You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/release-notes.md
+19-15Lines changed: 19 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,20 +41,20 @@ Suppression rules define the criteria for which alerts should be automatically d
41
41
42
42
- suppress alerts that are being triggered too often to be useful
43
43
44
-
[Learn more about suppressing alerts from Azure Security Center's threat protection](alerts-suppression-rules.md).
44
+
Learn more about [suppressing alerts from Azure Security Center's threat protection](alerts-suppression-rules.md).
45
45
46
46
47
47
### Virtual machine vulnerability assessment is now generally available
48
48
49
-
Security Center's standard tier now includes a built-in vulnerability assessment for virtual machines for no additional fee. This extension is powered by Qualys but reports its findings directly back to Security Center. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center.
49
+
Security Center's standard tier now includes an integrated vulnerability assessment for virtual machines for no additional fee. This extension is powered by Qualys but reports its findings directly back to Security Center. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center.
50
50
51
51
The new solution can continuously scan your virtual machines to find vulnerabilities and present the findings in Security Center.
52
52
53
53
To deploy the solution, use the new security recommendation:
54
54
55
55
"Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)"
Learn more about [Security Center's integrated vulnerability assessment for virtual machines](built-in-vulnerability-assessment.md).
58
58
59
59
60
60
@@ -68,7 +68,7 @@ This update brings the following changes to this feature:
68
68
69
69
- The recommendation has been set to be triggered only if there are open management ports.
70
70
71
-
[Learn more about the JIT access feature](security-center-just-in-time.md).
71
+
Learn more about [the JIT access feature](security-center-just-in-time.md).
72
72
73
73
74
74
### Custom recommendations have been moved to a separate security control
@@ -126,7 +126,7 @@ Create a custom initiative in Azure policy, add policies to it and onboard it to
126
126
127
127
We've now also added the option to edit the custom recommendation metadata. Metadata options include severity, remediation steps, threats information, and more.
128
128
129
-
[Learn more about enhancing your custom recommendations with detailed information](custom-security-policies.md#enhancing-your-custom-recommendations-with-detailed-information).
129
+
Learn more about [enhancing your custom recommendations with detailed information](custom-security-policies.md#enhancing-your-custom-recommendations-with-detailed-information).
130
130
131
131
132
132
### Crash dump analysis capabilities migrating to fileless attack detection
@@ -163,7 +163,7 @@ Now, you can add standards such as:
163
163
164
164
In addition, we've recently added the **Azure Security Benchmark**, the Microsoft-authored Azure-specific guidelines for security and compliance best practices based on common compliance frameworks. Additional standards will be supported in the dashboard as they become available.
165
165
166
-
[Learn more about customizing the set of standards in your regulatory compliance dashboard](update-regulatory-compliance-packages.md).
166
+
Learn more about [customizing the set of standards in your regulatory compliance dashboard](update-regulatory-compliance-packages.md).
167
167
168
168
169
169
### Identity recommendations now included in Azure Security Center free tier
@@ -178,8 +178,9 @@ Examples of identity and access recommendations include:
178
178
179
179
If you have subscriptions on the free pricing tier, their secure scores will be impacted by this change because they were never assessed for their identity and access security.
180
180
181
-
[Learn more about identity and access recommendations](recommendations-reference.md#recs-identity).
182
-
[Learn more about monitoring identity and access](security-center-identity-access.md).
181
+
Learn more about [identity and access recommendations](recommendations-reference.md#recs-identity).
182
+
183
+
Learn more about [monitoring identity and access](security-center-identity-access.md).
183
184
184
185
185
186
## March 2020
@@ -192,7 +193,7 @@ Every security program includes multiple workflows for incident response. These
192
193
193
194
For more information about the automatic and manual Security Center capabilities for running your workflows, see [workflow automation](workflow-automation.md).
194
195
195
-
To learn about creating Logic Apps, see [Azure Logic Apps](https://docs.microsoft.com/azure/logic-apps/logic-apps-overview).
196
+
Learn more about [creating Logic Apps](https://docs.microsoft.com/azure/logic-apps/logic-apps-overview).
196
197
197
198
198
199
### Integration of Azure Security Center with Windows Admin Center
@@ -204,7 +205,7 @@ After moving a server from Windows Admin Center to Azure Security Center, you’
204
205
- View security alerts and recommendations in the Security Center extension of the Windows Admin Center.
205
206
- View the security posture and retrieve additional detailed information of your Windows Admin Center managed servers in the Security Center within the Azure portal (or via an API).
206
207
207
-
Learn more about how to [integrate Azure Security Center with Windows Admin Center](windows-admin-center-integration.md).
208
+
Learn more about [how to integrate Azure Security Center with Windows Admin Center](windows-admin-center-integration.md).
208
209
209
210
210
211
### Protection for Azure Kubernetes Service
@@ -219,8 +220,9 @@ The Security Center defense includes:
219
220
-**Security recommendations** - Actionable recommendations to help you comply with security best-practices for AKS. These recommendations are included in your secure score to ensure they’re viewed as a part of your organization’s security posture. An example of an AKS-related recommendation you might see is "Role-based access control should be used to restrict access to a Kubernetes service cluster".
220
221
-**Threat protection** - Through continuous analysis of your AKS deployment, Security Center alerts you to threats and malicious activity detected at the host and AKS cluster level.
221
222
222
-
[Learn more about Azure Kubernetes Services integration with Security Center](azure-kubernetes-service-integration.md).
223
-
[Learn more about the container security features in Security Center](container-security.md).
223
+
Learn more about [Azure Kubernetes Services' integration with Security Center](azure-kubernetes-service-integration.md).
224
+
225
+
Learn more about [the container security features in Security Center](container-security.md).
224
226
225
227
226
228
### Improved just-in-time experience
@@ -230,7 +232,7 @@ The features, operation, and UI for Azure Security Center’s just-in-time tools
230
232
-**Justification field** - When requesting access to a virtual machine (VM) through the just-in-time page of the Azure portal, a new optional field is available to enter a justification for the request. Information entered into this field can be tracked in the activity log.
231
233
-**Automatic cleanup of redundant just-in-time (JIT) rules** - Whenever you update a JIT policy, a cleanup tool automatically runs to check the validity of your entire ruleset. The tool looks for mismatches between rules in your policy and rules in the NSG. If the cleanup tool finds a mismatch, it determines the cause and, when it's safe to do so, removes built-in rules that aren't needed anymore. The cleaner never deletes rules that you've created.
232
234
233
-
[Learn more about the JIT access feature](security-center-just-in-time.md).
235
+
Learn more about [the JIT access feature](security-center-just-in-time.md).
234
236
235
237
236
238
### Two security recommendations for web applications deprecated
@@ -245,7 +247,9 @@ Two security recommendations related to web applications are being deprecated:
245
247
246
248
These recommendations will no longer appear in the Security Center list of recommendations. The related policies will no longer be included in the initiative named "Security Center Default".
247
249
248
-
[Learn more about security recommendations](recommendations-reference.md).
250
+
Learn more about [security recommendations](recommendations-reference.md).
251
+
252
+
249
253
250
254
## February 2020
251
255
@@ -267,4 +271,4 @@ An enhanced version of the secure score feature of Azure Security Center is now
267
271
268
272
Familiarize yourself with the secure score changes during the preview phase and determine other remediations that will help you to further secure your environment.
269
273
270
-
Learn more in[Enhanced secure score (preview) in Azure Security Center](secure-score-security-controls.md).
274
+
Learn more about[Enhanced secure score (preview) in Azure Security Center](secure-score-security-controls.md).
0 commit comments