Skip to content

Commit c2c9f7b

Browse files
authored
Merge pull request #222737 from bmansheim/acrolinx-fixes
Fixes based on acrolinx recommendations
2 parents f62125a + 0bc4e34 commit c2c9f7b

File tree

6 files changed

+43
-51
lines changed

6 files changed

+43
-51
lines changed

articles/defender-for-cloud/asset-inventory.md

Lines changed: 22 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -1,30 +1,23 @@
11
---
2-
title: Microsoft Defender for Cloud's asset inventory
2+
title: Using the asset inventory to view your security posture with Microsoft Defender for Cloud
33
description: Learn about Microsoft Defender for Cloud's asset management experience providing full visibility over all your Defender for Cloud monitored resources.
4-
ms.date: 11/14/2022
4+
ms.date: 01/03/2023
55
ms.topic: how-to
66
ms.author: benmansheim
77
author: bmansheim
88
---
99
# Use asset inventory to manage your resources' security posture
1010

11-
The asset inventory page of Microsoft Defender for Cloud provides a single page for viewing the security posture of the resources you've connected to Microsoft Defender for Cloud.
12-
13-
Defender for Cloud periodically analyzes the security state of resources connected to your subscriptions to identify potential security vulnerabilities. It then provides you with recommendations on how to remediate those vulnerabilities.
14-
15-
When any resource has outstanding recommendations, they'll appear in the inventory.
11+
The asset inventory page of Microsoft Defender for Cloud shows the [security posture](concept-cloud-security-posture-management.md) of the resources you've connected to Defender for Cloud. Defender for Cloud periodically analyzes the security state of resources connected to your subscriptions to identify potential security issues and provides you with active recommendations. Active recommendations are recommendations that can be resolved to improve your security posture.
1612

1713
Use this view and its filters to address such questions as:
1814

19-
- Which of my subscriptions with enhanced security features enabled have outstanding recommendations?
15+
- Which of my subscriptions with [Defender plans](defender-for-cloud-introduction.md#cwp---identify-unique-workload-security-requirements) enabled have outstanding recommendations?
2016
- Which of my machines with the tag 'Production' are missing the Log Analytics agent?
2117
- How many of my machines tagged with a specific tag have outstanding recommendations?
2218
- Which machines in a specific resource group have a known vulnerability (using a CVE number)?
2319

24-
The asset management possibilities for this tool are substantial and continue to grow.
25-
26-
> [!TIP]
27-
> The security recommendations on the asset inventory page are the same as those on the **Recommendations** page, but here they're shown according to the affected resource. For information about how to resolve recommendations, see [Implementing security recommendations in Microsoft Defender for Cloud](review-security-recommendations.md).
20+
The security recommendations on the asset inventory page are also shown in the **Recommendations** page, but here they're shown according to the affected resource. Learn more about [implementing security recommendations](review-security-recommendations.md).
2821

2922
## Availability
3023

@@ -33,7 +26,7 @@ The asset management possibilities for this tool are substantial and continue to
3326
|Release state:|General availability (GA)|
3427
|Pricing:|Free<br> Some features of the inventory page, such as the [software inventory](#access-a-software-inventory) require paid solutions to be in-place|
3528
|Required roles and permissions:|All users|
36-
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National (Azure Government, Azure China 21Vianet) <br> <br> Software inventory is not currently supported in national clouds.|
29+
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National (Azure Government, Azure China 21Vianet) <br> <br> Software inventory isn't currently supported in national clouds.|
3730

3831

3932
## What are the key features of asset inventory?
@@ -47,13 +40,13 @@ The inventory page provides the following tools:
4740
Before you define any filters, a prominent strip of values at the top of the inventory view shows:
4841

4942
- **Total resources**: The total number of resources connected to Defender for Cloud.
50-
- **Unhealthy resources**: Resources with active security recommendations. [Learn more about security recommendations](review-security-recommendations.md).
43+
- **Unhealthy resources**: Resources with active security recommendations that you can implement. [Learn more about implementing security recommendations](review-security-recommendations.md).
5144
- **Unmonitored resources**: Resources with agent monitoring issues - they have the Log Analytics agent deployed, but the agent isn't sending data or has other health issues.
52-
- **Unregistered subscriptions**: Any subscription in the selected scope that haven't yet been connected to Microsoft Defender for Cloud.
45+
- **Unregistered subscriptions**: Any subscription in the selected scope that hasn't yet been connected to Microsoft Defender for Cloud.
5346

5447
### 2 - Filters
5548

56-
The multiple filters at the top of the page provide a way to quickly refine the list of resources according to the question you're trying to answer. For example, if you wanted to answer the question *Which of my machines with the tag 'Production' are missing the Log Analytics agent?* you could combine the **Agent monitoring** filter with the **Tags** filter.
49+
The multiple filters at the top of the page provide a way to quickly refine the list of resources according to the question you're trying to answer. For example, if you wanted to know which of your machines with the tag 'Production' are missing the Log Analytics agent, you can filter the list for **Agent monitoring**:"Not installed" and **Tags**:"Production".
5750

5851
As soon as you've applied filters, the summary values are updated to relate to the query results.
5952

@@ -72,19 +65,17 @@ As soon as you've applied filters, the summary values are updated to relate to t
7265

7366
## How does asset inventory work?
7467

75-
Asset inventory utilizes [Azure Resource Graph (ARG)](../governance/resource-graph/index.yml), an Azure service that provides the ability to query Defender for Cloud's security posture data across multiple subscriptions.
68+
Asset inventory utilizes [Azure Resource Graph (ARG)](../governance/resource-graph/index.yml), an Azure service that lets you query Defender for Cloud's security posture data across multiple subscriptions.
7669

7770
ARG is designed to provide efficient resource exploration with the ability to query at scale.
7871

79-
Using the [Kusto Query Language (KQL)](/azure/data-explorer/kusto/query/), asset inventory can quickly produce deep insights by cross-referencing Defender for Cloud data with other resource properties.
72+
You can use [Kusto Query Language (KQL)](/azure/data-explorer/kusto/query/) in the asset inventory to quickly produce deep insights by cross-referencing Defender for Cloud data with other resource properties.
8073

8174
## How to use asset inventory
8275

8376
1. From Defender for Cloud's sidebar, select **Inventory**.
8477

85-
1. Use the **Filter by name** box to display a specific resource, or use the filters as described below.
86-
87-
1. Select the relevant options in the filters to create the specific query you want to perform.
78+
1. Use the **Filter by name** box to display a specific resource, or use the filters to focus on specific resources.
8879

8980
By default, the resources are sorted by the number of active security recommendations.
9081

@@ -104,12 +95,12 @@ Using the [Kusto Query Language (KQL)](/azure/data-explorer/kusto/query/), asset
10495
10596
1. <a id="onoffpartial"></a>To use the **Defender for Cloud** filter, select one or more options (Off, On, or Partial):
10697

107-
- **Off** - Resources that aren't protected by a Microsoft Defender plan. You can right-click on any of these and upgrade them:
98+
- **Off** - Resources not protected by a Microsoft Defender plan. You can right-click on the resources and upgrade them:
10899

109100
:::image type="content" source="./media/asset-inventory/upgrade-resource-inventory.png" alt-text="Upgrade a resource to be protected by the relevant Microsoft Defender plan via right-click." lightbox="./media/asset-inventory/upgrade-resource-inventory.png":::
110101

111-
- **On** - Resources that are protected by a Microsoft Defender plan
112-
- **Partial** - This applies to **subscriptions** that have some but not all of the Microsoft Defender plans disabled. For example, the following subscription has seven Microsoft Defender plans disabled.
102+
- **On** - Resources protected by a Microsoft Defender plan
103+
- **Partial** - **Subscriptions** with some but not all of the Microsoft Defender plans disabled. For example, the following subscription has seven Microsoft Defender plans disabled.
113104

114105
:::image type="content" source="./media/asset-inventory/pricing-tier-partial.png" alt-text="Subscription partially protected by Microsoft Defender plans.":::
115106

@@ -134,9 +125,9 @@ If you've already enabled the integration with Microsoft Defender for Endpoint a
134125
:::image type="content" source="media/asset-inventory/software-inventory-filters.gif" alt-text="If you've enabled the threat and vulnerability solution, Defender for Cloud's asset inventory offers a filter to select resources by their installed software.":::
135126

136127
> [!NOTE]
137-
> The "Blank" option shows machines without Microsoft Defender for Endpoint (or without Microsoft Defender for Servers).
128+
> The "Blank" option shows machines without Microsoft Defender for Endpoint or without Microsoft Defender for Servers.
138129
139-
As well as the filters in the asset inventory page, you can explore the software inventory data from Azure Resource Graph Explorer.
130+
Besides the filters in the asset inventory page, you can explore the software inventory data from Azure Resource Graph Explorer.
140131

141132
Examples of using Azure Resource Graph Explorer to access and explore software inventory data:
142133

@@ -195,17 +186,17 @@ Examples of using Azure Resource Graph Explorer to access and explore software i
195186
196187
## FAQ - Inventory
197188
198-
### Why aren't all of my subscriptions, machines, storage accounts, etc. shown?
189+
### Why aren't all of my resources shown, such as subscriptions, machines, storage accounts?
199190
200-
The inventory view lists your Defender for Cloud connected resources from a Cloud Security Posture Management (CSPM) perspective. The filters don't return every resource in your environment; only the ones with outstanding (or 'active') recommendations.
191+
The inventory view lists your Defender for Cloud connected resources from a Cloud Security Posture Management (CSPM) perspective. The filters show only the resources with active recommendations.
201192
202-
For example, the following screenshot shows a user with access to 8 subscriptions but only 7 currently have recommendations. So when they filter by **Resource type = Subscriptions**, only those 7 subscriptions with active recommendations appear in the inventory:
193+
For example, if you have access to eight subscriptions but only seven currently have recommendations, filter by **Resource type = Subscriptions** shows only the seven subscriptions with active recommendations:
203194
204-
:::image type="content" source="./media/asset-inventory/filtered-subscriptions-some.png" alt-text="Not all subs returned when there are no active recommendations." lightbox="./media/asset-inventory/filtered-subscriptions-some.png":::
195+
:::image type="content" source="./media/asset-inventory/filtered-subscriptions-some.png" alt-text="Not all subscriptions returned when there are no active recommendations." lightbox="./media/asset-inventory/filtered-subscriptions-some.png":::
205196
206197
### Why do some of my resources show blank values in the Defender for Cloud or monitoring agent columns?
207198
208-
Not all Defender for Cloud monitored resources have agents. For example, Azure Storage accounts or PaaS resources such as disks, Logic Apps, Data Lake Analysis, and Event Hub don't need agents to be monitored by Defender for Cloud.
199+
Not all Defender for Cloud monitored resources require agents. For example, Defender for Cloud doesn't require agents to monitor Azure Storage accounts or PaaS resources, such as disks, Logic Apps, Data Lake Analysis, and Event Hubs.
209200
210201
When pricing or agent monitoring isn't relevant for a resource, nothing will be shown in those columns of inventory.
211202

articles/defender-for-cloud/continuous-export.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ This article describes how to configure continuous export to Log Analytics works
2828
|----|:----|
2929
|Release state:|General availability (GA)|
3030
|Pricing:|Free|
31-
|Required roles and permissions:|<ul><li>**Security admin** or **Owner** on the resource group</li><li>Write permissions for the target resource.</li><li>If you're using the Azure Policy 'DeployIfNotExist' policies described below, you'll also need permissions for assigning policies</li><li>To export data to Event Hubs, you'll need Write permission on the Event Hubs Policy.</li><li>To export to a Log Analytics workspace:<ul><li>if it **has the SecurityCenterFree solution**, you'll need a minimum of read permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/read`</li><li>if it **doesn't have the SecurityCenterFree solution**, you'll need write permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/action`</li><li>Learn more about [Azure Monitor and Log Analytics workspace solutions](../azure-monitor/insights/solutions.md)</li></ul></li></ul>|
31+
|Required roles and permissions:|<ul><li>**Security admin** or **Owner** on the resource group</li><li>Write permissions for the target resource.</li><li>If you're using the [Azure Policy 'DeployIfNotExist' policies](#configure-continuous-export-at-scale-using-the-supplied-policies), you'll also need permissions for assigning policies</li><li>To export data to Event Hubs, you'll need Write permission on the Event Hubs Policy.</li><li>To export to a Log Analytics workspace:<ul><li>if it **has the SecurityCenterFree solution**, you'll need a minimum of read permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/read`</li><li>if it **doesn't have the SecurityCenterFree solution**, you'll need write permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/action`</li><li>Learn more about [Azure Monitor and Log Analytics workspace solutions](../azure-monitor/insights/solutions.md)</li></ul></li></ul>|
3232
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National (Azure Government, Azure China 21Vianet)|
3333

3434
## What data types can be exported?
@@ -47,13 +47,13 @@ Continuous export can export the following data types whenever they change:
4747

4848
## Set up a continuous export
4949

50-
You can configure continuous export from the Microsoft Defender for Cloud pages in Azure portal, via the REST API, or at scale using the supplied Azure Policy templates. Select the appropriate tab below for details of each.
50+
You can configure continuous export from the Microsoft Defender for Cloud pages in Azure portal, via the REST API, or at scale using the supplied Azure Policy templates.
5151

5252
### [**Use the Azure portal**](#tab/azure-portal)
5353

5454
### Configure continuous export from the Defender for Cloud pages in Azure portal
5555

56-
The steps below are necessary whether you're setting up a continuous export to Log Analytics or Azure Event Hubs.
56+
If you're setting up a continuous export to Log Analytics or Azure Event Hubs:
5757

5858
1. From Defender for Cloud's menu, open **Environment settings**.
5959

@@ -82,9 +82,9 @@ The steps below are necessary whether you're setting up a continuous export to L
8282

8383
:::image type="content" source="./media/continuous-export/include-security-findings-toggle.png" alt-text="Include security findings toggle in continuous export configuration." :::
8484

85-
1. From the "Export target" area, choose where you'd like the data saved. Data can be saved in a target of a different subscription (for example on a Central Event Hub instance or a central Log Analytics workspace).
85+
1. From the "Export target" area, choose where you'd like the data saved. Data can be saved in a target of a different subscription (for example, on a Central Event Hubs instance or a central Log Analytics workspace).
8686

87-
You can also send the data to an [Event hub or Log Analytics workspace in a different tenant](#export-data-to-an-azure-event-hub-or-log-analytics-workspace-in-another-tenant).
87+
You can also send the data to an [Event hubs or Log Analytics workspace in a different tenant](#export-data-to-an-azure-event-hub-or-log-analytics-workspace-in-another-tenant).
8888

8989
1. Select **Save**.
9090

@@ -97,11 +97,11 @@ The steps below are necessary whether you're setting up a continuous export to L
9797

9898
Continuous export can be configured and managed via the Microsoft Defender for Cloud [automations API](/rest/api/defenderforcloud/automations). Use this API to create or update rules for exporting to any of the following possible destinations:
9999

100-
- Azure Event Hub
100+
- Azure Event Hubs
101101
- Log Analytics workspace
102102
- Azure Logic Apps
103103

104-
You can also send the data to an [Event hub or Log Analytics workspace in a different tenant](#export-data-to-an-azure-event-hub-or-log-analytics-workspace-in-another-tenant).
104+
You can also send the data to an [Event Hubs or Log Analytics workspace in a different tenant](#export-data-to-an-azure-event-hub-or-log-analytics-workspace-in-another-tenant).
105105

106106
Here are some examples of options that you can only use in the API:
107107

@@ -120,11 +120,11 @@ Here are some examples of options that you can only use in the API:
120120

121121
Automating your organization's monitoring and incident response processes can greatly improve the time it takes to investigate and mitigate security incidents.
122122

123-
To deploy your continuous export configurations across your organization, use the supplied Azure Policy 'DeployIfNotExist' policies described below to create and configure continuous export procedures.
123+
To deploy your continuous export configurations across your organization, use the supplied Azure Policy 'DeployIfNotExist' policies to create and configure continuous export procedures.
124124

125125
**To implement these policies**
126126

127-
1. From the table below, select the policy you want to apply:
127+
1. Select the policy you want to apply from this table:
128128

129129
|Goal |Policy |Policy ID |
130130
|---------|---------|---------|
@@ -248,7 +248,7 @@ Continuous export can be helpful in to prepare for BCDR scenarios where the targ
248248

249249
Learn more in [Azure Event Hubs - Geo-disaster recovery](../event-hubs/event-hubs-geo-dr.md).
250250

251-
### What is the minimum SAS policy permissions required when exporting data to Azure Event Hub?
251+
### What is the minimum SAS policy permissions required when exporting data to Azure Event Hubs?
252252

253253
**Send** is the minimum SAS policy permissions required. For step-by-step instructions, see **Step 1. Create an Event Hubs namespace and event hub with send permissions** in [this article](./export-to-splunk-or-qradar.md#step-1-create-an-event-hubs-namespace-and-event-hub-with-send-permissions).
254254

articles/defender-for-cloud/defender-for-cloud-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 10/04/2022
1010

1111
Microsoft Defender for Cloud is a Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP) for all of your Azure, on-premises, and multicloud (Amazon AWS and Google GCP) resources. Defender for Cloud fills three vital needs as you manage the security of your resources and workloads in the cloud and on-premises:
1212

13-
:::image type="content" source="media/defender-for-cloud-introduction/defender-for-cloud-synopsis.png" alt-text="Understanding the core functionality of Microsoft Defender for Cloud.":::
13+
:::image type="content" source="media/defender-for-cloud-introduction/defender-for-cloud-synopsis.png" alt-text="Diagram that shows the core functionality of Microsoft Defender for Cloud.":::
1414

1515
- [**Defender for Cloud secure score**](secure-score-security-controls.md) **continually assesses** your security posture so you can track new security opportunities and precisely report on the progress of your security efforts.
1616
- [**Defender for Cloud recommendations**](security-policy-concept.md) **secures** your workloads with step-by-step actions that protect your workloads from known security risks.

0 commit comments

Comments
 (0)