You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Multiple changes to identity recommendations](#multiple-changes-to-identity-recommendations)
28
+
-[Extra recommendations added to identity](#extra-recommendations-added-to-identity)
29
29
30
30
### Suppress alerts based on Container and Kubernetes entities
31
31
@@ -65,9 +65,9 @@ The following APIs are deprecated:
65
65
66
66
These three APIs exposed old formats of assessments and are replaced by the [Assessments APIs](/rest/api/defenderforcloud/assessments) and [SubAssessments APIs](/rest/api/defenderforcloud/sub-assessments). All data that is exposed by these legacy APIs are also available in the new APIs.
67
67
68
-
### Multiple changes to identity recommendations
68
+
### Extra recommendations added to identity
69
69
70
-
There have been changes to Defender for Cloud's multiple recommendations for improving the management of users and accounts.
70
+
Defender for Cloud's recommendations for improving the management of users and accounts.
71
71
72
72
#### New recommendations
73
73
@@ -81,7 +81,7 @@ The new release contains the following capabilities:
81
81
82
82
This update allows you to exempt specific accounts from evaluation with the six recommendations listed in the following table.
83
83
84
-
Typically, you'd exempt emergency “break glass” accounts from MFA recommendations, because such accounts are often deliberately excluded from an organization's MFA requirements. Alternatively, you might have external accounts that you'd like to permit access to but which don't have MFA enabled.
84
+
Typically, you'd exempt emergency “break glass” accounts from MFA recommendations, because such accounts are often deliberately excluded from an organization's MFA requirements. Alternatively, you might have external accounts that you'd like to permit access to, that don't have MFA enabled.
85
85
86
86
> [!TIP]
87
87
> When you exempt an account, it won't be shown as unhealthy and also won't cause a subscription to appear unhealthy.
@@ -95,6 +95,8 @@ The new release contains the following capabilities:
95
95
|External accounts with read permissions should be removed from your subscription|a8c6a4ad-d51e-88fe-2979-d3ee3c864f8b|
96
96
|External accounts with write permissions should be removed from your subscription|04e7147b-0deb-9796-2e5c-0336343ceb3d|
97
97
98
+
The recommendations although in preview, will appear next to the recommendations that are currently in GA.
99
+
98
100
## August 2022
99
101
100
102
Updates in August include:
@@ -114,9 +116,9 @@ Learn more about [viewing vulnerabilities for running images](defender-for-conta
114
116
115
117
### Azure Monitor Agent integration now in preview
116
118
117
-
Defender for Cloud now includes preview support for the [Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) (AMA). AMA is intended to replace the legacy Log Analytics agent (also referred to as the Microsoft Monitoring Agent (MMA)), which is on a path to deprecation. AMA [provides a number of benefits](../azure-monitor/agents/azure-monitor-agent-migration.md#benefits) over legacy agents.
119
+
Defender for Cloud now includes preview support for the [Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) (AMA). AMA is intended to replace the legacy Log Analytics agent (also referred to as the Microsoft Monitoring Agent (MMA)), which is on a path to deprecation. AMA [provides many benefits](../azure-monitor/agents/azure-monitor-agent-migration.md#benefits) over legacy agents.
118
120
119
-
In Defender for Cloud, when you [enable auto provisioning for AMA](auto-deploy-azure-monitoring-agent.md), the agent is deployed on **existing and new** VMs and Azure Arc-enabled machines that are detected in your subscriptions. If Defender for Cloud plans are enabled, AMA collects configuration information and event logs from Azure VMs and Azure Arc machines. Note that the AMA integration is in preview, so we recommend using it in test environments, rather than in production environments.
121
+
In Defender for Cloud, when you [enable auto provisioning for AMA](auto-deploy-azure-monitoring-agent.md), the agent is deployed on **existing and new** VMs and Azure Arc-enabled machines that are detected in your subscriptions. If Defenders for Cloud plans are enabled, AMA collects configuration information and event logs from Azure VMs and Azure Arc machines. The AMA integration is in preview, so we recommend using it in test environments, rather than in production environments.
120
122
121
123
122
124
### Deprecated VM alerts regarding suspicious activity related to a Kubernetes cluster
0 commit comments