Skip to content

Commit c6e691e

Browse files
author
David Curwin
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into wi-206789-container-qualys-retirement-feb7-2024
2 parents c840151 + 4a8d71d commit c6e691e

File tree

8 files changed

+39
-37
lines changed

8 files changed

+39
-37
lines changed

articles/defender-for-cloud/enable-adaptive-application-controls.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Enable and manage adaptive application controls
3-
description: This document helps you enable and manage adaptive application control in Microsoft Defender for Cloud to create an allowlist of applications running for Azure machines.
3+
description: Learn how to enable and manage adaptive application control in Microsoft Defender for Cloud to create an allowlist of applications running for Azure machines.
44
author: dcurwin
55
ms.author: dacurwin
66
ms.topic: how-to
@@ -45,7 +45,7 @@ Select the recommendation, or open the adaptive application controls page to vie
4545
4646
1. Open the **Recommended** tab. The groups of machines with recommended allowlists appear.
4747

48-
:::image type="content" source="media/enable-adaptive-application-controls/adaptive-application-recommended-tab.png" alt-text="Screenshot that shows you where on the screen the recommendation tab is.":::
48+
:::image type="content" source="media/enable-adaptive-application-controls/adaptive-application-recommended-tab.png" alt-text="Screenshot that shows you where on the screen the recommendation tab is.":::
4949

5050
1. Select a group.
5151

@@ -82,7 +82,7 @@ To edit the rules for a group of machines:
8282

8383
1. Select **Add rule**.
8484

85-
:::image type="content" source="media/enable-adaptive-application-controls/adaptive-application-add-custom-rule.png" alt-text="Screenshot that showsyou where the add rule button is located.":::
85+
:::image type="content" source="media/enable-adaptive-application-controls/adaptive-application-add-custom-rule.png" alt-text="Screenshot that shows you where the add rule button is located.":::
8686

8787
1. If you're defining a known safe path, change the **Rule type** to 'Path' and enter a single path. You can include wildcards in the path. The following screens show some examples of how to use wildcards.
8888

@@ -134,7 +134,7 @@ To remediate the issues:
134134

135135
1. To investigate further, select a group.
136136

137-
:::image type="content" source="media/enable-adaptive-application-controls/recent-alerts.png" alt-text="Screenshot showing recent alerts.":::
137+
:::image type="content" source="media/enable-adaptive-application-controls/recent-alerts.png" alt-text="Screenshot showing recent alerts in Configured tab.":::
138138

139139
1. For further details, and the list of affected machines, select an alert.
140140

@@ -180,10 +180,10 @@ Some of the functions available from the REST API include:
180180
>
181181
> Remove the following properties before using the JSON in the **Put** request: recommendationStatus, configurationStatus, issues, location, and sourceSystem.
182182
183-
## Next steps
183+
## Related content
184184

185185
On this page, you learned how to use adaptive application control in Microsoft Defender for Cloud to define allowlists of applications running on your Azure and non-Azure machines. To learn more about some other cloud workload protection features, see:
186186

187187
- [Understanding just-in-time (JIT) VM access](just-in-time-access-overview.md)
188188
- [Securing your Azure Kubernetes clusters](defender-for-kubernetes-introduction.md)
189-
- View common question about [Adaptive application controls](faq-defender-for-servers.yml)
189+
- View common question about [Adaptive application controls](faq-defender-for-servers.yml)

articles/defender-for-cloud/enable-agentless-scanning-vms.md

Lines changed: 22 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,7 @@ When you enable [Defender Cloud Security Posture Management (CSPM)](concept-clou
3737
If you have Defender for Servers P2 already enabled and agentless scanning is turned off, you need to turn on agentless scanning manually.
3838

3939
You can enable agentless scanning on
40+
4041
- [Azure](#agentless-vulnerability-assessment-on-azure)
4142
- [AWS](#agentless-vulnerability-assessment-on-aws)
4243
- [GCP](#enable-agentless-scanning-in-gcp)
@@ -58,7 +59,7 @@ You can enable agentless scanning on
5859

5960
1. In the settings pane, turn on **Agentless scanning for machines**.
6061

61-
:::image type="content" source="media/enable-vulnerability-assessment-agentless/turn-on-agentles-scanning-azure.png" alt-text="Screenshot of settings and monitoring screen to turn on agentless scanning." lightbox="media/enable-vulnerability-assessment-agentless/turn-on-agentles-scanning-azure.png":::
62+
:::image type="content" source="media/enable-vulnerability-assessment-agentless/turn-on-agentless-scanning-azure.png" alt-text="Screenshot of settings and monitoring screen to turn on agentless scanning." lightbox="media/enable-vulnerability-assessment-agentless/turn-on-agentless-scanning-azure.png":::
6263

6364
1. Select **Save**.
6465

@@ -90,23 +91,23 @@ After you enable agentless scanning, software inventory and vulnerability inform
9091

9192
### Enable agentless scanning in GCP
9293

93-
1. In Defender for Cloud, select **Environment settings**.
94-
1. Select the relevant project or organization.
95-
1. For either the Defender Cloud Security Posture Management (CSPM) or Defender for Servers P2 plan, select  **Settings**.
94+
1. In Defender for Cloud, select **Environment settings**.
95+
1. Select the relevant project or organization.
96+
1. For either the Defender Cloud Security Posture Management (CSPM) or Defender for Servers P2 plan, select  **Settings**.
9697

9798
:::image type="content" source="media/enable-agentless-scanning-vms/gcp-select-plan.png" alt-text="Screenshot that shows where to select the plan for GCP projects." lightbox="media/enable-agentless-scanning-vms/gcp-select-plan.png":::
9899

99100
1. Toggle Agentless scanning to **On**.
100101

101102
:::image type="content" source="media/enable-agentless-scanning-vms/gcp-select-agentless.png" alt-text="Screenshot that shows where to select agentless scanning." lightbox="media/enable-agentless-scanning-vms/gcp-select-agentless.png":::
102103

103-
1. Select **Save and Next: Configure Access**.
104+
1. Select **Save and Next: Configure Access**.
104105
1. Copy the onboarding script.
105106
1. Run the onboarding script in the GCP organization/project scope (GCP portal or gcloud CLI).
106-
1. Select  **Next: Review and generate**.
107-
1. Select  **Update**.
107+
1. Select  **Next: Review and generate**.
108+
1. Select  **Update**.
108109

109-
## Test the agentless malware scanner's deployment
110+
## Test the agentless malware scanner's deployment
110111

111112
Security alerts appear on the portal only in cases where threats are detected on your environment. If you do not have any alerts it may be because there are no threats on your environment. You can test to see that the device is properly onboarded and reporting to Defender for Cloud by creating a test file.
112113

@@ -167,37 +168,35 @@ The alert `MDC_Test_File malware was detected (Agentless)` will appear within 24
167168

168169
1. Execute the following script.
169170

170-
171171
```powershell
172172
# Virus test string
173173
$TEST_STRING = '$$89-barbados-dublin-damascus-notice-pulled-natural-31$$'
174-
 
174+
175175
# File to be created
176176
$FILE_PATH = "C:\temp\virus_test_file.txt"
177-
 
177+
178178
# Create "temp" directory if it does not exist
179179
$DIR_PATH = "C:\temp"
180180
if (!(Test-Path -Path $DIR_PATH)) {
181-
    New-Item -ItemType Directory -Path $DIR_PATH
181+
New-Item -ItemType Directory -Path $DIR_PATH
182182
}
183-
 
183+
184184
# Write the test string to the file without a trailing newline
185185
[IO.File]::WriteAllText($FILE_PATH, $TEST_STRING)
186-
 
186+
187187
# Check if the file was created and contains the correct string
188188
if (Test-Path -Path $FILE_PATH) {
189-
    $content = [IO.File]::ReadAllText($FILE_PATH)
190-
    if ($content -eq $TEST_STRING) {
191-
        Write-Host "Test file created and validated successfully."
192-
    } else {
193-
        Write-Host "Test file does not contain the correct string."
194-
    }
189+
$content = [IO.File]::ReadAllText($FILE_PATH)
190+
if ($content -eq $TEST_STRING) {
191+
Write-Host "Test file created and validated successfully."
192+
} else {
193+
Write-Host "Test file does not contain the correct string."
194+
}
195195
} else {
196-
    Write-Host "Failed to create test file."
196+
Write-Host "Failed to create test file."
197197
}
198198
```
199199
200-
201200
The alert `MDC_Test_File malware was detected (Agentless)` will appear within 24 hours in the Defender for Cloud Alerts page and in the Defender XDR portal.
202201
203202
:::image type="content" source="media/enable-agentless-scanning-vms/test-alert.jpg" alt-text="Screenshot of the test alert that appears in Defender for Cloud for Windows with because of the PowerShell script." lightbox="media/enable-agentless-scanning-vms/test-alert.jpg":::
@@ -221,7 +220,7 @@ Agentless scanning applies to all of the eligible machines in the subscription.
221220
222221
1. Select **Save**.
223222
224-
## Next steps
223+
## Related content
225224
226225
Learn more about:
227226

articles/defender-for-cloud/enable-defender-for-endpoint.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -304,10 +304,8 @@ To remove the Defender for Endpoint solution from your machines:
304304
305305
1. Follow the steps in [Offboard devices from the Microsoft Defender for Endpoint service](/microsoft-365/security/defender-endpoint/offboard-machines) from the Defender for Endpoint documentation.
306306
307-
## Next steps
307+
## Related content
308308
309309
- [Platforms and features supported by Microsoft Defender for Cloud](security-center-os-coverage.md)
310310
- [Learn how recommendations help you protect your Azure resources](review-security-recommendations.md)
311311
- View common question about the [Defender for Cloud integration with Microsoft Defender for Endpoint](faq-defender-for-servers.yml)
312-
313-
24.8 KB
Loading

articles/defender-for-cloud/tutorial-enable-cspm-plan.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Protect your resources with Defender CSPM plan on your subscription
3-
description: Learn how to enable Defender CSPM on your Azure subscription for Microsoft Defender for Cloud.
3+
description: Learn how to enable Defender CSPM on your Azure subscription for Microsoft Defender for Cloud and enhance your security posture.
44
ms.topic: install-set-up-deploy
55
ms.date: 09/05/2023
66
---
@@ -11,7 +11,7 @@ Defender Cloud Security Posture Management (CSPM) in Microsoft Defender for Clou
1111

1212
Defender for Cloud continually assesses your resources, subscriptions, and organization for security issues. Defender for Cloud shows you your security posture with the secure score. The secure score is an aggregated score of the security findings that tells you your current security situation. The higher the score, the lower the identified risk level.
1313

14-
When you enable Defender for Cloud, you automatically enable the **Foundational CSPM capabilities**. these capabilities are part of the free services offered by Defender for Cloud.
14+
When you enable Defender for Cloud, you automatically enable the **Foundational CSPM capabilities**. These capabilities are part of the free services offered by Defender for Cloud.
1515

1616
You have the ability to enable the **Defender CSPM** plan, which offers extra protections for your environments such as governance, regulatory compliance, cloud security explorer, attack path analysis and agentless scanning for machines.
1717

@@ -58,10 +58,12 @@ Once the Defender CSPM plan is enabled on your subscription, you have the abilit
5858

5959
- **Agentless discovery for Kubernetes**: API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. Required for Kubernetes inventory, identity and network exposure detection, risk hunting as part of the cloud security explorer. This extension is required for attack path analysis (Defender CSPM only).
6060

61-
- **Container registries vulnerability assessments**: Provides vulnerability management for images stored in your container registries.
61+
- **Agentless container vulnerability assessments**: Provides vulnerability management for images stored in your container registries.
6262

6363
- **Sensitive data discovery**: Sensitive data discovery automatically discovers managed cloud data resources containing sensitive data at scale. This feature accesses your data, it is agentless, uses smart sampling scanning, and integrates with Microsoft Purview sensitive information types and labels.
6464

65+
- **Permissions Management (Preview)** - Insights into Cloud Infrastructure Entitlement Management (CIEM). CIEM ensures appropriate and secure identities and access rights in cloud environments. It helps understand access permissions to cloud resources and associated risks. Setup and data collection may take up to 24 hours.
66+
6567
**To enable the components of the Defender CSPM plan**:
6668

6769
1. On the Defender plans page, select **Settings**.

articles/sentinel/connect-aws.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -215,6 +215,9 @@ The following instructions apply for public **Azure Commercial clouds** only. Fo
215215

216216
1. Edit the new role's trust policy and add another condition:<br>`"sts:RoleSessionName": "MicrosoftSentinel_{WORKSPACE_ID)"`
217217

218+
> [!IMPORTANT]
219+
> The value of the `sts:RoleSessionName` parameter must have the exact prefix `MicrosoftSentinel_`, otherwise the connector will not function properly.
220+
218221
The finished trust policy should look like this:
219222

220223
```json

articles/sentinel/enable-entity-behavior-analytics.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
title: Enable entity behavior analytics to detect advanced threats
33
description: Enable User and Entity Behavior Analytics in Microsoft Sentinel, and configure data sources
44
author: yelevin
5+
ms.author: yelevin
56
ms.topic: how-to
67
ms.date: 07/05/2023
7-
ms.author: yelevin
88
---
99

1010
# Enable User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel
@@ -67,4 +67,4 @@ To enable or disable this feature (these prerequisites are not required to use t
6767
In this article, you learned how to enable and configure User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel. For more information about UEBA:
6868

6969
> [!div class="nextstepaction"]
70-
>>[Configure data retention and archive](configure-data-retention-archive.md)
70+
>>[Investigate entities with entity pages](entity-pages.md)

0 commit comments

Comments
 (0)