You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/asset-inventory.md
+22-31Lines changed: 22 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,30 +1,23 @@
1
1
---
2
-
title: Microsoft Defender for Cloud's asset inventory
2
+
title: Using the asset inventory to view your security posture with Microsoft Defender for Cloud
3
3
description: Learn about Microsoft Defender for Cloud's asset management experience providing full visibility over all your Defender for Cloud monitored resources.
4
-
ms.date: 11/14/2022
4
+
ms.date: 01/03/2023
5
5
ms.topic: how-to
6
6
ms.author: benmansheim
7
7
author: bmansheim
8
8
---
9
9
# Use asset inventory to manage your resources' security posture
10
10
11
-
The asset inventory page of Microsoft Defender for Cloud provides a single page for viewing the security posture of the resources you've connected to Microsoft Defender for Cloud.
12
-
13
-
Defender for Cloud periodically analyzes the security state of resources connected to your subscriptions to identify potential security vulnerabilities. It then provides you with recommendations on how to remediate those vulnerabilities.
14
-
15
-
When any resource has outstanding recommendations, they'll appear in the inventory.
11
+
The asset inventory page of Microsoft Defender for Cloud shows the [security posture](concept-cloud-security-posture-management.md) of the resources you've connected to Defender for Cloud. Defender for Cloud periodically analyzes the security state of resources connected to your subscriptions to identify potential security issues and provides you with active recommendations. Active recommendations are recommendations that can be resolved to improve your security posture.
16
12
17
13
Use this view and its filters to address such questions as:
18
14
19
-
- Which of my subscriptions with enhanced security features enabled have outstanding recommendations?
15
+
- Which of my subscriptions with [Defender plans](defender-for-cloud-introduction.md#cwp---identify-unique-workload-security-requirements) enabled have outstanding recommendations?
20
16
- Which of my machines with the tag 'Production' are missing the Log Analytics agent?
21
17
- How many of my machines tagged with a specific tag have outstanding recommendations?
22
18
- Which machines in a specific resource group have a known vulnerability (using a CVE number)?
23
19
24
-
The asset management possibilities for this tool are substantial and continue to grow.
25
-
26
-
> [!TIP]
27
-
> The security recommendations on the asset inventory page are the same as those on the **Recommendations** page, but here they're shown according to the affected resource. For information about how to resolve recommendations, see [Implementing security recommendations in Microsoft Defender for Cloud](review-security-recommendations.md).
20
+
The security recommendations on the asset inventory page are also shown in the **Recommendations** page, but here they're shown according to the affected resource. Learn more about [implementing security recommendations](review-security-recommendations.md).
28
21
29
22
## Availability
30
23
@@ -33,7 +26,7 @@ The asset management possibilities for this tool are substantial and continue to
33
26
|Release state:|General availability (GA)|
34
27
|Pricing:|Free<br> Some features of the inventory page, such as the [software inventory](#access-a-software-inventory) require paid solutions to be in-place|
35
28
|Required roles and permissions:|All users|
36
-
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National (Azure Government, Azure China 21Vianet) <br> <br> Software inventory is not currently supported in national clouds.|
29
+
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National (Azure Government, Azure China 21Vianet) <br> <br> Software inventory isn't currently supported in national clouds.|
37
30
38
31
39
32
## What are the key features of asset inventory?
@@ -47,13 +40,13 @@ The inventory page provides the following tools:
47
40
Before you define any filters, a prominent strip of values at the top of the inventory view shows:
48
41
49
42
-**Total resources**: The total number of resources connected to Defender for Cloud.
50
-
-**Unhealthy resources**: Resources with active security recommendations. [Learn more about security recommendations](review-security-recommendations.md).
43
+
-**Unhealthy resources**: Resources with active security recommendations that you can implement. [Learn more about implementing security recommendations](review-security-recommendations.md).
51
44
-**Unmonitored resources**: Resources with agent monitoring issues - they have the Log Analytics agent deployed, but the agent isn't sending data or has other health issues.
52
-
-**Unregistered subscriptions**: Any subscription in the selected scope that haven't yet been connected to Microsoft Defender for Cloud.
45
+
-**Unregistered subscriptions**: Any subscription in the selected scope that hasn't yet been connected to Microsoft Defender for Cloud.
53
46
54
47
### 2 - Filters
55
48
56
-
The multiple filters at the top of the page provide a way to quickly refine the list of resources according to the question you're trying to answer. For example, if you wanted to answer the question *Which of my machines with the tag 'Production' are missing the Log Analytics agent?* you could combine the **Agent monitoring** filter with the **Tags** filter.
49
+
The multiple filters at the top of the page provide a way to quickly refine the list of resources according to the question you're trying to answer. For example, if you wanted to know which of your machines with the tag 'Production' are missing the Log Analytics agent, you can filter the list for **Agent monitoring**:"Not installed" and **Tags**:"Production".
57
50
58
51
As soon as you've applied filters, the summary values are updated to relate to the query results.
59
52
@@ -72,19 +65,17 @@ As soon as you've applied filters, the summary values are updated to relate to t
72
65
73
66
## How does asset inventory work?
74
67
75
-
Asset inventory utilizes [Azure Resource Graph (ARG)](../governance/resource-graph/index.yml), an Azure service that provides the ability to query Defender for Cloud's security posture data across multiple subscriptions.
68
+
Asset inventory utilizes [Azure Resource Graph (ARG)](../governance/resource-graph/index.yml), an Azure service that lets you query Defender for Cloud's security posture data across multiple subscriptions.
76
69
77
70
ARG is designed to provide efficient resource exploration with the ability to query at scale.
78
71
79
-
Using the [Kusto Query Language (KQL)](/azure/data-explorer/kusto/query/), asset inventory can quickly produce deep insights by cross-referencing Defender for Cloud data with other resource properties.
72
+
You can use [Kusto Query Language (KQL)](/azure/data-explorer/kusto/query/) in the asset inventory to quickly produce deep insights by cross-referencing Defender for Cloud data with other resource properties.
80
73
81
74
## How to use asset inventory
82
75
83
76
1. From Defender for Cloud's sidebar, select **Inventory**.
84
77
85
-
1. Use the **Filter by name** box to display a specific resource, or use the filters as described below.
86
-
87
-
1. Select the relevant options in the filters to create the specific query you want to perform.
78
+
1. Use the **Filter by name** box to display a specific resource, or use the filters to focus on specific resources.
88
79
89
80
By default, the resources are sorted by the number of active security recommendations.
90
81
@@ -104,12 +95,12 @@ Using the [Kusto Query Language (KQL)](/azure/data-explorer/kusto/query/), asset
104
95
105
96
1. <aid="onoffpartial"></a>To use the **Defender for Cloud** filter, select one or more options (Off, On, or Partial):
106
97
107
-
-**Off** - Resources that aren't protected by a Microsoft Defender plan. You can right-click on any of these and upgrade them:
98
+
-**Off** - Resources not protected by a Microsoft Defender plan. You can right-click on the resources and upgrade them:
108
99
109
100
:::image type="content" source="./media/asset-inventory/upgrade-resource-inventory.png" alt-text="Upgrade a resource to be protected by the relevant Microsoft Defender plan via right-click." lightbox="./media/asset-inventory/upgrade-resource-inventory.png":::
110
101
111
-
-**On** - Resources that are protected by a Microsoft Defender plan
112
-
-**Partial** - This applies to **subscriptions**that have some but not all of the Microsoft Defender plans disabled. For example, the following subscription has seven Microsoft Defender plans disabled.
102
+
-**On** - Resources protected by a Microsoft Defender plan
103
+
-**Partial** - **Subscriptions**with some but not all of the Microsoft Defender plans disabled. For example, the following subscription has seven Microsoft Defender plans disabled.
113
104
114
105
:::image type="content" source="./media/asset-inventory/pricing-tier-partial.png" alt-text="Subscription partially protected by Microsoft Defender plans.":::
115
106
@@ -134,9 +125,9 @@ If you've already enabled the integration with Microsoft Defender for Endpoint a
134
125
:::image type="content" source="media/asset-inventory/software-inventory-filters.gif" alt-text="If you've enabled the threat and vulnerability solution, Defender for Cloud's asset inventory offers a filter to select resources by their installed software.":::
135
126
136
127
> [!NOTE]
137
-
> The "Blank" option shows machines without Microsoft Defender for Endpoint (or without Microsoft Defender for Servers).
128
+
> The "Blank" option shows machines without Microsoft Defender for Endpoint or without Microsoft Defender for Servers.
138
129
139
-
As well as the filters in the asset inventory page, you can explore the software inventory data from Azure Resource Graph Explorer.
130
+
Besides the filters in the asset inventory page, you can explore the software inventory data from Azure Resource Graph Explorer.
140
131
141
132
Examples of using Azure Resource Graph Explorer to access and explore software inventory data:
142
133
@@ -195,17 +186,17 @@ Examples of using Azure Resource Graph Explorer to access and explore software i
195
186
196
187
## FAQ - Inventory
197
188
198
-
### Why aren't all of my subscriptions, machines, storage accounts, etc. shown?
189
+
### Why aren't all of my resources shown, such as subscriptions, machines, storage accounts?
199
190
200
-
The inventory view lists your Defender for Cloud connected resources from a Cloud Security Posture Management (CSPM) perspective. The filters don't return every resource in your environment; only the ones with outstanding (or 'active') recommendations.
191
+
The inventory view lists your Defender for Cloud connected resources from a Cloud Security Posture Management (CSPM) perspective. The filters show only the resources with active recommendations.
201
192
202
-
For example, the following screenshot shows a user with access to 8 subscriptions but only 7 currently have recommendations. So when they filter by **Resource type = Subscriptions**, only those 7 subscriptions with active recommendations appear in the inventory:
193
+
For example, if you have access to eight subscriptions but only seven currently have recommendations, filter by **Resource type = Subscriptions** shows only the seven subscriptions with active recommendations:
203
194
204
-
:::image type="content" source="./media/asset-inventory/filtered-subscriptions-some.png" alt-text="Not all subs returned when there are no active recommendations." lightbox="./media/asset-inventory/filtered-subscriptions-some.png":::
195
+
:::image type="content" source="./media/asset-inventory/filtered-subscriptions-some.png" alt-text="Not all subscriptions returned when there are no active recommendations." lightbox="./media/asset-inventory/filtered-subscriptions-some.png":::
205
196
206
197
### Why do some of my resources show blank values in the Defender for Cloud or monitoring agent columns?
207
198
208
-
Not all Defender for Cloud monitored resources have agents. For example, Azure Storage accounts or PaaS resources such as disks, Logic Apps, Data Lake Analysis, and Event Hub don't need agents to be monitored by Defender for Cloud.
199
+
Not all Defender for Cloud monitored resources require agents. For example, Defender for Cloud doesn't require agents to monitor Azure Storage accounts or PaaS resources, such as disks, Logic Apps, Data Lake Analysis, and Event Hubs.
209
200
210
201
When pricing or agent monitoring isn't relevant for a resource, nothing will be shown in those columns of inventory.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/continuous-export.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ This article describes how to configure continuous export to Log Analytics works
28
28
|----|:----|
29
29
|Release state:|General availability (GA)|
30
30
|Pricing:|Free|
31
-
|Required roles and permissions:|<ul><li>**Security admin** or **Owner** on the resource group</li><li>Write permissions for the target resource.</li><li>If you're using the Azure Policy 'DeployIfNotExist' policies described below, you'll also need permissions for assigning policies</li><li>To export data to Event Hubs, you'll need Write permission on the Event Hubs Policy.</li><li>To export to a Log Analytics workspace:<ul><li>if it **has the SecurityCenterFree solution**, you'll need a minimum of read permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/read`</li><li>if it **doesn't have the SecurityCenterFree solution**, you'll need write permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/action`</li><li>Learn more about [Azure Monitor and Log Analytics workspace solutions](../azure-monitor/insights/solutions.md)</li></ul></li></ul>|
31
+
|Required roles and permissions:|<ul><li>**Security admin** or **Owner** on the resource group</li><li>Write permissions for the target resource.</li><li>If you're using the [Azure Policy 'DeployIfNotExist' policies](#configure-continuous-export-at-scale-using-the-supplied-policies), you'll also need permissions for assigning policies</li><li>To export data to Event Hubs, you'll need Write permission on the Event Hubs Policy.</li><li>To export to a Log Analytics workspace:<ul><li>if it **has the SecurityCenterFree solution**, you'll need a minimum of read permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/read`</li><li>if it **doesn't have the SecurityCenterFree solution**, you'll need write permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/action`</li><li>Learn more about [Azure Monitor and Log Analytics workspace solutions](../azure-monitor/insights/solutions.md)</li></ul></li></ul>|
32
32
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National (Azure Government, Azure China 21Vianet)|
33
33
34
34
## What data types can be exported?
@@ -47,13 +47,13 @@ Continuous export can export the following data types whenever they change:
47
47
48
48
## Set up a continuous export
49
49
50
-
You can configure continuous export from the Microsoft Defender for Cloud pages in Azure portal, via the REST API, or at scale using the supplied Azure Policy templates. Select the appropriate tab below for details of each.
50
+
You can configure continuous export from the Microsoft Defender for Cloud pages in Azure portal, via the REST API, or at scale using the supplied Azure Policy templates.
51
51
52
52
### [**Use the Azure portal**](#tab/azure-portal)
53
53
54
54
### Configure continuous export from the Defender for Cloud pages in Azure portal
55
55
56
-
The steps below are necessary whether you're setting up a continuous export to Log Analytics or Azure Event Hubs.
56
+
If you're setting up a continuous export to Log Analytics or Azure Event Hubs:
57
57
58
58
1. From Defender for Cloud's menu, open **Environment settings**.
59
59
@@ -82,9 +82,9 @@ The steps below are necessary whether you're setting up a continuous export to L
1. From the "Export target" area, choose where you'd like the data saved. Data can be saved in a target of a different subscription (for example on a Central Event Hub instance or a central Log Analytics workspace).
85
+
1. From the "Export target" area, choose where you'd like the data saved. Data can be saved in a target of a different subscription (for example, on a Central Event Hubs instance or a central Log Analytics workspace).
86
86
87
-
You can also send the data to an [Event hub or Log Analytics workspace in a different tenant](#export-data-to-an-azure-event-hub-or-log-analytics-workspace-in-another-tenant).
87
+
You can also send the data to an [Event hubs or Log Analytics workspace in a different tenant](#export-data-to-an-azure-event-hub-or-log-analytics-workspace-in-another-tenant).
88
88
89
89
1. Select **Save**.
90
90
@@ -97,11 +97,11 @@ The steps below are necessary whether you're setting up a continuous export to L
97
97
98
98
Continuous export can be configured and managed via the Microsoft Defender for Cloud [automations API](/rest/api/defenderforcloud/automations). Use this API to create or update rules for exporting to any of the following possible destinations:
99
99
100
-
- Azure Event Hub
100
+
- Azure Event Hubs
101
101
- Log Analytics workspace
102
102
- Azure Logic Apps
103
103
104
-
You can also send the data to an [Event hub or Log Analytics workspace in a different tenant](#export-data-to-an-azure-event-hub-or-log-analytics-workspace-in-another-tenant).
104
+
You can also send the data to an [Event Hubs or Log Analytics workspace in a different tenant](#export-data-to-an-azure-event-hub-or-log-analytics-workspace-in-another-tenant).
105
105
106
106
Here are some examples of options that you can only use in the API:
107
107
@@ -120,11 +120,11 @@ Here are some examples of options that you can only use in the API:
120
120
121
121
Automating your organization's monitoring and incident response processes can greatly improve the time it takes to investigate and mitigate security incidents.
122
122
123
-
To deploy your continuous export configurations across your organization, use the supplied Azure Policy 'DeployIfNotExist' policies described below to create and configure continuous export procedures.
123
+
To deploy your continuous export configurations across your organization, use the supplied Azure Policy 'DeployIfNotExist' policies to create and configure continuous export procedures.
124
124
125
125
**To implement these policies**
126
126
127
-
1.From the table below, select the policy you want to apply:
127
+
1.Select the policy you want to apply from this table:
128
128
129
129
|Goal |Policy |Policy ID |
130
130
|---------|---------|---------|
@@ -248,7 +248,7 @@ Continuous export can be helpful in to prepare for BCDR scenarios where the targ
248
248
249
249
Learn more in [Azure Event Hubs - Geo-disaster recovery](../event-hubs/event-hubs-geo-dr.md).
250
250
251
-
### What is the minimum SAS policy permissions required when exporting data to Azure Event Hub?
251
+
### What is the minimum SAS policy permissions required when exporting data to Azure Event Hubs?
252
252
253
253
**Send** is the minimum SAS policy permissions required. For step-by-step instructions, see **Step 1. Create an Event Hubs namespace and event hub with send permissions** in [this article](./export-to-splunk-or-qradar.md#step-1-create-an-event-hubs-namespace-and-event-hub-with-send-permissions).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-cloud-introduction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.date: 10/04/2022
10
10
11
11
Microsoft Defender for Cloud is a Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP) for all of your Azure, on-premises, and multicloud (Amazon AWS and Google GCP) resources. Defender for Cloud fills three vital needs as you manage the security of your resources and workloads in the cloud and on-premises:
12
12
13
-
:::image type="content" source="media/defender-for-cloud-introduction/defender-for-cloud-synopsis.png" alt-text="Understanding the core functionality of Microsoft Defender for Cloud.":::
13
+
:::image type="content" source="media/defender-for-cloud-introduction/defender-for-cloud-synopsis.png" alt-text="Diagram that shows the core functionality of Microsoft Defender for Cloud.":::
14
14
15
15
-[**Defender for Cloud secure score**](secure-score-security-controls.md)**continually assesses** your security posture so you can track new security opportunities and precisely report on the progress of your security efforts.
16
16
-[**Defender for Cloud recommendations**](security-policy-concept.md)**secures** your workloads with step-by-step actions that protect your workloads from known security risks.
0 commit comments