Skip to content

Commit c36aa5b

Browse files
committed
mfa moved from upcoming to rn
1 parent 0ca4f6c commit c36aa5b

File tree

2 files changed

+50
-52
lines changed

2 files changed

+50
-52
lines changed

articles/defender-for-cloud/release-notes.md

Lines changed: 49 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Release notes for Microsoft Defender for Cloud
33
description: A description of what's new and changed in Microsoft Defender for Cloud
44
ms.topic: reference
5-
ms.date: 06/20/2022
5+
ms.date: 06/21/2022
66
---
77

88
# What's new in Microsoft Defender for Cloud?
@@ -26,6 +26,7 @@ Updates in June include:
2626
- [Alerts by resource group](#alerts-by-resource-group)
2727
- [General availability (GA) for Microsoft Defender for Azure Cosmos DB](#general-availability-ga-for-microsoft-defender-for-azure-cosmos-db)
2828
- [Auto-provisioning of Microsoft Defender for Endpoint unified solution](#auto-provisioning-of-microsoft-defender-for-endpoint-unified-solution)
29+
- [Multiple changes to identity recommendations](#multiple-changes-to-identity-recommendations)
2930

3031
### Drive implementation of security recommendations to enhance your security posture
3132

@@ -97,6 +98,53 @@ Now, the new unified solution is available for all machines in both plans, for b
9798

9899
Learn more about [MDE integration with Defender for Servers.](integration-defender-for-endpoint.md#users-with-defender-for-servers-enabled-and-microsoft-defender-for-endpoint-deployed).
99100

101+
### Multiple changes to identity recommendations
102+
103+
There have been changes to Defender for Cloud's multiple recommendations for improving the management of users and accounts.
104+
105+
#### New recommendations
106+
107+
The new release contains the following capabilities:
108+
109+
- **Extended evaluation scope** – Coverage has been improved for identity accounts without MFA and external accounts on Azure resources (instead of subscriptions only) which allows your security administrators to view role assignments per account.
110+
111+
- **Improved freshness interval** - The identity recommendations now have a freshness interval of 12 hours.
112+
113+
- **Account exemption capability** - Defender for Cloud has many features you can use to customize your experience and ensure that your secure score reflects your organization's security priorities. For example, you can [exempt resources and recommendations from your secure score](exempt-resource.md).
114+
115+
This update allows you to exempt specific accounts from evaluation with the six recommendations listed in the following table.
116+
117+
Typically, you'd exempt emergency “break glass” accounts from MFA recommendations, because such accounts are often deliberately excluded from an organization's MFA requirements. Alternatively, you might have external accounts that you'd like to permit access to but which don't have MFA enabled.
118+
119+
> [!TIP]
120+
> When you exempt an account, it won't be shown as unhealthy and also won't cause a subscription to appear unhealthy.
121+
122+
|Recommendation| Assessment key|
123+
|-|-|
124+
|MFA should be enabled on accounts with owner permissions on your subscription|94290b00-4d0c-d7b4-7cea-064a9554e681|
125+
|MFA should be enabled on accounts with read permissions on your subscription|151e82c5-5341-a74b-1eb0-bc38d2c84bb5|
126+
|MFA should be enabled on accounts with write permissions on your subscription|57e98606-6b1e-6193-0e3d-fe621387c16b|
127+
|External accounts with owner permissions should be removed from your subscription|c3b6ae71-f1f0-31b4-e6c1-d5951285d03d|
128+
|External accounts with read permissions should be removed from your subscription|a8c6a4ad-d51e-88fe-2979-d3ee3c864f8b|
129+
|External accounts with write permissions should be removed from your subscription|04e7147b-0deb-9796-2e5c-0336343ceb3d|
130+
131+
#### Recommendations rename
132+
133+
The following two recommendations have been renamed and their descriptions have been altered. The assessment keys weren't changed.
134+
135+
| Property | Current value | New update's change |
136+
|----|----|----|
137+
|**First recommendation**| - | - |
138+
|Assessment key | e52064aa-6853-e252-a11e-dffc675689c2 | No change|
139+
| Name | [Deprecated accounts with owner permissions should be removed from your subscription](https://ms.portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/e52064aa-6853-e252-a11e-dffc675689c2) |Subscriptions should be purged of accounts that are blocked in Active Directory and have owner permissions.|
140+
|Description| User accounts that have been blocked from signing in, should be removed from your subscriptions.|These accounts can be targets for attackers looking to find ways to access your data without being noticed. <br> Learn more about securing the identity perimeter in [Azure Identity Management and access control security best practices](../security/fundamentals/identity-management-best-practices.md).|
141+
|Related policy|[Deprecated accounts with owner permissions should be removed from your subscription](https://ms.portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2febb62a0c-3560-49e1-89ed-27e074e9f8ad) | Subscriptions should be purged of accounts that are blocked in Active Directory and have owner permissions.|
142+
|**Second recommendation**| - | - |
143+
| Assessment key | 00c6d40b-e990-6acf-d4f3-471e747a27c4 | No change |
144+
| Name | [Deprecated accounts should be removed from your subscription](https://ms.portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/00c6d40b-e990-6acf-d4f3-471e747a27c4)|Subscriptions should be purged of accounts that are blocked in Active Directory and have read and write permissions.|
145+
|Description|User accounts that have been blocked from signing in, should be removed from your subscriptions. <br> These accounts can be targets for attackers looking to find ways to access your data without being noticed.|User accounts that have been blocked from signing into Active Directory, should be removed from your subscriptions.<br> Learn more about securing the identity perimeter in [Azure Identity Management and access control security best practices](../security/fundamentals/identity-management-best-practices.md).|
146+
| Related policy | [Deprecated accounts should be removed from your subscription](https://ms.portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f6b1cbf55-e8b6-442f-ba4c-7246b6381474) | Subscriptions should be purged of accounts that are blocked in Active Directory and have read and write permissions. |
147+
100148
## May 2022
101149

102150
Updates in May include:

articles/defender-for-cloud/upcoming-changes.md

Lines changed: 1 addition & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Important changes coming to Microsoft Defender for Cloud
33
description: Upcoming changes to Microsoft Defender for Cloud that you might need to be aware of and for which you might need to plan
44
ms.topic: overview
5-
ms.date: 05/31/2022
5+
ms.date: 06/21/2022
66
---
77

88
# Important upcoming changes to Microsoft Defender for Cloud
@@ -21,7 +21,6 @@ If you're looking for the latest release notes, you'll find them in the [What's
2121
| [GA support for Arc-enabled Kubernetes clusters](#ga-support-for-arc-enabled-kubernetes-clusters) | July 2022 |
2222
| [Changes to recommendations for managing endpoint protection solutions](#changes-to-recommendations-for-managing-endpoint-protection-solutions) | June 2022 |
2323
| [Key Vault recommendations changed to "audit"](#key-vault-recommendations-changed-to-audit) | June 2022 |
24-
| [Multiple changes to identity recommendations](#multiple-changes-to-identity-recommendations) | June 2022 |
2524
| [Deprecating three VM alerts](#deprecating-three-vm-alerts) | June 2022|
2625
| [Deprecating the "API App should only be accessible over HTTPS" policy](#deprecating-the-api-app-should-only-be-accessible-over-https-policy)|June 2022|
2726

@@ -64,55 +63,6 @@ The Key Vault recommendations listed here are currently disabled so that they do
6463
| Key Vault secrets should have an expiration date | 14257785-9437-97fa-11ae-898cfb24302b |
6564
| Key Vault keys should have an expiration date | 1aabfa0d-7585-f9f5-1d92-ecb40291d9f2 |
6665

67-
### Multiple changes to identity recommendations
68-
69-
**Estimated date for change:** June 2022
70-
71-
Defender for Cloud includes multiple recommendations for improving the management of users and accounts. In June, we'll be making the changes outlined below.
72-
73-
#### New recommendations in preview
74-
75-
The new release will bring the following capabilities:
76-
77-
- **Extended evaluation scope** – Improved coverage to identity accounts without MFA and external accounts on Azure resources (instead of subscriptions only) allowing security admins to view role assignments per account.
78-
79-
- **Improved freshness interval** - Currently, the identity recommendations have a freshness interval of 24 hours. This update will reduce that interval to 12 hours.
80-
81-
- **Account exemption capability** - Defender for Cloud has many features you can use to customize your experience and ensure that your secure score reflects your organization's security priorities. For example, you can [exempt resources and recommendations from your secure score](exempt-resource.md).
82-
83-
This update will allow you to exempt specific accounts from evaluation with the six recommendations listed in the following table.
84-
85-
Typically, you'd exempt emergency “break glass” accounts from MFA recommendations, because such accounts are often deliberately excluded from an organization's MFA requirements. Alternatively, you might have external accounts that you'd like to permit access to but which don't have MFA enabled.
86-
87-
> [!TIP]
88-
> When you exempt an account, it won't be shown as unhealthy and also won't cause a subscription to appear unhealthy.
89-
90-
|Recommendation| Assessment key|
91-
|-|-|
92-
|MFA should be enabled on accounts with owner permissions on your subscription|94290b00-4d0c-d7b4-7cea-064a9554e681|
93-
|MFA should be enabled on accounts with read permissions on your subscription|151e82c5-5341-a74b-1eb0-bc38d2c84bb5|
94-
|MFA should be enabled on accounts with write permissions on your subscription|57e98606-6b1e-6193-0e3d-fe621387c16b|
95-
|External accounts with owner permissions should be removed from your subscription|c3b6ae71-f1f0-31b4-e6c1-d5951285d03d|
96-
|External accounts with read permissions should be removed from your subscription|a8c6a4ad-d51e-88fe-2979-d3ee3c864f8b|
97-
|External accounts with write permissions should be removed from your subscription|04e7147b-0deb-9796-2e5c-0336343ceb3d|
98-
99-
#### Recommendations rename
100-
101-
This update, will rename two recommendations, and revise their descriptions. The assessment keys will remain unchanged.
102-
103-
| Property | Current value | New update's change |
104-
|----|----|----|
105-
|**First recommendation**| - | - |
106-
|Assessment key | e52064aa-6853-e252-a11e-dffc675689c2 | No change|
107-
| Name | [Deprecated accounts with owner permissions should be removed from your subscription](https://ms.portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/e52064aa-6853-e252-a11e-dffc675689c2) |Subscriptions should be purged of accounts that are blocked in Active Directory and have owner permissions.|
108-
|Description| User accounts that have been blocked from signing in, should be removed from your subscriptions.|These accounts can be targets for attackers looking to find ways to access your data without being noticed. <br> Learn more about securing the identity perimeter in [Azure Identity Management and access control security best practices](../security/fundamentals/identity-management-best-practices.md).|
109-
|Related policy|[Deprecated accounts with owner permissions should be removed from your subscription](https://ms.portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2febb62a0c-3560-49e1-89ed-27e074e9f8ad) | Subscriptions should be purged of accounts that are blocked in Active Directory and have owner permissions.|
110-
|**Second recommendation**| - | - |
111-
| Assessment key | 00c6d40b-e990-6acf-d4f3-471e747a27c4 | No change |
112-
| Name | [Deprecated accounts should be removed from your subscription](https://ms.portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/00c6d40b-e990-6acf-d4f3-471e747a27c4)|Subscriptions should be purged of accounts that are blocked in Active Directory and have read and write permissions.|
113-
|Description|User accounts that have been blocked from signing in, should be removed from your subscriptions. <br> These accounts can be targets for attackers looking to find ways to access your data without being noticed.|User accounts that have been blocked from signing into Active Directory, should be removed from your subscriptions.<br> Learn more about securing the identity perimeter in [Azure Identity Management and access control security best practices](../security/fundamentals/identity-management-best-practices.md).|
114-
| Related policy | [Deprecated accounts should be removed from your subscription](https://ms.portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f6b1cbf55-e8b6-442f-ba4c-7246b6381474) | Subscriptions should be purged of accounts that are blocked in Active Directory and have read and write permissions. |
115-
11666
### Deprecating three VM alerts
11767

11868
**Estimated date for change:** June 2022

0 commit comments

Comments
 (0)