You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/concepts-security.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -130,7 +130,7 @@ To limit network traffic between pods in your cluster, AKS offers support for [K
130
130
131
131
## Application Security
132
132
133
-
To protect pods running on AKS leverage [Azure Defender for Kubernetes][azure-defender-for-kubernetes] to detect and restrict cyber attacks against your applications running in your pods. Run continual scanning to detect drift in the vulnerability state of your application and implement a "blue/green/canary" process to patch and replace the vulnerable images.
133
+
To protect pods running on AKS leverage [Microsoft Defender for Kubernetes][azure-defender-for-kubernetes] to detect and restrict cyber attacks against your applications running in your pods. Run continual scanning to detect drift in the vulnerability state of your application and implement a "blue/green/canary" process to patch and replace the vulnerable images.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-sql-usage.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ To enable this plan:
38
38
39
39
[Step 2. Provision the Log Analytics agent on your SQL server's host:](#step-2-provision-the-log-analytics-agent-on-your-sql-servers-host)
40
40
41
-
[Step 3. Enable the optional plan in Defender for Cloud's pricing and settings page:](#step-3-enable-the-optional-plan-in-defender-for-clouds-pricing-and-settings-page)
41
+
[Step 3. Enable the optional plan in Defender for Cloud's environment settings page:](#step-3-enable-the-optional-plan-in-defender-for-clouds-environment-settings-page)
42
42
43
43
44
44
### Step 1. Install the agent extension
@@ -59,19 +59,17 @@ To enable this plan:
59
59
-**Connect the Windows machine without Azure Arc** - If you choose to connect a SQL Server running on a Windows machine without using Azure Arc, follow the instructions in [Connect Windows machines to Azure Monitor](../azure-monitor/agents/agent-windows.md).
60
60
61
61
62
-
### Step 3. Enable the optional plan in Defender for Cloud's pricing and settings page:
62
+
### Step 3. Enable the optional plan in Defender for Cloud's environment settings page:
63
63
64
64
1. From Defender for Cloud's menu, open the **Environment settings** page.
65
65
66
66
- If you're using **Microsoft Defender for Cloud's default workspace** (named “defaultworkspace-[your subscription ID]-[region]”), select the relevant **subscription**.
67
67
68
-
- If you're using **a non-default workspace**, select the relevant **workspace** (enter the workspace's name in the filter if necessary):
69
-
70
-

68
+
- If you're using **a non-default workspace**, select the relevant **workspace** (enter the workspace's name in the filter if necessary).
71
69
72
70
1. Set the option for **Microsoft Defender for SQL servers on machines** plan to **on**.
73
71
74
-
:::image type="content" source="./media/security-center-advanced-iaas-data/sql-servers-on-vms-in-pricing-small.png" alt-text="Defender for Cloud pricing page with optional plans.":::
72
+
:::image type="content" source="./media/security-center-advanced-iaas-data/sql-servers-on-vms-in-pricing-small.png" alt-text="Screenshot of Microsoft Defender for Cloud's 'Defender plans' page with optional plans.":::
75
73
76
74
The plan will be enabled on all SQL servers connected to the selected workspace. The protection will be fully active after the first restart of the SQL Server instance.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/enhanced-security-features-overview.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: memildin
6
6
manager: rkarlin
7
7
ms.service: security-center
8
8
ms.topic: overview
9
-
ms.date: 11/09/2021
9
+
ms.date: 11/14/2021
10
10
---
11
11
12
12
# Microsoft Defender for Cloud's enhanced security features
@@ -33,7 +33,7 @@ Defender for Cloud is offered in two modes:
33
33
-**Hybrid security** – Get a unified view of security across all of your on-premises and cloud workloads. Apply security policies and continuously assess the security of your hybrid cloud workloads to ensure compliance with security standards. Collect, search, and analyze security data from multiple sources, including firewalls and other partner solutions.
34
34
-**Threat protection alerts** - Advanced behavioral analytics and the Microsoft Intelligent Security Graph provide an edge over evolving cyber-attacks. Built-in behavioral analytics and machine learning can identify attacks and zero-day exploits. Monitor networks, machines, and cloud services for incoming attacks and post-breach activity. Streamline investigation with interactive tools and contextual threat intelligence.
35
35
-**Track compliance with a range of standards** - Defender for Cloud continuously assesses your hybrid cloud environment to analyze the risk factors according to the controls and best practices in [Azure Security Benchmark](/security/benchmark/azure/introduction). When you enable the enhanced security features, you can apply a range of other industry standards, regulatory standards, and benchmarks according to your organization's needs. Add standards and track your compliance with them from the [regulatory compliance dashboard](update-regulatory-compliance-packages.md).
36
-
-**Access and application controls** - Block malware and other unwanted applications by applying machine learning powered recommendations adapted to your specific workloads to create allow and deny lists. Reduce the network attack surface with just-in-time, controlled access to management ports on Azure VMs. Access and application controls drastically reduce exposure to brute force and other network attacks.
36
+
-**Access and application controls** - Block malware and other unwanted applications by applying machine learning powered recommendations adapted to your specific workloads to create allow and blocklists. Reduce the network attack surface with just-in-time, controlled access to management ports on Azure VMs. Access and application controls drastically reduce exposure to brute force and other network attacks.
37
37
-**Container security features** - Benefit from vulnerability management and real-time threat protection on your containerized environments. When enabling the **Microsoft Defender for container registries**, it may take up to 12 hrs until all the features are enabled. Charges are based on the number of unique container images pushed to your connected registry. After an image has been scanned once, you won't be charged for it again unless it's modified and pushed once more.
38
38
-**Breadth threat protection for resources connected to the Azure environment** - The enhanced security features include Azure-native breadth threat protection for the Azure services common to all of your resources: Azure Resource Manager, Azure DNS, Azure network layer, and Azure Key Vault. Defender for Cloud has unique visibility into the Azure management layer and the Azure DNS layer, and can therefore protect cloud resources that are connected to those layers.
39
39
@@ -114,13 +114,12 @@ Yes. If you've configured your Log Analytics agent to send data to two or more d
114
114
Yes. If you've configured your Log Analytics agent to send data to two or more different Log Analytics workspaces (multi-homing), you'll get 500-MB free data ingestion. It's calculated per node, per reported workspace, per day, and available for every workspace that has a 'Security' or 'AntiMalware' solution installed. You'll be charged for any data ingested over the 500-MB limit.
115
115
116
116
### Is the 500-MB free data ingestion calculated for an entire workspace or strictly per machine?
117
-
You’ll get 500-MB free data ingestion per day, for every machine connected to the workspace. Specifically for security data types directly collected by Defender for Cloud.
117
+
You’ll get 500-MB free data ingestion per day, for every Windows machine connected to the workspace. Specifically for security data types directly collected by Defender for Cloud.
118
118
119
119
This data is a daily rate averaged across all nodes. So even if some machines send 100-MB and others send 800-MB, if the total doesn’t exceed the **[number of machines] x 500-MB** free limit, you won’t be charged extra.
120
120
121
121
### What data types are included in the 500-MB data daily allowance?
122
-
123
-
Defender for Cloud's billing is closely tied to the billing for Log Analytics. [Microsoft Defender for servers](defender-for-servers-introduction.md) provides a 500 MB/node/day allocation against the following subset of [security data types](/azure/azure-monitor/reference/tables/tables-category#security):
122
+
Defender for Cloud's billing is closely tied to the billing for Log Analytics. [Microsoft Defender for servers](defender-for-servers-introduction.md) provides a 500 MB/node/day allocation for Windows machines against the following subset of [security data types](/azure/azure-monitor/reference/tables/tables-category#security):
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/faq-azure-monitor-logs.yml
+5-9Lines changed: 5 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -3,16 +3,12 @@ metadata:
3
3
title: 'Microsoft Defender for Cloud FAQ - questions about existing Log Analytics agents'
4
4
description: This FAQ answers questions for customers already using the Log Analytics agent and considering Microsoft Defender for Cloud, a product that helps you prevent, detect, and respond to threats.
5
5
services: security-center
6
-
documentationcenter: na
7
6
author: memildin
8
7
manager: rkarlin
9
8
ms.assetid: be2ab6d5-72a8-411f-878e-98dac21bc5cb
10
9
ms.service: security-center
11
-
ms.devlang: na
12
10
ms.topic: conceptual
13
-
ms.tgt_pltfrm: na
14
-
ms.workload: na
15
-
ms.date: 11/09/2021
11
+
ms.date: 11/14/2021
16
12
ms.author: memildin
17
13
18
14
@@ -35,10 +31,10 @@ sections:
35
31
- question: |
36
32
Does Defender for Cloud install solutions on my existing Log Analytics workspaces? What are the billing implications?
37
33
answer: |
38
-
When Defender for Cloud identifies that a VM is already connected to a workspace you created, Defender for Cloud enables solutions on this workspace according to your pricing configuration. The solutions are applied only to the relevant Azure VMs, via [solution targeting](../azure-monitor/insights/solution-targeting.md), so the billing remains the same.
34
+
When Defender for Cloud identifies that a VM is already connected to a workspace you created, Defender for Cloud enables solutions on this workspace according to your pricing configuration. The solutions are applied only to the relevant resources, via [solution targeting](../azure-monitor/insights/solution-targeting.md), so the billing remains the same.
39
35
40
-
- **Azure Defender off** – Defender for Cloud installs the "SecurityCenterFree" solution on the workspace. You won't be billed.
41
-
- **Azure Defender on** – Defender for Cloud installs the 'Security' solution on the workspace.
36
+
- **Enhanced security off** – Defender for Cloud installs the "SecurityCenterFree" solution on the workspace. You won't be billed.
37
+
- **Enable all Microsoft Defender plans** – Defender for Cloud installs the 'Security' solution on the workspace.
42
38
43
39

44
40
@@ -52,4 +48,4 @@ sections:
52
48
- question: |
53
49
I already have security solution on my workspaces. What are the billing implications?
54
50
answer: |
55
-
The Security & Audit solution is used to enable **Microsoft Defender for servers**. If the Security & Audit solution is already installed on a workspace, Defender for Cloud uses the existing solution. There is no change in billing.
51
+
The Security & Audit solution is used to enable **Microsoft Defender for servers**. If the Security & Audit solution is already installed on a workspace, Defender for Cloud uses the existing solution. There is no change in billing.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/sql-information-protection-policy.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ The information protection policy options within Defender for Cloud provide a pr
37
37
38
38
There are three ways to access the information protection policy:
39
39
40
-
-**(Recommended)** From the pricing and settings page of Defender for Cloud
40
+
-**(Recommended)** From the **Environment settings** page of Defender for Cloud
41
41
- From the security recommendation "Sensitive data in your SQL databases should be classified"
42
42
- From the Azure SQL DB data discovery page
43
43
@@ -47,9 +47,9 @@ Each of these is shown in the relevant tab below.
47
47
48
48
### [**From Defender for Cloud's settings**](#tab/sqlip-tenant)
49
49
50
-
### Access the policy from Defender for Cloud's pricing and settings page <aname="sqlip-tenant"></a>
50
+
### Access the policy from Defender for Cloud's environment settings page <aname="sqlip-tenant"></a>
51
51
52
-
From Defender for Cloud's **pricing and settings** page, select **SQL information protection**.
52
+
From Defender for Cloud's **Environment settings** page, select **SQL information protection**.
53
53
54
54
> [!NOTE]
55
55
> This option only appears for users with tenant-level permissions. [Grant tenant-wide permissions to yourself](tenant-wide-permissions-management.md#grant-tenant-wide-permissions-to-yourself).
0 commit comments