Skip to content

Commit cf9c239

Browse files
authored
Merge pull request #269738 from rayne-wiselman/rayne-azure-march20-2
adding new relnotes page
2 parents 89674f7 + 3aad009 commit cf9c239

37 files changed

+6345
-6231
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,25 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-cloud/recommendations-reference.md",
5+
"redirect_url": "/azure/defender-for-cloud/security-policy-concept",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/defender-for-cloud/recommendations-reference-gcp.md",
10+
"redirect_url": "/azure/defender-for-cloud/security-policy-concept",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/defender-for-cloud/recommendations-reference-aws.md",
15+
"redirect_url": "/azure/defender-for-cloud/security-policy-concept",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/defender-for-cloud/upcoming-changes.md",
20+
"redirect_url": "/azure/defender-for-cloud/release-notes",
21+
"redirect_document_id": false
22+
},
323
{
424
"source_path_from_root": "/articles/defender-for-cloud/secret-scanning.md",
525
"redirect_url": "/azure/defender-for-cloud/secrets-scanning-servers",

articles/defender-for-cloud/TOC.yml

Lines changed: 86 additions & 66 deletions
Large diffs are not rendered by default.

articles/defender-for-cloud/concept-agentless-containers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Agentless container posture provides the following capabilities:
2222
- **[Agentless vulnerability assessment](agentless-vulnerability-assessment-azure.md)** - provides vulnerability assessment for all container images, including recommendations for registry and runtime, near real-time scans of new images, daily refresh of results, exploitability insights, and more. Vulnerability information is added to the security graph for contextual risk assessment and calculation of attack paths, and hunting capabilities.
2323
- **[Attack path analysis](concept-attack-path.md)** - Contextual risk assessment exposes exploitable paths that attackers might use to breach your environment and are reported as attack paths to help prioritize posture issues that matter most in your environment.
2424
- **[Enhanced risk-hunting](how-to-manage-cloud-security-explorer.md)** - Enables security admins to actively hunt for posture issues in their containerized assets through queries (built-in and custom) and [security insights](attack-path-reference.md#insights) in the [security explorer](how-to-manage-cloud-security-explorer.md).
25-
- **Control plane hardening** - Defender for Cloud continuously assesses the configurations of your clusters and compares them with the initiatives applied to your subscriptions. When it finds misconfigurations, Defender for Cloud generates security recommendations that are available on Defender for Cloud's Recommendations page. The recommendations let you investigate and remediate issues. For details on the recommendations included with this capability, check out the [containers section](recommendations-reference.md#container-recommendations) of the recommendations reference table for recommendations of the type **control plane**.
25+
- **Control plane hardening** - Defender for Cloud continuously assesses the configurations of your clusters and compares them with the initiatives applied to your subscriptions. When it finds misconfigurations, Defender for Cloud generates security recommendations that are available on Defender for Cloud's Recommendations page. The recommendations let you investigate and remediate issues. For details on the recommendations included with this capability, check out the [container recommendations](recommendations-reference-container.md) of the type **control plane**.
2626

2727
## Next steps
2828

articles/defender-for-cloud/custom-dashboards-azure-workbooks.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: dcurwin
77
ms.date: 12/06/2023
88
---
99

10-
# Create rich, interactive reports of Defender for Cloud data by using workbooks
10+
# Create interactive reports with Azure Monitor workbooks
1111

1212
[Azure workbooks](../azure-monitor/visualize/workbooks-overview.md) are flexible canvas that you can use to analyze data and create rich, visual reports in the Azure portal. In workbooks, you can access multiple data sources across Azure. Combine workbooks into unified, interactive experiences.
1313

@@ -37,7 +37,7 @@ In Defender for Cloud, you can use integrated Azure workbooks functionality to b
3737
- [Vulnerability Assessment Findings workbook](#vulnerability-assessment-findings-workbook): View the findings of vulnerability scans of your Azure resources.
3838
- [Compliance Over Time workbook](#compliance-over-time-workbook): View the status of a subscription's compliance with regulatory standards or industry standards that you select.
3939
- [Active Alerts workbook](#active-alerts-workbook): View active alerts by severity, type, tag, MITRE ATT&CK tactics, and location.
40-
- Price Estimation workbook: View monthly, consolidated price estimations for Defender for Cloud plans based on the resource telemetry in your environment. The numbers are estimates that are based on retail prices and don't represent actual billing or invoice data.
40+
- Price Estimation workbook: View monthly, consolidated price estimations for plans in Defender for Cloud, based on the resource telemetry in your environment. The numbers are estimates that are based on retail prices and don't represent actual billing or invoice data.
4141
- Governance workbook: Use the governance report in the governance rules settings to track progress of the rules that affect your organization.
4242
- [DevOps Security (preview) workbook](#devops-security-workbook): View a customizable foundation that helps you visualize the state of your DevOps posture for the connectors that you set up.
4343

@@ -169,9 +169,9 @@ To see more details about an alert, select the alert.
169169

170170
:::image type="content" source="media/custom-dashboards-azure-workbooks/active-alerts-high.png" alt-text="Screenshot that shows all high-severity active alerts for a specific resource.":::
171171

172-
The **MITRE ATT&CK tactics** tab lists alerts in the order of the kill chain and the number of alerts that the subscription has at each stage.
172+
The **MITRE ATT&CK tactics** tab lists alerts in the order of the "kill chain" and the number of alerts that the subscription has at each stage.
173173

174-
:::image type="content" source="media/custom-dashboards-azure-workbooks/mitre-attack-tactics.png" alt-text="Screenshot that shows the order of the kill chain and the number of alerts.":::
174+
:::image type="content" source="media/custom-dashboards-azure-workbooks/mitre-attack-tactics.png" alt-text="Screenshot that shows the order of the chain and the number of alerts.":::
175175

176176
You can see all the active alerts in a table and filter by columns.
177177

@@ -280,4 +280,4 @@ This article describes the Defender for Cloud integrated Azure workbooks page th
280280

281281
Built-in workbooks get their data from Defender for Cloud recommendations.
282282

283-
- Learn about the many security recommendations in [Security recommendations: A reference guide](recommendations-reference.md).
283+

articles/defender-for-cloud/defender-for-apis-introduction.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,9 +53,8 @@ Last called data (UTC): The date when API traffic was last observed going to/fro
5353

5454
Use recommendations to improve your security posture, harden API configurations, identify critical API risks, and mitigate issues by risk priority.
5555

56-
Defender for API provides a number of recommendations, including recommendations to onboard APIs to the Defender for API plan, disable and remove unused APIs, and best practice recommendations for security, authentication, and access control.
56+
Defender for API provides a [number of recommendations](recommendations-reference-api.md), including recommendations to onboard APIs to the Defender for API plan, disable and remove unused APIs, and best practice recommendations for security, authentication, and access control.
5757

58-
[Review the recommendations reference](recommendations-reference.md).
5958

6059
## Detecting threats
6160

articles/defender-for-cloud/defender-for-container-registries-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Defender for Cloud identifies Azure Resource Manager based ACR registries in you
4242

4343
**Microsoft Defender for container registries** includes a vulnerability scanner to scan the images in your Azure Resource Manager-based Azure Container Registry registries and provide deeper visibility into your images' vulnerabilities.
4444

45-
When issues are found, you'll get notified in the workload protection dashboard. For every vulnerability, Defender for Cloud provides actionable recommendations, along with a severity classification, and guidance for how to remediate the issue. For details of Defender for Cloud's recommendations for containers, see the [reference list of recommendations](recommendations-reference.md#container-recommendations).
45+
When issues are found, you'll get notified in the workload protection dashboard. For every vulnerability, Defender for Cloud provides actionable recommendations, along with a severity classification, and guidance for how to remediate the issue. [Learn more](recommendations-reference-container.md) about container recommendations.
4646

4747
Defender for Cloud filters and classifies findings from the scanner. When an image is healthy, Defender for Cloud marks it as such. Defender for Cloud generates security recommendations only for images that have issues to be resolved. Defender for Cloud provides details of each reported vulnerability and a severity classification. Additionally, it gives guidance for how to remediate the specific vulnerabilities found on each image.
4848

articles/defender-for-cloud/defender-for-containers-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: dacurwin
77
ms.date: 01/09/2024
88
---
99

10-
# Overview of Container security in Microsoft Defender for Containers
10+
# Overview-Container protection in Defender for Cloud
1111

1212
Microsoft Defender for Containers is a cloud-native solution to improve, monitor, and maintain the security of your containerized assets (Kubernetes clusters, Kubernetes nodes, Kubernetes workloads, container registries, container images and more), and their applications, across multicloud and on-premises environments.
1313

@@ -50,7 +50,7 @@ You can learn more by watching this video from the Defender for Cloud in the Fie
5050

5151
:::image type="content" source="media/defender-for-containers/resource-filter.png" alt-text="Screenshot showing you where the resource filter is located." lightbox="media/defender-for-containers/resource-filter.png":::
5252

53-
For details included with this capability, check out the [containers section](recommendations-reference.md#container-recommendations) of the recommendations reference table, and look for recommendations with type "Control plane"
53+
For details included with this capability, review [container recommendations](recommendations-reference-container.md ), and look for recommendations with type "Control plane"
5454

5555
### Sensor-based capabilities
5656

articles/defender-for-cloud/kubernetes-workload-protections.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.date: 09/04/2023
1212
This page describes how to use Microsoft Defender for Cloud's set of security recommendations dedicated to Kubernetes data plane hardening.
1313

1414
> [!TIP]
15-
> For a list of the security recommendations that might appear for Kubernetes clusters and nodes, see the [Container recommendations](recommendations-reference.md#container-recommendations) section of the recommendations reference table.
15+
> For a list of the security recommendations that might appear for Kubernetes clusters and nodes, review[container recommendations](recommendations-reference-container.md).
1616
1717
## Set up your workload protection
1818

@@ -287,5 +287,5 @@ In this article, you learned how to configure Kubernetes data plane hardening.
287287
288288
For related material, see the following pages:
289289
290-
- [Defender for Cloud recommendations for compute](recommendations-reference.md#compute-recommendations)
290+
- [Defender for Cloud recommendations for compute](recommendations-reference-compute.md)
291291
- [Alerts for AKS cluster level](alerts-reference.md#alerts-for-containers---kubernetes-clusters)

articles/defender-for-cloud/multicloud.yml

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -78,11 +78,6 @@ landingContent:
7878
links:
7979
- text: How to connect AWS to Microsoft Defender for Cloud
8080
url: https://youtu.be/LHwgEFXT3kQ
81-
- linkListType: reference
82-
links:
83-
- text: Security recommendations for AWS resources
84-
url: recommendations-reference-aws.md
85-
8681
# Card
8782
- title: Defend Google GCP resources
8883
linkLists:

articles/defender-for-cloud/plan-defender-for-servers-agents.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -16,10 +16,10 @@ Defender for Servers is one of the paid plans provided by [Microsoft Defender fo
1616

1717
This article is the *fifth* article in the Defender for Servers planning guide. Before you begin, review the earlier articles:
1818

19-
1. [Start planning your deployment](plan-defender-for-servers.md)
20-
1. [Understand where your data is stored and Log Analytics workspace requirements](plan-defender-for-servers-data-workspace.md)
21-
1. [Review Defender for Servers access roles](plan-defender-for-servers-roles.md)
22-
1. [Select a Defender for Servers plan](plan-defender-for-servers-select-plan.md)
19+
1. [Start planning your deployment](plan-defender-for-servers.md).
20+
1. [Understand where your data is stored and Log Analytics workspace requirements](plan-defender-for-servers-data-workspace.md).
21+
1. [Review Defender for Servers access roles](plan-defender-for-servers-roles.md).
22+
1. [Select a plan for Defender for Servers](plan-defender-for-servers-select-plan.md).
2323

2424
## Review Azure Arc requirements
2525

@@ -61,7 +61,7 @@ The following table describes the agents that are used in Defender for Servers:
6161
Feature | Log Analytics agent | Azure Monitor agent
6262
--- | --- | ---
6363
Foundational CSPM recommendations (free) that depend on the agent: [OS baseline recommendation](apply-security-baseline.md) (Azure VMs) | :::image type="icon" source="./media/icons/yes-icon.png" :::| :::image type="icon" source="./media/icons/yes-icon.png" :::<br/><br/> With the Azure Monitor agent, the Azure Policy [guest configuration extension](../virtual-machines/extensions/guest-configuration.md) is used.
64-
Foundational CSPM: [System updates recommendations](recommendations-reference.md#compute-recommendations) (Azure VMs) | :::image type="icon" source="./media/icons/yes-icon.png" ::: | Not yet available.
64+
Foundational CSPM: [System updates recommendations](recommendations-reference-compute.md) (Azure VMs) | :::image type="icon" source="./media/icons/yes-icon.png" ::: | Not yet available.
6565
Foundational CSPM: [Antimalware/endpoint protection recommendations](endpoint-protection-recommendations-technical.md) (Azure VMs) | :::image type="icon" source="./media/icons/yes-icon.png" ::: | :::image type="icon" source="./media/icons/yes-icon.png" :::
6666
Attack detection at the OS level and network layer, including fileless attack detection<br/><br/> Plan 1 relies on Defender for Endpoint capabilities for attack detection. | :::image type="icon" source="./media/icons/yes-icon.png" :::<br/><br/> Plan 2| :::image type="icon" source="./media/icons/yes-icon.png" :::<br/><br/> Plan 2
6767
File integrity monitoring (Plan 2 only) | :::image type="icon" source="./media/icons/yes-icon.png" ::: | :::image type="icon" source="./media/icons/yes-icon.png" :::
@@ -110,7 +110,7 @@ Before you deploy Defender for Servers, verify operating system support for agen
110110

111111
## Review agent provisioning
112112

113-
When you enable Defender for Cloud plans, including Defender for Servers, you can choose to automatically provision some agents that are relevant for Defender for Servers:
113+
When you enable plans in Defender for Cloud, including Defender for Servers, you can choose to automatically provision some agents that are relevant for Defender for Servers:
114114

115115
- Log Analytics agent and Azure Monitor agent for Azure VMs
116116
- Log Analytics agent and Azure Monitor agent for Azure Arc VMs
@@ -146,7 +146,7 @@ You want to configure a custom workspace | Log Analytics agent, Azure Monitor ag
146146

147147
After working through these planning steps, you can start deployment:
148148

149-
- [Enable Defender for Servers](enable-enhanced-security.md) plans
149+
- [Enable plans in Defender for Servers](enable-enhanced-security.md)
150150
- [Connect on-premises machines](quickstart-onboard-machines.md) to Azure.
151151
- [Connect AWS accounts](quickstart-onboard-aws.md) to Defender for Cloud.
152152
- [Connect GCP projects](quickstart-onboard-gcp.md) to Defender for Cloud.

0 commit comments

Comments
 (0)