Skip to content

Commit b9eb06f

Browse files
authored
Merge pull request #215588 from bmansheim/storage-1.5-enablement
Defender for Storage per-account pricing plan
2 parents c946e75 + 14b50f0 commit b9eb06f

22 files changed

+452
-94
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -396,7 +396,7 @@
396396
displayName: blob, adls, files, Microsoft Defender for Storage, Defender for Storage, storage, Azure-native security, automated response, alerts, security, hash reputation analysis
397397
href: defender-for-storage-introduction.md
398398
- name: Enable Defender for Storage
399-
href: ../storage/common/azure-defender-storage-configure.md?toc=/azure/defender-for-cloud/toc.json#set-up-microsoft-defender-for-cloud
399+
href: ../storage/common/azure-defender-storage-configure.md?toc=/azure/defender-for-cloud/toc.json
400400
- name: Exclude a storage account
401401
displayName: blob, adls, files, Microsoft Defender for Storage, Defender for Storage
402402
href: defender-for-storage-exclude.md

articles/defender-for-cloud/defender-for-storage-exclude.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@ ms.author: benmansheim
77
author: bmansheim
88
---
99

10-
# Exclude a storage account from Microsoft Defender for Storage protections
10+
# Exclude a storage account from per-transaction Microsoft Defender for Storage protections
1111

12-
When you [enable Microsoft Defender for Storage](../storage/common/azure-defender-storage-configure.md#set-up-microsoft-defender-for-cloud) on a subscription, all current and future Azure Storage accounts in that subscription are protected. If you have specific accounts that you want to exclude from the Defender for Storage protections, you can exclude them using the Azure portal, PowerShell, or the Azure CLI.
12+
When you [enable Microsoft Defender for Storage](../storage/common/azure-defender-storage-configure.md) on a subscription for the per-transaction pricing, all current and future Azure Storage accounts in that subscription are protected. You can exclude specific storage accounts from the Defender for Storage protections using the Azure portal, PowerShell, or the Azure CLI.
1313

1414
We don't recommend that you exclude storage accounts from Defender for Storage because attackers can use any opening in order to compromise your environment. If you want to optimize your Azure costs and remove storage accounts that you feel are low risk from Defender for Storage, you can use the [Price Estimation Workbook](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/SecurityMenuBlade/~/28) in the Azure portal to evaluate the cost savings.
1515

16-
## Exclude an Azure Storage account
16+
## Exclude an Azure Storage account protection on a subscription with per-transaction pricing
1717

1818
To exclude an Azure Storage account from Microsoft Defender for Storage:
1919

@@ -68,7 +68,7 @@ To exclude an Azure Storage account from Microsoft Defender for Storage:
6868
> [!TIP]
6969
> Learn more about tags in [az tag](/cli/azure/tag).
7070
71-
1. Disable Microsoft Defender for Storage for the desired account on the relevant subscription with the ``security atp storage`` command (using the same resource ID):
71+
1. Disable Microsoft Defender for Storage for the desired account on the relevant subscription with the `security atp storage` command (using the same resource ID):
7272
7373
```azurecli
7474
az security atp storage update --resource-group MyResourceGroup --storage-account MyStorageAccount --is-enabled false

articles/defender-for-cloud/defender-for-storage-introduction.md

Lines changed: 21 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: overview
99

1010
**Microsoft Defender for Storage** is an Azure-native layer of security intelligence that detects unusual and potentially harmful attempts to access or exploit your storage accounts. It uses advanced threat detection capabilities and [Microsoft Threat Intelligence](https://go.microsoft.com/fwlink/?linkid=2128684) data to provide contextual security alerts. Those alerts also include steps to mitigate the detected threats and prevent future attacks.
1111

12-
You can [enable Microsoft Defender for Storage](../storage/common/azure-defender-storage-configure.md#set-up-microsoft-defender-for-cloud) at either the subscription level (recommended) or the resource level.
12+
You can [enable Microsoft Defender for Storage](../storage/common/azure-defender-storage-configure.md) at either the subscription level (recommended) or the resource level.
1313

1414
Defender for Storage continually analyzes the telemetry stream generated by the [Azure Blob Storage](https://azure.microsoft.com/services/storage/blobs/) and Azure Files services. When potentially malicious activities are detected, security alerts are generated. These alerts are displayed in Microsoft Defender for Cloud, together with the details of the suspicious activity along with the relevant investigation steps, remediation actions, and security recommendations.
1515

@@ -70,8 +70,27 @@ Alerts include details of the incident that triggered them, and recommendations
7070
> [!TIP]
7171
> For a comprehensive list of all Defender for Storage alerts, see the [alerts reference page](alerts-reference.md#alerts-azurestorage). This is useful for workload owners who want to know what threats can be detected and help SOC teams gain familiarity with detections before investigating them. Learn more about what's in a Defender for Cloud security alert, and how to manage your alerts in [Manage and respond to security alerts in Microsoft Defender for Cloud](managing-and-responding-alerts.md).
7272
73+
## Explore security anomalies
7374

74-
### Limitations of hash reputation analysis
75+
When storage activity anomalies occur, you receive an email notification with information about the suspicious security event. Details of the event include:
76+
77+
- The nature of the anomaly
78+
- The storage account name
79+
- The event time
80+
- The storage type
81+
- The potential causes
82+
- The investigation steps
83+
- The remediation steps
84+
85+
The email also includes details on possible causes and recommended actions to investigate and mitigate the potential threat.
86+
87+
:::image type="content" source="media/defender-for-storage-introduction/storage-advanced-threat-protection-alert-email.png" alt-text="Screenshot of Microsoft Defender for Storage alert email.":::
88+
89+
You can review and manage your current security alerts from Microsoft Defender for Cloud's [Security alerts tile](managing-and-responding-alerts.md). Select an alert for details and actions for investigating the current threat and addressing future threats.
90+
91+
:::image type="content" source="media/defender-for-storage-introduction/storage-advanced-threat-protection-alert.png" alt-text="Screenshot of a Microsoft Defender for Storage alert." lightbox="media/defender-for-storage-introduction/storage-advanced-threat-protection-alert.png":::
92+
93+
## Limitations of hash reputation analysis
7594

7695
- **Hash reputation isn't deep file inspection** - Microsoft Defender for Storage uses hash reputation analysis supported by [Microsoft Threat Intelligence](https://go.microsoft.com/fwlink/?linkid=2128684) to determine whether an uploaded file is suspicious. The threat protection tools don’t scan the uploaded files; rather they analyze the telemetry generated from the Blobs Storage and Files services. Defender for Storage then compares the hashes of newly uploaded files with hashes of known viruses, trojans, spyware, and ransomware.
7796

articles/defender-for-cloud/defender-for-storage-test.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,13 @@ ms.topic: how-to
99

1010
# Trigger a test alert for Microsoft Defender for Storage
1111

12-
After you enable Defender for Storage, you can create a test alert to demonstrate how Defender for Storage recognizes and alerts on security risks.
12+
After you enable Defender for Storage, you can create a test alert to demonstrate how Defender for Storage recognizes and triggers alerts on security risks.
1313

1414
## Demonstrate Defender for Storage alerts
1515

1616
To test the security alerts from Microsoft Defender for Storage in your environment, generate the alert "Access from a Tor exit node to a storage account" with the following steps:
1717

18-
1. Open a storage account with [Microsoft Defender for Storage enabled](../storage/common/azure-defender-storage-configure.md#set-up-microsoft-defender-for-cloud).
18+
1. Open a storage account with [Microsoft Defender for Storage enabled](../storage/common/azure-defender-storage-configure.md).
1919
1. From the sidebar, select “Containers” and open an existing container or create a new one.
2020

2121
:::image type="content" source="media/defender-for-storage-introduction/opening-storage-container.png" alt-text="Opening a blob container from an Azure Storage account." lightbox="media/defender-for-storage-introduction/opening-storage-container.png":::
Loading
835 KB
Loading
223 KB
Loading
4.52 KB
Loading

0 commit comments

Comments
 (0)