Skip to content

Commit bdbda0e

Browse files
committed
Freshness update
1 parent 0379101 commit bdbda0e

File tree

3 files changed

+37
-58
lines changed

3 files changed

+37
-58
lines changed
Lines changed: 10 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -1,45 +1,25 @@
11
---
2-
title: How to Log a Security Event Support Ticket - Azure | Microsoft Docs
2+
title: How to Log an Azure security issue - Azure | Microsoft Docs
33
description: As a seller on the Azure Marketplace, having identified a potential security event, I need to know how to log an appropriate ticket.
44
documentationcenter: na
55
author: DavidBosland
6-
manager: lakoch
7-
editor: v-dabosl
6+
manager: rkarlin
87

98
ms.assetid: f1ffde66-98f0-4c3e-ad94-fee1f97cae03
10-
ms.service: marketplace
11-
ms.subservice: partnercenter-marketplace-publisher
9+
ms.service: security
10+
ms.subservice: security-fundamentals
1211
ms.topic: article
1312
ms.tgt_pltfrm: na
1413
ms.workload: na
15-
ms.date: 11/13/2017
14+
ms.date: 11/28/2023
1615
ms.author: terrylan
1716

1817
---
19-
# How to Log a Security Event Support Ticket
18+
# Log a security issue
2019

21-
1. Navigate to [Publisher Support](https://support.microsoft.com/en-us/getsupport?wf=0&tenant=ClassicCommercial&oaspworkflow=start_1.0.0.0&locale=en-us&supportregion=en-us&pesid=16230&ccsid=636450758943226673) and sign in with your Microsoft credentials.
22-
2. Select "Security Event" as the Problem Type and choose between the "Security Incident" and "Vulnerability" categories.
20+
Visit the [Microsoft Security Response Center](https://msrc.microsoft.com/create-report) (MSRC) to report a security specific issue.
2321

24-
![Event type and Definition](./media/event-support-ticket/chart.png)
25-
26-
3. After you select the Problem Type and Category, click the '**Start request**' button. Provide the following information to help us better understand the issue.
27-
28-
i. What is the problem and/or vulnerability?
29-
30-
ii. For vulnerabilities, please provide the CVE (mitre.org) or the filled out CVSS3 v3 calculator (https://www.first.org/cvss/calculator/3.0).
31-
32-
iii. Is there a resolution or mitigation? If yes, then please provide the remediation steps.
33-
34-
iv. Do you have a message that you want to send to customers? We will work with you to craft an appropriate message if applicable.
35-
36-
4. Submission confirmation - Once you have submitted your issue, we will acknowledge receipt within one business day and assign your issue a priority and severity.
37-
38-
- If you need to communicate with us about your issue, use the confirmation number in all correspondence.
39-
- You can view progress on your issue at any time.
40-
41-
5. What happens next? Depending on the issue and severity, the following steps may be taken:
42-
43-
- We will communicate the outcome of our assessment to you. Depending on the outcome, we may remove or request that you modify your offering. In this event, we will work with you to ensure that disruption to impacted customers is minimized.
44-
- We will work with you to help mitigate the impact of the incident/vulnerability for our mutual customers.
22+
You can also create a tailored, Azure support request in the Azure portal. Visit the Azure portal [here](https://ms.portal.azure.com/#create/Microsoft.Support). Follow the prompts to receive recommended solutions or to log a support request.
4523

24+
## Next steps
25+
[MSRC](https://msrc.microsoft.com/create-report) is part of the defender community. Learn more about how MSRC helps to protect customers and the broader ecosystm.

articles/security/fundamentals/network-best-practices.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,16 @@
22
title: Best practices for network security - Microsoft Azure
33
description: This article provides a set of best practices for network security using built in Azure capabilities.
44
author: TerryLanfear
5-
manager: barbkess
6-
editor: TomShinder
5+
manager: rkarlin
76

87
ms.assetid: 7f6aa45f-138f-4fde-a611-aaf7e8fe56d1
98
ms.service: security
9+
ms.subservice: security-fundamentals
1010
ms.topic: article
1111
ms.tgt_pltfrm: na
1212
ms.workload: na
13-
ms.date: 10/02/2019
14-
ms.author: TomSh
13+
ms.date: 01/28/2023
14+
ms.author: terrylan
1515

1616
---
1717
# Azure best practices for network security
@@ -49,14 +49,14 @@ Best practices for logically segmenting subnets include:
4949
**Detail**: Use [CIDR](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing)-based subnetting principles to create your subnets.
5050

5151
**Best practice**: Create network access controls between subnets. Routing between subnets happens automatically, and you don't need to manually configure routing tables. By default, there are no network access controls between the subnets that you create on an Azure virtual network.
52-
**Detail**: Use a [network security group](../../virtual-network/virtual-network-vnet-plan-design-arm.md) to protect against unsolicited traffic into Azure subnets. Network security groups are simple, stateful packet inspection devices that use the 5-tuple approach (source IP, source port, destination IP, destination port, and layer 4 protocol) to create allow/deny rules for network traffic. You allow or deny traffic to and from a single IP address, to and from multiple IP addresses, or to and from entire subnets.
52+
**Detail**: Use a [network security group](../../virtual-network/manage-network-security-group.md) to protect against unsolicited traffic into Azure subnets. Network security groups are simple, stateful packet inspection devices that use the 5-tuple approach (source IP, source port, destination IP, destination port, and layer 4 protocol) to create allow/deny rules for network traffic. You allow or deny traffic to and from a single IP address, to and from multiple IP addresses, or to and from entire subnets.
5353

5454
When you use network security groups for network access control between subnets, you can put resources that belong to the same security zone or role in their own subnets.
5555

5656
**Best practice**: Avoid small virtual networks and subnets to ensure simplicity and flexibility.
5757
**Detail**: Most organizations add more resources than initially planned, and re-allocating addresses is labor intensive. Using small subnets adds limited security value, and mapping a network security group to each subnet adds overhead. Define subnets broadly to ensure that you have flexibility for growth.
5858

59-
**Best practice**: Simplify network security group rule management by defining [Application Security Groups](https://azure.microsoft.com/blog/applicationsecuritygroups/).
59+
**Best practice**: Simplify network security group rule management by defining [Application Security Groups](../..virtual-network/application-security-groups.md).
6060
**Detail**: Define an Application Security Group for lists of IP addresses that you think might change in the future or be used across many network security groups. Be sure to name Application Security Groups clearly so others can understand their content and purpose.
6161

6262
## Adopt a Zero Trust approach
@@ -82,7 +82,7 @@ When you put a virtual machine on an Azure virtual network, the VM can connect t
8282

8383
Although the default system routes are useful for many deployment scenarios, there are times when you want to customize the routing configuration for your deployments. You can configure the next-hop address to reach specific destinations.
8484

85-
We recommend that you configure [user-defined routes](../../virtual-network/virtual-networks-udr-overview.md) when you deploy a security appliance for a virtual network. We talk about this in a later section titled [secure your critical Azure service resources to only your virtual networks](network-best-practices.md#secure-your-critical-azure-service-resources-to-only-your-virtual-networks).
85+
We recommend that you configure [user-defined routes](../../virtual-network/virtual-networks-udr-overview.md#custom-routes) when you deploy a security appliance for a virtual network. We talk about this in a later section titled [secure your critical Azure service resources to only your virtual networks](network-best-practices.md#secure-your-critical-azure-service-resources-to-only-your-virtual-networks).
8686

8787
> [!NOTE]
8888
> User-defined routes are not required, and the default system routes usually work.
@@ -183,7 +183,7 @@ Point-to-site VPN is more secure than direct RDP or SSH connections because the
183183
**Option**: A [site-to-site VPN](../../vpn-gateway/vpn-gateway-howto-site-to-site-classic-portal.md) connects an entire network to another network over the internet. You can use a site-to-site VPN to connect your on-premises network to an Azure virtual network. Users on your on-premises network connect by using the RDP or SSH protocol over the site-to-site VPN connection. You don't have to allow direct RDP or SSH access over the internet.
184184

185185
**Scenario**: Use a dedicated WAN link to provide functionality similar to the site-to-site VPN.
186-
**Option**: Use [ExpressRoute](../../expressroute/index.yml). It provides functionality similar to the site-to-site VPN. The main differences are:
186+
**Option**: Use [ExpressRoute](../../expressroute/expressroute-introduction.md). It provides functionality similar to the site-to-site VPN. The main differences are:
187187

188188
- The dedicated WAN link doesn't traverse the internet.
189189
- Dedicated WAN links are typically more stable and perform better.

0 commit comments

Comments
 (0)