10 +17,10 @@ When you enable Microsoft Defender for App Service, you immediately benefit from
17
17
-**Secure** - Defender for App Service assesses the resources covered by your App Service plan and generates security recommendations based on its findings. Use the detailed instructions in these recommendations to harden your App Service resources.
18
18
19
19
-**Detect** - Defender for App Service detects a multitude of threats to your App Service resources by monitoring:
20
-
- the VM instance in which your App Service is running, and its management interface
21
-
- the requests and responses sent to and from your App Service apps
22
-
- the underlying sandboxes and VMs
23
-
- App Service internal logs - available thanks to the visibility that Azure has as a cloud provider
20
+
- the VM instance in which your App Service is running, and its management interface
21
+
- the requests and responses sent to and from your App Service apps
22
+
- the underlying sandboxes and VMs
23
+
- App Service internal logs - available thanks to the visibility that Azure has as a cloud provider
24
24
25
25
As a cloud-native solution, Defender for App Service can identify attack methodologies applying to multiple targets. For example, from a single host it would be difficult to identify a distributed attack from a small subset of IPs, crawling to similar endpoints on multiple hosts.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/tutorial-enable-key-vault-plan.md
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,16 @@
1
1
---
2
-
title: Protect your key vault with the Defender for Key Vault plan - Microsoft Defender for Cloud
2
+
title: Protect your key vaults with the Defender for Key Vault plan - Microsoft Defender for Cloud
3
3
titleSuffix: Microsoft Defender for Cloud
4
4
description: Learn how to enable the Defender for Key Vault plan on your Azure subscription for Microsoft Defender for Cloud.
5
5
ms.topic: install-set-up-deploy
6
6
ms.date: 06/29/2023
7
7
---
8
8
9
-
# Protect your key vault with Defender for Key Vault
9
+
# Protect your key vaults with Defender for Key Vault
10
10
11
-
Defender for Key Vault in Microsoft Defender for Cloud is a cloud service that safeguards encryption keys and secrets like certificates, connection strings, and passwords.
11
+
Azure Key Vault is a cloud service that safeguards encryption keys and secrets like certificates, connection strings, and passwords.
12
+
13
+
Enable Microsoft Defender for Key Vault for Azure-native, advanced threat protection for Azure Key Vault, providing an additional layer of security intelligence.
12
14
13
15
Learn more about [Microsoft Defender for Key Vault](defender-for-key-vault-introduction.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/tutorial-enable-resource-manager-plan.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,9 @@ ms.date: 06/29/2023
8
8
9
9
# Protect your resources with Defender for Resource Manager
10
10
11
-
Defender for Resource Manager in Microsoft Defender for Cloud is the deployment and management service for Azure. [Azure Resource Manager](../azure-resource-manager/management/overview.md) provides a management layer that enables you to create, update, and delete resources in your Azure account. You use management features, like access control, locks, and tags, to secure and organize your resources after deployment.
11
+
[Azure Resource Manager](../azure-resource-manager/management/overview.md) is the deployment and management service for Azure. It provides a management layer that enables you to create, update, and delete resources in your Azure account. You use management features, like access control, locks, and tags, to secure and organize your resources after deployment.
12
+
13
+
Microsoft Defender for Resource Manager automatically monitors the resource management operations in your organization, whether they're performed through the Azure portal, Azure REST APIs, Azure CLI, or other Azure programmatic clients. Defender for Cloud runs advanced security analytics to detect threats and alerts you about suspicious activity.
12
14
13
15
Learn more about [Microsoft Defender for Resource Manager](defender-for-resource-manager-introduction.md).
0 commit comments