You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-apis-introduction.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ Defender for APIs currently provides security for APIs published in Azure API Ma
35
35
36
36
Review the inventory and security findings for onboarded APIs in the Defender for Cloud API Security dashboard. The dashboard shows the number of onboarded devices, broken down by API collections, endpoints, and Azure API Management services.
37
37
38
-
:::image type="content" source="media/defender-for-apis-introduction/inventory.png" alt-text="Screenshot for reviewing the onboarded API inventory.":::
38
+
:::image type="content" source="media/defender-for-apis-introduction/inventory.png" alt-text="Screenshot that shows the onboarded API inventory.":::
39
39
40
40
You can drill down into API collection to review security findings for onboarded API endpoints.
41
41
@@ -81,7 +81,7 @@ Act on recommendations and alerts to mitigate threats and risk. Defender for Clo
81
81
82
82
**When Defender for APIs is enabled together with the Defender CSPM plan**, you can use Cloud Security Explorer to proactively and efficiently query your organizational information to locate, identify, and remediate API assets, security issues, and risks.
83
83
84
-
:::image type="content" source="media/defender-for-apis-introduction/cloud-security-explorer.png" alt-text="Screenshot for reviewing API information in Cloud Security Explorer." lightbox="media/defender-for-apis-introduction/cloud-security-explorer.png":::
84
+
:::image type="content" source="media/defender-for-apis-introduction/cloud-security-explorer.png" alt-text="Screenshot that shows review API information in Cloud Security Explorer." lightbox="media/defender-for-apis-introduction/cloud-security-explorer.png":::
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-apis-manage.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ Defender for APIs is currently in preview.
20
20
1. Select **API security**.
21
21
1. Next to the API you want to offboard from Defender for APIs, select the ellipsis (...) > **Remove**.
22
22
23
-
:::image type="content" source="media/defender-for-apis-manage/api-remove.png" alt-text="Screenshot of review API information in Cloud Security Explorer." lightbox="media/defender-for-apis-manage/api-remove.png":::
23
+
:::image type="content" source="media/defender-for-apis-manage/api-remove.png" alt-text="Screenshot of the review API information in Cloud Security Explorer." lightbox="media/defender-for-apis-manage/api-remove.png":::
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-apis-posture.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,17 +22,17 @@ This article describes how to investigate API security findings, alerts, and sec
22
22
1. Select **API security (Preview)**.
23
23
1. In the **API Security** dashboard, select an API collection.
24
24
25
-
:::image type="content" source="media/defender-for-apis-posture/api-collection-details.png" alt-text="Screenshot showing the onboarded API collections."lightbox="media/defender-for-apis-posture/api-collection-details.png":::
25
+
:::image type="content" source="media/defender-for-apis-posture/api-collection-details.png" alt-text="Screenshot that shows the onboarded API collections."lightbox="media/defender-for-apis-posture/api-collection-details.png":::
26
26
27
27
1. In the API collection page, to drill down into an API endpoint, select the ellipses (...) > **View resource**.
28
28
29
-
:::image type="content" source="media/defender-for-apis-posture/view-resource.png" alt-text="Screenshot showing API endpoint details." lightbox="media/defender-for-apis-posture/view-resource.png":::
29
+
:::image type="content" source="media/defender-for-apis-posture/view-resource.png" alt-text="Screenshot that shows an API endpoint details." lightbox="media/defender-for-apis-posture/view-resource.png":::
30
30
31
31
1. In the **Resource health** page, review the endpoint settings.
32
32
1. In the **Recommendations** tab, review recommendation details and status.
33
33
1. In the **Alerts** tab review security alerts for the endpoint. Defender for Endpoint monitors API traffic to and from endpoints, to provide runtime protection against suspicious behavior and malicious attacks.
34
34
35
-
:::image type="content" source="media/defender-for-apis-posture/resource-health.png" alt-text="Screenshot showing the health of an endpoint." lightbox="media/defender-for-apis-posture/resource-health.png":::
35
+
:::image type="content" source="media/defender-for-apis-posture/resource-health.png" alt-text="Screenshot that shows the health of an endpoint." lightbox="media/defender-for-apis-posture/resource-health.png":::
36
36
37
37
## Create sample security alerts
38
38
@@ -50,13 +50,13 @@ When the Defender CSPM plan is enabled together with Defender for APIs, you can
50
50
- API collections that contain one or more API endpoints.
51
51
- API endpoints for Azure API Management operations.
52
52
53
-
:::image type="content" source="media/defender-for-apis-posture/api-insights.png" alt-text="Page showing predefined API query." lightbox="media/defender-for-apis-posture/api-insights.png":::
53
+
:::image type="content" source="media/defender-for-apis-posture/api-insights.png" alt-text="Screenshot that shows the predefined API query." lightbox="media/defender-for-apis-posture/api-insights.png":::
54
54
55
55
The search resultS display each API resource with its associated insights, so that you can review, prioritize, and fix any issues.
56
56
57
57
Alternatively, you can select the predefined query **Unauthenticated API endpoints containing sensitive data are outside the virtual network** > **Open query**. The query returns all unauthenticated API endpoints that contain sensitive data and aren't part of the Azure API management network.
58
58
59
-
:::image type="content" source="media/defender-for-apis-posture/predefined-query.png" alt-text="Screenshot showing a predefined API query.":::
59
+
:::image type="content" source="media/defender-for-apis-posture/predefined-query.png" alt-text="Screenshot that shows a predefined API query.":::
0 commit comments