Skip to content

Commit cbfbaf2

Browse files
authored
Merge pull request #268780 from MicrosoftDocs/release-mssecure2024-MDC
Release mssecure2024 mdc --scheduled release at 12PM of 3/12
2 parents e4eea98 + 2f332ee commit cbfbaf2

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

49 files changed

+378
-163
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 21 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -209,17 +209,26 @@
209209
- name: Integration with Defender EASM
210210
displayName: EASM, attack surface management
211211
href: concept-easm.md
212-
- name: Enabling Permissions Management (Preview)
213-
href: enable-permissions-management.md
212+
- name: Critical assets protection
213+
href: critical-assets-protection.md
214214
- name: Agentless machine scanning
215215
href: concept-agentless-data-collection.md
216-
- name: Supported resource types for multicloud in Foundational CSPM
217-
href: multicloud-resource-types-support-foundational-cspm.md
218216
- name: Integrations
219217
items:
220-
- name: ServiceNow integration
221-
displayName: CSPM, cloud security, posture, management, ServiceNow
222-
href: integration-servicenow.md
218+
- name: ServiceNow
219+
items:
220+
- name: ServiceNow integration with Defender for Cloud
221+
displayName: CSPM, cloud security, posture, management, ServiceNow
222+
href: integration-servicenow.md
223+
- name: Connect ServiceNow to Defender for Cloud
224+
displayName: CSPM, cloud security, posture, management, ServiceNow
225+
href: connect-servicenow.md
226+
- name: Create a ticket in Defender for Cloud
227+
displayName: CSPM, cloud security, posture, management, ServiceNow
228+
href: create-ticket-servicenow.md
229+
- name: Create automatic tickets with governance rules
230+
displayName: CSPM, cloud security, posture, management, ServiceNow
231+
href: create-governance-rule-servicenow.md
223232
- name: Common questions
224233
displayName: questions, common, CSPM, agentless scanning, faq, frequently asked questions
225234
href: faq-cspm.yml
@@ -294,6 +303,8 @@
294303
- name: Integrate security solutions
295304
displayName: security, solutions, integrate, integrated, data sources
296305
href: partner-integration.md
306+
- name: Enable Permissions Management
307+
href: enable-permissions-management.md
297308
- name: Data-aware security posture
298309
items:
299310
- name: Enable data-aware security posture
@@ -636,6 +647,9 @@
636647
- name: Kubernetes data plane hardening
637648
displayName: k8s, containers, aks
638649
href: kubernetes-workload-protections.md
650+
- name: Vulnerability assessment for Azure powered by Qualys (Deprecated)
651+
displayName: ACR, registry, images, qualys
652+
href: defender-for-containers-vulnerability-assessment-azure.md
639653
- name: Defender for Kubernetes (deprecated)
640654
displayName: clusters, k8s, aks
641655
href: defender-for-kubernetes-introduction.md
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
---
2+
title: Connect ServiceNow to Defender for Cloud
3+
description: Learn how to connect ServiceNow with Microsoft Defender for Cloud to protect Azure, hybrid, and multicloud machines.
4+
author: dcurwin
5+
ms.author: dacurwin
6+
ms.topic: how-to
7+
ms.date: 03/11/2024
8+
ai-usage: ai-assisted
9+
#customer intent: As a user, I want to learn how to connect my ServiceNow account with Microsoft Defender for Cloud so that I can protect my Azure, hybrid, and multicloud machines.
10+
---
11+
12+
# Connect ServiceNow to Defender for Cloud
13+
14+
Microsoft Defender for Cloud's integration with ServiceNow allows customers to connect their Defender for Cloud accounts to ServiceNow. ServiceNow is a powerful workflow automation and enterprise solution that helps organizations streamline and automate routine tasks, improving operational efficiencies and increasing productivity. By integrating ServiceNow with Defender for Cloud, customers can prioritize the remediation of recommendations that affect their business. This integration allows you to create and view ServiceNow tickets linked to recommendations directly from Defender for Cloud, which facilitates efficient incident management.
15+
16+
## Prerequisites
17+
18+
- Have an [application registry in ServiceNow](https://docs.servicenow.com/bundle/utah-employee-service-management/page/product/meeting-extensibility/task/create-app-registry-meeting-extensibility.html).
19+
20+
- Enable [Defender Cloud Security Posture Management (CSPM)](tutorial-enable-cspm-plan.md) on your Azure subscription.
21+
22+
- The following roles are required:
23+
- To create the integration: Security Admin, Contributor, or Owner.
24+
25+
## Connect ServiceNow to Defender for Cloud
26+
27+
To connect a ServiceNow account to a Defender for Cloud account:
28+
29+
1. Sign in to the [Azure portal](https://portal.azure.com/).
30+
31+
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings**.
32+
33+
1. Select **ServiceNow**.
34+
35+
:::image type="content" border="true" source="./media/connect-servicenow/integrations.png" alt-text="Screenshot of environment settings page that shows where to select the ServiceNow option.":::
36+
37+
1. Select **Add integration** > **ServiceNow**.
38+
39+
:::image type="content" border="true" source="./media/connect-servicenow/add-servicenow.png" alt-text="Screenshot that shows where the add integration button is and the ServiceNow option." lightbox="media/connect-servicenow/add-servicenow.png":::
40+
41+
1. Enter a name and select the scope.
42+
43+
1. In the ServiceNow connection details, enter the instance URL, name, password, client ID, and client secret that you [created for the application registry](https://docs.servicenow.com/bundle/utah-employee-service-management/page/product/meeting-extensibility/task/create-app-registry-meeting-extensibility.html) in the ServiceNow portal.
44+
45+
1. Select **Next**.
46+
47+
1. Select Incident data, Problems data, and Changes table from the drop-down menus.
48+
49+
:::image type="content" border="true" source="./media/connect-servicenow/customize-fields.png" alt-text="Screenshot that shows the custom option selected and the accompanying fields you can enter information into.":::
50+
51+
1. Select **Save**.
52+
53+
A notice appears after successful creation of integration.
54+
55+
## Next step
56+
57+
> [!div class="nextstepaction"]
58+
> [Create a ticket in Defender for Cloud](create-ticket-servicenow.md)
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
---
2+
title: Create automatic tickets with governance rules
3+
description: Learn how to create a governance rule in Defender for Cloud that connects recommendations or severity levels to a specific owner.
4+
author: Elazark
5+
ms.author: elkrieger
6+
ms.topic: how-to
7+
ms.date: 03/11/2024
8+
ai-usage: ai-assisted
9+
#customer intent: As a user, I want to learn how to create automatic tickets using governance rules in Defender for Cloud that automatically assigns an owner to specific recommendation or a recommendation with a severity level in Defender for Cloud to my my ServiceNow account.
10+
---
11+
12+
# Create automatic tickets with governance rules
13+
14+
The integration of SeviceNow and Defender for Cloud allow you to create governance rules that automatically open tickets in SeviceNow for specific recommendations or severity levels. ServiceNow tickets can be created, viewed, and linked to recommendations directly from Defender for Cloud, enabling seamless collaboration between the two platforms and facilitating efficient incident management.
15+
16+
## Prerequisites
17+
18+
- Have an [application registry in ServiceNow](https://docs.servicenow.com/bundle/utah-employee-service-management/page/product/meeting-extensibility/task/create-app-registry-meeting-extensibility.html).
19+
20+
- Enable [Defender Cloud Security Posture Management (CSPM)](tutorial-enable-cspm-plan.md) on your Azure subscription.
21+
22+
- The following roles are required:
23+
- To create an assignment: Admin permissions to ServiceNow.
24+
25+
## Assign an owner with a governance rule
26+
27+
You can create a rule to automatically assign an owner to a recommendation in Defender for Cloud. This rule is based on the recommendation's severity or recommendation.
28+
29+
1. Sign in to the [Azure portal](https://portal.azure.com/).
30+
31+
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings**.
32+
33+
1. Select **Governance rules**.
34+
35+
:::image type="content" border="true" source="./media/integration-servicenow/governance-rules.png" alt-text="Screenshot of the environment settings page that shows where the governance rules button is located.":::
36+
37+
1. Select **Create governance rule**.
38+
39+
1. Enter a rule name and select a scope.
40+
41+
1. Select **ServiceNow** In the Type field.
42+
43+
1. Enter a priority.
44+
45+
1. Select and integration instance.
46+
47+
1. Select a ServiceNow ticket type.
48+
49+
1. Select **Next**.
50+
51+
1. Select either:
52+
- **By Severity** and the severity level.
53+
- **By recommendation** and the recommendation.
54+
55+
1. Select an owner.
56+
57+
1. Select a remediation timeframe.
58+
59+
1. (Optional) Toggle the switch to apply a grace period.
60+
61+
1. (Optional) Set email notifications.
62+
63+
1. Select **Create**.
64+
65+
## Next step
66+
67+
> [!div class="nextstepaction"]
68+
> [Common questions about cloud security posture management (CSPM)](faq-cspm.yml).
Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,75 @@
1+
---
2+
title: Create a ticket in Defender for Cloud
3+
description: Learn how to create a ticket in Defender for Cloud that connects and synchronizes with your ServiceNow account.
4+
author: dcurwin
5+
ms.author: dacurwin
6+
ms.topic: how-to
7+
ms.date: 03/11/2024
8+
ai-usage: ai-assisted
9+
#customer intent: As a user, I want to learn how to Create a ticket in Defender for Cloud for my ServiceNow account.
10+
---
11+
12+
# Create a ticket in Defender for Cloud
13+
14+
The integration between Defender for Cloud and ServiceNow allows Defender for Cloud customers to create tickets in Defender for Cloud that connects to a ServiceNow account. ServiceNow tickets are linked to recommendations directly from Defender for Cloud, allowing the two platforms to facilitate efficient incident management.
15+
16+
## Prerequisites
17+
18+
- Have an [application registry in ServiceNow](https://docs.servicenow.com/bundle/utah-employee-service-management/page/product/meeting-extensibility/task/create-app-registry-meeting-extensibility.html).
19+
20+
- Enable [Defender Cloud Security Posture Management (CSPM)](tutorial-enable-cspm-plan.md) on your Azure subscription.
21+
22+
- The following roles are required:
23+
- To create an assignment: Admin permissions to ServiceNow.
24+
25+
## Create a new ticket based on a recommendation to ServiceNow
26+
27+
Security admins can create and assign tickets directly from the Defender for Cloud portal.
28+
29+
1. Sign in to [the Azure portal](https://aka.ms/integrations).
30+
31+
1. Navigate to **Microsoft Defender for Cloud** > **Recommendations**.
32+
33+
1. Select any recommendation with unhealthy resources that you want to create a ServiceNow ticket for and assign an owner to.
34+
35+
1. Select the resource from the unhealthy resources and select **Assign owner**.
36+
37+
:::image type="content" border="true" source="./media/create-ticket-servicenow/create-assignment.png" alt-text="Screenshot of how to create an assignment." lightbox="media/create-ticket-servicenow/create-assignment.png":::
38+
39+
1. In the Type field, select **ServiceNow**
40+
41+
:::image type="content" source="media/create-ticket-servicenow/type-servicenow.png" alt-text="Screenshot that shows the create assignment window and the type field where you select ServiceNow.":::
42+
43+
1. Select the integration instance.
44+
45+
1. Select the ticket type.
46+
47+
> [!NOTE]
48+
> In ServiceNow, there are several types of tickets that can be used to manage and track different types of incidents, requests, and tasks. Only incident, change request, and problem are supported with this integration.
49+
50+
:::image type="content" border="true" source="./media/create-ticket-servicenow/assignment-type.png" alt-text="Screenshot of how to complete the assignment type.":::
51+
52+
1. Expand the assignment details section.
53+
54+
1. Complete the following fields:
55+
56+
- **Assigned to**: Choose the owner whom you would like to assign the affected recommendation to.
57+
- **Caller**: Represents the user defining the assignment.
58+
- **Description and Short Description**: Enter a description, and short description.
59+
- **Remediation timeframe**: Select the remediation timeframe.
60+
- **Apply Grace Period**: (Optional) apply a grace period.
61+
- **Set Email Notifications**: (Optional) You can send a reminder to the owners or the owner’s direct manager.
62+
63+
:::image type="content" border="true" source="./media/create-ticket-servicenow/assignment-details.png" alt-text="Screenshot of how to complete the assignment details.":::
64+
65+
1. Select **Create**.
66+
67+
After the assignment is created, the Ticket ID assigned to this affected resource will appear next to the resource in the recommendation. The Ticket ID represents the ticket created in the ServiceNow portal. You can select the Ticket ID to navigate to the newly created incident in the ServiceNow portal.
68+
69+
> [!NOTE]
70+
> When the integration is deleted, all of the assignments will be deleted. Deletion can take up to 24 hrs.
71+
72+
## Next step
73+
74+
> [!div class="nextstepaction"]
75+
> [Assign an owner to a recommendation or severity level](create-governance-rule-servicenow.md)
Lines changed: 91 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,91 @@
1+
---
2+
title: Critical assets protection (Preview)
3+
description: Learn how to identify and protect your critical assets in Microsoft Defender for Cloud with Microsoft Security Exposure Management.
4+
ms.topic: conceptual
5+
ms.date: 03/03/2024
6+
---
7+
8+
# Critical assets protection in Microsoft Defender for Cloud (Preview)
9+
10+
Defender for Cloud now has business criticality concept added to its security posture management capabilities. This feature helps you to identify and protect your most important assets. It uses the critical assets engine created by Microsoft Security Exposure Management (MSEM). You can define critical asset rules in MSEM, and Defender for Cloud can then them in scenarios such as risk prioritization, attack path analysis, and cloud security explorer.
11+
12+
## Availability
13+
14+
| Aspect | Details |
15+
|--|--|
16+
| Release state | Preview |
17+
| Prerequisites | Defender Cloud Security Posture Management (CSPM) enabled |
18+
| Required Microsoft Entra ID built-in roles: | To create/edit/read classification rules: Global Administrator, Security Administrator, Security Operator <br> To read classification rules: Global Reader, Security Reader |
19+
| Clouds: | All commercial clouds |
20+
21+
## Set up critical asset management
22+
23+
1. Sign in to the [Azure portal](https://portal.azure.com).
24+
25+
1. Navigate to **Microsoft Defender for Cloud** > **Environment Settings**.
26+
1. Select the **Resource criticality** tile.
27+
28+
:::image type="content" source="media/critical-assets-protection/resource-criticality-tile.png" alt-text="Screenshot of the resource criticality tile." lightbox="media/critical-assets-protection/resource-criticality-tile.png":::
29+
30+
1. The **Critical asset management** pane opens. Select **Open Microsoft Defender portal.**"
31+
32+
:::image type="content" source="media/critical-assets-protection/critical-asset-management-pane.png" alt-text="Screenshot of the critical asset management pane." lightbox="media/critical-assets-protection/critical-asset-management-pane.png":::
33+
34+
1. You then arrive at the **Critical asset management** page in the **Microsoft Defender XDR** portal.
35+
36+
:::image type="content" source="media/critical-assets-protection/critical-asset-management-page.png" alt-text="Screenshot of critical asset management page." lightbox="media/critical-assets-protection/critical-asset-management-page.png":::
37+
38+
1. To create custom critical asset rules to tag your resources as **Critical resources** in Defender for Cloud, select the **Create a new classification** button.
39+
40+
:::image type="content" source="media/critical-assets-protection/create-new-classification.png" alt-text="Screenshot of Create a new classification button." lightbox="media/critical-assets-protection/create-new-classification.png":::
41+
42+
1. Add a name and description for your new classification, and use under **Query builder**, select **Cloud resource** to build your critical assets rule. Then select **Next**.
43+
44+
:::image type="content" source="media/critical-assets-protection/create-critical-asset-classification.png" alt-text="Screenshot of how to create critical asset classification." lightbox="media/critical-assets-protection/create-critical-asset-classification.png":::
45+
46+
1. On the **Preview assets** page, you can see a list of assets that match the rule you created. After reviewing the page, select **Next**.
47+
48+
:::image type="content" source="media/critical-assets-protection/preview-assets.png" alt-text="Screenshot of Preview assets page, showing a list of all assets that match the rule." lightbox="media/critical-assets-protection/preview-assets.png":::
49+
50+
1. On the **Assign criticality** page, assign the criticality level to all assets matching the rule. Then select **Next**.
51+
52+
:::image type="content" source="media/critical-assets-protection/assign-criticality.png" alt-text="A screenshot of the Assign criticality page." lightbox="media/critical-assets-protection/assign-criticality.png":::
53+
54+
1. You can then see the **Review and finish** page. Review the results, and once you approve, select **Submit**.
55+
56+
:::image type="content" source="media/critical-assets-protection/review-finish.png" alt-text="Screenshot of the Review and finish page." lightbox="media/critical-assets-protection/review-finish.png":::
57+
58+
1. After you select **Submit**, you can close the **Microsoft Defender XDR** portal. You should wait for up to two hours until all assets matching your rule are tagged as **Critical**.
59+
60+
> [!NOTE]
61+
> Your critical asset rules apply to all the resources in the tenant that match the rule's condition.
62+
63+
## View your critical assets in Defender for Cloud
64+
65+
1. Once your assets are updated, go to the [Attack path analysis](how-to-manage-attack-path.md) page in Defender for Cloud. You can see all the attack paths to your critical assets.
66+
67+
:::image type="content" source="media/critical-assets-protection/attack-path-analysis.png" alt-text="Screenshot of attack path analysis page." lightbox="media/critical-assets-protection/attack-path-analysis.png":::
68+
69+
1. If you select an attack path title, you can see its details. Select the target, and under **Insights - Critical resource**, you can see the critical asset tagging information.
70+
71+
:::image type="content" source="media/critical-assets-protection/critical-resource-insights.png" alt-text="Screenshot of critical resource insights." lightbox="media/critical-assets-protection/critical-resource-insights.png":::
72+
73+
1. In the **Recommendations** page of Defender for Cloud, select the **Preview available** banner to see all the recommendations, which are now prioritized based on asset criticality.
74+
75+
:::image type="content" source="media/critical-assets-protection/recommendations-page.png" alt-text="Screenshot of the recommendations page, showing critical resources." lightbox="media/critical-assets-protection/recommendations-page.png":::
76+
77+
1. Select a recommendation, and then choose the **Graph** tab. Then choose the target, and select the **Insights** tab. You can see the critical asset tagging information.
78+
79+
:::image type="content" source="media/critical-assets-protection/recommendation-insights.png" alt-text="Screenshot of critical asset insights for recommendations." lightbox="media/critical-assets-protection/recommendation-insights.png":::
80+
81+
1. In the **Inventory** page of Defender for Cloud, you can see the critical assets in your organization.
82+
83+
:::image type="content" source="media/critical-assets-protection/inventory-page.png" alt-text="Screenshot of inventory page with critical assets tagged." lightbox="media/critical-assets-protection/inventory-page.png":::
84+
85+
1. To run custom queries on your critical assets, go to the **Cloud Security Explorer** page in Defender for Cloud.
86+
87+
:::image type="content" source="media/critical-assets-protection/cloud-security-explorer-page.png" alt-text="Screenshot of Cloud Security Explorer page with query for critical assets." lightbox="media/critical-assets-protection/cloud-security-explorer-page.png":::
88+
89+
## Related content
90+
91+
For more information about improving your cloud security posture, see [Cloud security posture management (CSPM)](concept-cloud-security-posture-management.md).

0 commit comments

Comments
 (0)