You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-storage-exclude.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,13 +7,13 @@ ms.author: benmansheim
7
7
author: bmansheim
8
8
---
9
9
10
-
# Exclude a storage account from Microsoft Defender for Storage protections
10
+
# Exclude a storage account from per-transaction Microsoft Defender for Storage protections
11
11
12
-
When you [enable Microsoft Defender for Storage](../storage/common/azure-defender-storage-configure.md#set-up-microsoft-defender-for-cloud) on a subscription, all current and future Azure Storage accounts in that subscription are protected. If you have specific accounts that you want to exclude from the Defender for Storage protections, you can exclude them using the Azure portal, PowerShell, or the Azure CLI.
12
+
When you [enable Microsoft Defender for Storage](../storage/common/azure-defender-storage-configure.md) on a subscription for the per-transaction pricing, all current and future Azure Storage accounts in that subscription are protected. You can exclude specific storage accounts from the Defender for Storage protections using the Azure portal, PowerShell, or the Azure CLI.
13
13
14
14
We don't recommend that you exclude storage accounts from Defender for Storage because attackers can use any opening in order to compromise your environment. If you want to optimize your Azure costs and remove storage accounts that you feel are low risk from Defender for Storage, you can use the [Price Estimation Workbook](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/SecurityMenuBlade/~/28) in the Azure portal to evaluate the cost savings.
15
15
16
-
## Exclude an Azure Storage account
16
+
## Exclude an Azure Storage account protection on a subscription with per-transaction pricing
17
17
18
18
To exclude an Azure Storage account from Microsoft Defender for Storage:
19
19
@@ -68,7 +68,7 @@ To exclude an Azure Storage account from Microsoft Defender for Storage:
68
68
> [!TIP]
69
69
> Learn more about tags in [az tag](/cli/azure/tag).
70
70
71
-
1. Disable Microsoft Defender for Storage for the desired account on the relevant subscription with the ``security atp storage`` command (using the same resource ID):
71
+
1. Disable Microsoft Defender for Storage for the desired account on the relevant subscription with the `security atp storage` command (using the same resource ID):
72
72
73
73
```azurecli
74
74
az security atp storage update --resource-group MyResourceGroup --storage-account MyStorageAccount --is-enabled false
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-storage-introduction.md
+21-2Lines changed: 21 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.topic: overview
9
9
10
10
**Microsoft Defender for Storage** is an Azure-native layer of security intelligence that detects unusual and potentially harmful attempts to access or exploit your storage accounts. It uses advanced threat detection capabilities and [Microsoft Threat Intelligence](https://go.microsoft.com/fwlink/?linkid=2128684) data to provide contextual security alerts. Those alerts also include steps to mitigate the detected threats and prevent future attacks.
11
11
12
-
You can [enable Microsoft Defender for Storage](../storage/common/azure-defender-storage-configure.md#set-up-microsoft-defender-for-cloud) at either the subscription level (recommended) or the resource level.
12
+
You can [enable Microsoft Defender for Storage](../storage/common/azure-defender-storage-configure.md) at either the subscription level (recommended) or the resource level.
13
13
14
14
Defender for Storage continually analyzes the telemetry stream generated by the [Azure Blob Storage](https://azure.microsoft.com/services/storage/blobs/) and Azure Files services. When potentially malicious activities are detected, security alerts are generated. These alerts are displayed in Microsoft Defender for Cloud, together with the details of the suspicious activity along with the relevant investigation steps, remediation actions, and security recommendations.
15
15
@@ -70,8 +70,27 @@ Alerts include details of the incident that triggered them, and recommendations
70
70
> [!TIP]
71
71
> For a comprehensive list of all Defender for Storage alerts, see the [alerts reference page](alerts-reference.md#alerts-azurestorage). This is useful for workload owners who want to know what threats can be detected and help SOC teams gain familiarity with detections before investigating them. Learn more about what's in a Defender for Cloud security alert, and how to manage your alerts in [Manage and respond to security alerts in Microsoft Defender for Cloud](managing-and-responding-alerts.md).
72
72
73
+
## Explore security anomalies
73
74
74
-
### Limitations of hash reputation analysis
75
+
When storage activity anomalies occur, you receive an email notification with information about the suspicious security event. Details of the event include:
76
+
77
+
- The nature of the anomaly
78
+
- The storage account name
79
+
- The event time
80
+
- The storage type
81
+
- The potential causes
82
+
- The investigation steps
83
+
- The remediation steps
84
+
85
+
The email also includes details on possible causes and recommended actions to investigate and mitigate the potential threat.
86
+
87
+
:::image type="content" source="media/defender-for-storage-introduction/storage-advanced-threat-protection-alert-email.png" alt-text="Screenshot of Microsoft Defender for Storage alert email.":::
88
+
89
+
You can review and manage your current security alerts from Microsoft Defender for Cloud's [Security alerts tile](managing-and-responding-alerts.md). Select an alert for details and actions for investigating the current threat and addressing future threats.
90
+
91
+
:::image type="content" source="media/defender-for-storage-introduction/storage-advanced-threat-protection-alert.png" alt-text="Screenshot of a Microsoft Defender for Storage alert." lightbox="media/defender-for-storage-introduction/storage-advanced-threat-protection-alert.png":::
92
+
93
+
## Limitations of hash reputation analysis
75
94
76
95
-**Hash reputation isn't deep file inspection** - Microsoft Defender for Storage uses hash reputation analysis supported by [Microsoft Threat Intelligence](https://go.microsoft.com/fwlink/?linkid=2128684) to determine whether an uploaded file is suspicious. The threat protection tools don’t scan the uploaded files; rather they analyze the telemetry generated from the Blobs Storage and Files services. Defender for Storage then compares the hashes of newly uploaded files with hashes of known viruses, trojans, spyware, and ransomware.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-storage-test.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,13 +9,13 @@ ms.topic: how-to
9
9
10
10
# Trigger a test alert for Microsoft Defender for Storage
11
11
12
-
After you enable Defender for Storage, you can create a test alert to demonstrate how Defender for Storage recognizes and alerts on security risks.
12
+
After you enable Defender for Storage, you can create a test alert to demonstrate how Defender for Storage recognizes and triggers alerts on security risks.
13
13
14
14
## Demonstrate Defender for Storage alerts
15
15
16
16
To test the security alerts from Microsoft Defender for Storage in your environment, generate the alert "Access from a Tor exit node to a storage account" with the following steps:
17
17
18
-
1. Open a storage account with [Microsoft Defender for Storage enabled](../storage/common/azure-defender-storage-configure.md#set-up-microsoft-defender-for-cloud).
18
+
1. Open a storage account with [Microsoft Defender for Storage enabled](../storage/common/azure-defender-storage-configure.md).
19
19
1. From the sidebar, select “Containers” and open an existing container or create a new one.
20
20
21
21
:::image type="content" source="media/defender-for-storage-introduction/opening-storage-container.png" alt-text="Opening a blob container from an Azure Storage account." lightbox="media/defender-for-storage-introduction/opening-storage-container.png":::
0 commit comments