Skip to content

Commit c14ebf6

Browse files
committed
fixes to layout
1 parent dab5c50 commit c14ebf6

File tree

1 file changed

+24
-24
lines changed

1 file changed

+24
-24
lines changed

articles/defender-for-cloud/upcoming-changes.md

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Important changes coming to Microsoft Defender for Cloud
33
description: Upcoming changes to Microsoft Defender for Cloud that you might need to be aware of and for which you might need to plan
44
ms.topic: overview
5-
ms.date: 02/01/2023
5+
ms.date: 02/09/2023
66
---
77

88
# Important upcoming changes to Microsoft Defender for Cloud
@@ -19,25 +19,41 @@ If you're looking for the latest release notes, you'll find them in the [What's
1919
| Planned change | Estimated date for change |
2020
|--|--|
2121
| [Recommendation to find vulnerabilities in running container images to be released for General Availability (GA)](#recommendation-to-find-vulnerabilities-in-running-container-images-to-be-released-for-general-availability-ga) | February 2023 |
22-
| [The built-in policy [Preview]: Private endpoint should be configured for Key Vault is set to be deprecated](#the-built-in-policy-preview-private-endpoint-should-be-configured-for-key-vault-is-set-to-be-deprecated) | February 2023 |
23-
| [Three alerts in Defender for ARM plan are set to be deprecated](#three-alerts-in-defender-for-arm-plan-are-set-to-be-deprecated) | March 2023 |
24-
| [Alerts automatic export to Log Analytics workspace is set to be deprecated](#alerts-automatic-export-to-log-analytics-workspace-is-set-to-be-deprecated) | March 2023 |
22+
| [The built-in policy [Preview]: Private endpoint should be configured for Key Vault is will be deprecated](#the-built-in-policy-preview-private-endpoint-should-be-configured-for-key-vault-will-be-deprecated) | February 2023 |
23+
| [Three alerts in Defender for Three alerts in Defender for Azure Resource Manager plan will be deprecated](#three-alerts-in-defender-for-three-alerts-in-defender-for-azure-resource-manager-plan-will-be-deprecated) | March 2023 |
24+
| [Alerts automatic export to Log Analytics workspace will be deprecated](#alerts-automatic-export-to-log-analytics-workspace-will-be-deprecated) | March 2023 |
2525
| [Deprecation and improvement of selected alerts for Windows and Linux Servers](#deprecation-and-improvement-of-selected-alerts-for-windows-and-linux-servers) | April 2023 |
2626

27-
### Three alerts in Defender for ARM plan are set to be deprecated
27+
### Recommendation to find vulnerabilities in running container images to be released for General Availability (GA)
28+
29+
**Estimated date for change: February 2023**
30+
31+
The [Running container images should have vulnerability findings resolved](defender-for-containers-vulnerability-assessment-azure.md#view-vulnerabilities-for-images-running-on-your-aks-clusters) recommendation is currently in preview. While a recommendation is in preview, it doesn't render a resource unhealthy and isn't included in the calculations of your secure score.
32+
33+
We recommend that you use the recommendation to remediate vulnerabilities in your containers. Remediating the recommendation won't affect your secure score when the recommendation is released as GA. Learn about [recommendation remediation](implement-security-recommendations.md).
34+
35+
### The built-in policy \[Preview]: Private endpoint should be configured for Key Vault will be deprecated
36+
37+
**Estimated date for change: February 2023**
38+
39+
The built-in policy [`[Preview]: Private endpoint should be configured for Key Vault`](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F5f0bc445-3935-4915-9981-011aa2b46147) is set to be deprecated and will be replaced with the [`[Preview]: Azure Key Vaults should use private link`](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fa6abeaec-4d90-4a02-805f-6b26c4d3fbe9) policy.
40+
41+
The related [policy definition](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f7c1b1214-f927-48bf-8882-84f0af6588b1) will also be replaced by this new policy in all standards displayed in the regulatory compliance dashboard.
42+
43+
### Three alerts in Defender for Three alerts in Defender for Azure Resource Manager plan will be deprecated
2844

2945
**Estimated date for change: March 2023**
3046

31-
As we continue to improve the quality of our alerts, the following three alerts from the Defender for ARM plan are set to be deprecated:
47+
As we continue to improve the quality of our alerts, the following three alerts from the Defender for ARM plan will be deprecated:
3248
1. `Activity from a risky IP address (ARM.MCAS_ActivityFromAnonymousIPAddresses)`
3349
1. `Activity from infrequent country (ARM.MCAS_ActivityFromInfrequentCountry)`
3450
1. `Impossible travel activity (ARM.MCAS_ImpossibleTravelActivity)`
3551

3652
You can learn more details about each of these alerts from the [alerts reference list](alerts-reference.md#alerts-resourcemanager).
3753

38-
In the scenario where an activity from a suspicious IP address is detected, one of the following Defender for ARM plan alert `Azure Resource Manager operation from suspicious IP address` or ' Azure Resource Manager operation from suspicious proxy IP address' will be presented.
54+
In the scenario where an activity from a suspicious IP address is detected, one of the following Defender for ARM plan alerts `Azure Resource Manager operation from suspicious IP address` or `Azure Resource Manager operation from suspicious proxy IP address` will be present.
3955

40-
### Alerts automatic export to Log Analytics workspace is set to be deprecated
56+
### Alerts automatic export to Log Analytics workspace will be deprecated
4157

4258
**Estimated date for change: March 2023**
4359

@@ -46,22 +62,6 @@ Currently, Defender for Cloud security alerts are automatically exported to a de
4662
You can export your security alerts to a dedicated Log Analytics workspace with the [Continuous Export](continuous-export.md#set-up-a-continuous-export) feature.
4763
If you have already configured continuous export of your alerts to a Log Analytics workspace, no further action is required.
4864

49-
### Recommendation to find vulnerabilities in running container images to be released for General Availability (GA)
50-
51-
**Estimated date for change: February 2023**
52-
53-
The [Running container images should have vulnerability findings resolved](defender-for-containers-vulnerability-assessment-azure.md#view-vulnerabilities-for-images-running-on-your-aks-clusters) recommendation is currently in preview. While a recommendation is in preview, it doesn't render a resource unhealthy and isn't included in the calculations of your secure score.
54-
55-
We recommend that you use the recommendation to remediate vulnerabilities in your containers. Remediating the recommendation won't affect your secure score when the recommendation is released as GA. Learn about [recommendation remediation](implement-security-recommendations.md).
56-
57-
### The built-in policy \[Preview]: Private endpoint should be configured for Key Vault is set to be deprecated
58-
59-
**Estimated date for change: February 2023**
60-
61-
The built-in policy [`[Preview]: Private endpoint should be configured for Key Vault`](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F5f0bc445-3935-4915-9981-011aa2b46147) is set to be deprecated and will be replaced with the [`[Preview]: Azure Key Vaults should use private link`](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fa6abeaec-4d90-4a02-805f-6b26c4d3fbe9) policy.
62-
63-
The related [policy definition](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f7c1b1214-f927-48bf-8882-84f0af6588b1) will also be replaced by this new policy in all standards displayed in the regulatory compliance dashboard.
64-
6565
### Deprecation and improvement of selected alerts for Windows and Linux Servers
6666

6767
**Estimated date for change: April 2023**

0 commit comments

Comments
 (0)