Skip to content

Commit d0d4019

Browse files
committed
Reorged the April RNs
1 parent c490624 commit d0d4019

File tree

1 file changed

+17
-20
lines changed

1 file changed

+17
-20
lines changed

articles/security-center/release-notes.md

Lines changed: 17 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -25,13 +25,12 @@ To learn about *planned* changes that are coming soon to Security Center, see [I
2525

2626
Updates in April include:
2727
- [Recently pulled container registry images are now rescanned weekly (General Availability)](#recently-pulled-container-registry-images-are-now-rescanned-weekly-general-availability)
28-
- [Four new recommendations related to guest configuration (preview)](#four-new-recommendations-related-to-guest-configuration-preview)
2928
- [Use Azure Defender for Kubernetes to protect hybrid and multi-cloud Kubernetes deployments (preview)](#use-azure-defender-for-kubernetes-to-protect-hybrid-and-multi-cloud-kubernetes-deployments-preview)
30-
- [11 Azure Defender alerts deprecated](#11-azure-defender-alerts-deprecated)
29+
- [Four new recommendations related to guest configuration (preview)](#four-new-recommendations-related-to-guest-configuration-preview)
3130
- [CMK recommendations moved to best practices security control](#cmk-recommendations-moved-to-best-practices-security-control)
31+
- [11 Azure Defender alerts deprecated](#11-azure-defender-alerts-deprecated)
3232
- [Two recommendations from "Apply system updates" security control were deprecated](#two-recommendations-from-apply-system-updates-security-control-were-deprecated)
3333

34-
3534
### Recently pulled container registry images are now rescanned weekly (General Availability)
3635

3736
Azure Defender for container registries includes a built-in vulnerability scanner. This scanner immediately scans any image you push to your registry and any image pulled within the last 30 days.
@@ -43,23 +42,6 @@ Scanning is charged on a per image basis, so there's no additional charge for th
4342
Learn more about this scanner in [Use Azure Defender for container registries to scan your images for vulnerabilities](defender-for-container-registries-usage.md).
4443

4544

46-
### Four new recommendations related to guest configuration (preview)
47-
48-
Azure's [Guest Configuration extension](../governance/policy/concepts/guest-configuration.md) reports to Security Center to help ensure your virtual machines' in-guest settings are hardened. The extension isn't required for Arc enabled servers because it's included in the Arc Connected Machine agent. The extension requires a system-managed identity on the machine.
49-
50-
We've added four new recommendations to Security Center to make the most of this extension.
51-
52-
- Two recommendations prompt you to install the extension and its required system-managed identity:
53-
- **Guest Configuration extension should be installed on your machines**
54-
- **Virtual machines' Guest Configuration extension should be deployed with system-assigned managed identity**
55-
56-
- When the extension is installed and running, it'll begin auditing your machines and you'll be prompted to harden settings such as configuration of the operating system and environment settings. These two recommendations will prompt you to harden your Windows and Linux machines as described:
57-
- **Windows Defender Exploit Guard should be enabled on your machines**
58-
- **Authentication to Linux machines should require SSH keys**
59-
60-
Learn more in [Understand Azure Policy's Guest Configuration](../governance/policy/concepts/guest-configuration.md).
61-
62-
6345
### Use Azure Defender for Kubernetes to protect hybrid and multi-cloud Kubernetes deployments (preview)
6446

6547
Azure Defender for Kubernetes is expanding its threat protection capabilities to defend your clusters wherever they're deployed. This has been enabled by integrating with [Azure Arc enabled Kubernetes](../azure-arc/kubernetes/overview.md) and its new [extensions capabilities](../azure-arc/kubernetes/extensions.md).
@@ -80,6 +62,21 @@ Learn more in [Use Azure Defender for Kubernetes with your on-premises and multi
8062

8163
:::image type="content" source="media/defender-for-kubernetes-azure-arc/extension-recommendation.png" alt-text="Azure Security Center's recommendation for deploying the Azure Defender extension for Azure Arc enabled Kubernetes clusters." lightbox="media/defender-for-kubernetes-azure-arc/extension-recommendation.png":::
8264

65+
### Four new recommendations related to guest configuration (preview)
66+
67+
Azure's [Guest Configuration extension](../governance/policy/concepts/guest-configuration.md) reports to Security Center to help ensure your virtual machines' in-guest settings are hardened. The extension isn't required for Arc enabled servers because it's included in the Arc Connected Machine agent. The extension requires a system-managed identity on the machine.
68+
69+
We've added four new recommendations to Security Center to make the most of this extension.
70+
71+
- Two recommendations prompt you to install the extension and its required system-managed identity:
72+
- **Guest Configuration extension should be installed on your machines**
73+
- **Virtual machines' Guest Configuration extension should be deployed with system-assigned managed identity**
74+
75+
- When the extension is installed and running, it'll begin auditing your machines and you'll be prompted to harden settings such as configuration of the operating system and environment settings. These two recommendations will prompt you to harden your Windows and Linux machines as described:
76+
- **Windows Defender Exploit Guard should be enabled on your machines**
77+
- **Authentication to Linux machines should require SSH keys**
78+
79+
Learn more in [Understand Azure Policy's Guest Configuration](../governance/policy/concepts/guest-configuration.md).
8380

8481
### CMK recommendations moved to best practices security control
8582

0 commit comments

Comments
 (0)