Skip to content

Commit d10af75

Browse files
authored
Merge pull request #280837 from MicrosoftDocs/main
7/15/2024 OOB Live Publishing
2 parents 2ecaf9c + c25b977 commit d10af75

File tree

147 files changed

+582
-29
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

147 files changed

+582
-29
lines changed

articles/azure-web-pubsub/overview.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,20 +5,20 @@ author: yjin81
55
ms.author: yajin1
66
ms.service: azure-web-pubsub
77
ms.topic: overview
8-
ms.date: 11/08/2021
8+
ms.date: 07/12/2024
99
---
1010

1111
# What is Azure Web PubSub service?
1212

13-
The Azure Web PubSub Service helps you build real-time messaging web applications using WebSockets and the publish-subscribe pattern easily. This real-time functionality allows publishing content updates between server and connected clients (for example a single page web application or mobile application). The clients do not need to poll the latest updates, or submit new HTTP requests for updates.
13+
The Azure Web PubSub Service makes it easy to build real-time messaging web applications using WebSockets and the publish-subscribe pattern. This real-time functionality allows publishing content updates between server and connected clients (for example, a single page web application or mobile application). The clients don't need to poll for the latest updates, or submit new HTTP requests for updates.
1414

15-
This article provides an overview of Azure Web PubSub service.
15+
This article provides an overview of the Azure Web PubSub service.
1616

1717
## What is Azure Web PubSub service used for?
1818

19-
Any scenario that requires real-time publish-subscribe messaging between server and clients or among clients, can use Azure Web PubSub service. Traditional real-time features that often require polling from server or submitting HTTP requests, can also use Azure Web PubSub service.
19+
Any scenario that requires real-time publish-subscribe messaging between the server and clients or among clients, can use the Azure Web PubSub service. Traditional real-time features that often require polling from the server or submitting HTTP requests, can also use the Azure Web PubSub service.
2020

21-
Azure Web PubSub service can be used in any application type that requires real-time content updates. We list some examples that are good to use Azure Web PubSub service:
21+
The Azure Web PubSub service can be used in any application type that requires real-time content updates. We list some examples that are good to use the Azure Web PubSub service:
2222

2323
* **High frequency data updates:** gaming, voting, polling, auction.
2424
* **Live dashboards and monitoring:** company dashboard, financial market data, instant sales update, multi-player game leader board, and IoT monitoring.
@@ -35,17 +35,17 @@ Azure Web PubSub service can be used in any application type that requires real-
3535

3636
**Built-in support for large-scale client connections and highly available architectures:**
3737

38-
Azure Web PubSub service is designed for large-scale real-time applications. The service allows multiple instances to work together and scale to millions of client connections. Meanwhile, it also supports multiple global regions for sharding, high availability, or disaster recovery purposes.
38+
The Azure Web PubSub service is designed for large-scale real-time applications. The service allows multiple instances to work together and scale to millions of client connections. Meanwhile, it also supports multiple global regions for sharding, high availability, or disaster recovery purposes.
3939

4040
**Support for a wide variety of client SDKs and programming languages:**
4141

42-
Azure Web PubSub service works with a broad range of clients, such as web and mobile browsers, desktop apps, mobile apps, server process, IoT devices, and game consoles. Since this service supports the standard WebSocket connection with publish-subscribe pattern, it is easily to use any standard WebSocket client SDK in different languages with this service.
42+
The Azure Web PubSub service works with a broad range of clients. These clients include web and mobile browsers, desktop apps, mobile apps, server processes, IoT devices, and game consoles. Since this service supports the standard WebSocket connection with publish-subscribe pattern, it's easy to use any standard WebSocket client SDK in different languages with this service.
4343

4444
**Offer rich APIs for different messaging patterns:**
4545

4646
Azure Web PubSub service is a bi-directional messaging service that allows different messaging patterns among server and clients, for example:
4747

48-
* The server sends messages to a particular client, all clients, or a subset of clients that belong to a specific user, or have been placed in an arbitrary group.
48+
* The server sends messages to individual clients, all clients, or groups of clients that are associated with a specific user or categorized into arbitrary groups.
4949
* The client sends messages to clients that belong to an arbitrary group.
5050
* The clients send messages to server.
5151

articles/defender-for-cloud/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -756,6 +756,9 @@
756756
href: transition-to-defender-vulnerability-management.md
757757
- name: Common questions
758758
href: common-questions-microsoft-defender-vulnerability-management.md
759+
- name: Binary drift detection (preview)
760+
displayName: k8s, containers, aks
761+
href: binary-drift-detection.md
759762
- name: Kubernetes data plane hardening
760763
displayName: k8s, containers, aks
761764
href: kubernetes-workload-protections.md

articles/defender-for-cloud/alerts-reference.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2850,7 +2850,7 @@ Synapse.SQLPool_ShellExternalSourceAnomaly)
28502850

28512851
**[MITRE tactics](#mitre-attck-tactics)**: Execution
28522852

2853-
**Severity**: High
2853+
**Severity**: High/Medium
28542854

28552855
### **Unusual payload with obfuscated parts has been initiated by SQL Server**
28562856

@@ -2860,7 +2860,7 @@ Synapse.SQLPool_ShellExternalSourceAnomaly)
28602860

28612861
**[MITRE tactics](#mitre-attck-tactics)**: Execution
28622862

2863-
**Severity**: High
2863+
**Severity**: High/Medium
28642864

28652865
## Alerts for open-source relational databases
28662866

@@ -2876,7 +2876,7 @@ SQL.MySQL_BruteForce)
28762876

28772877
**[MITRE tactics](#mitre-attck-tactics)**: PreAttack
28782878

2879-
**Severity**: High
2879+
**Severity**: Medium
28802880

28812881
### **Suspected successful brute force attack**
28822882

@@ -2900,7 +2900,7 @@ SQL.MariaDB_BruteForce)
29002900

29012901
**[MITRE tactics](#mitre-attck-tactics)**: PreAttack
29022902

2903-
**Severity**: High
2903+
**Severity**: Medium
29042904

29052905
### **Attempted logon by a potentially harmful application**
29062906

@@ -2912,7 +2912,7 @@ SQL.MySQL_HarmfulApplication)
29122912

29132913
**[MITRE tactics](#mitre-attck-tactics)**: PreAttack
29142914

2915-
**Severity**: High
2915+
**Severity**: High/Medium
29162916

29172917
### **Login from a principal user not seen in 60 days**
29182918

@@ -2924,7 +2924,7 @@ SQL.MySQL_PrincipalAnomaly)
29242924

29252925
**[MITRE tactics](#mitre-attck-tactics)**: Exploitation
29262926

2927-
**Severity**: Medium
2927+
**Severity**: Low
29282928

29292929
### **Login from a domain not seen in 60 days**
29302930

Lines changed: 89 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,89 @@
1+
---
2+
title: Binary drift detection (preview)
3+
description: Learn how binary drift detection can help you detect unauthorized external processes within containers.
4+
ms.topic: how-to
5+
author: dcurwin
6+
ms.author: dacurwin
7+
ms.date: 06/17/2024
8+
#customer intent: As a user, I want to understand how binary drift detection can help me detect unauthorized external processes within containers.
9+
---
10+
11+
# Binary drift detection (preview)
12+
13+
A binary drift happens when a container is running an executable that didn’t come from the original image. This can either be intentional and legitimate, or it can indicate an attack. Since container images should be immutable, any processes launched from binaries not included in the original image should be evaluated as suspicious activity.
14+
15+
The binary drift detection feature alerts you when there's a difference between the workload that came from the image, and the workload running in the container. It alerts you about potential security threats by detecting unauthorized external processes within containers. You can define drift policies to specify conditions under which alerts should be generated, helping you distinguish between legitimate activities and potential threats.
16+
17+
Binary drift detection is integrated into the Defender for Containers plan and is available in public preview. It's available for the Azure (AKS), Amazon (EKS), and Google (GKE) clouds.
18+
19+
## Prerequisites
20+
21+
- To use binary drift detection, you need to run the Defender for Container sensor, which is available in AWS, GCP, and AKS in [versions](/azure/aks/supported-kubernetes-versions) 1.29 or higher.
22+
- The Defender for Container sensor must be enabled on the subscriptions and connectors.
23+
- To create and modify drift policies, you need global admin permissions on the tenant.
24+
25+
## Components
26+
27+
The following components are part of binary drift detection:
28+
29+
- an enhanced sensor capable of detecting binary drift
30+
- policy configuration options
31+
- a new binary drift alert
32+
33+
## Configure drift policies
34+
35+
Create drift policies to define when alerts should be generated. Each policy is made up of rules that define the conditions under which alerts should be generated. This allows you to tailor the feature to your specific needs, reducing false positives. You can create exclusions by setting higher priority rules for specific scopes or clusters, images, pods, Kubernetes labels, or namespaces.
36+
37+
To create and configure policies, follow these steps:
38+
39+
1. In Microsoft Defender for Cloud, go to **Environment settings**. Select **Containers drift policy**.
40+
41+
:::image type="content" source="media/binary-drift-detection/select-containers-drift-policy.png" alt-text="Screenshot of Select Containers drift policy in Environment settings." lightbox="media/binary-drift-detection/select-containers-drift-policy.png":::
42+
43+
1. You receive two rules out of the box: the **Alert on Kube-System namespace** rule and the **Default binary drift** rule. The default rule is a special rule that applies to everything if no other rule before it is matched. You can only modify its action, either to **Drift detection alert** or return it to the default **Ignore drift detection**. The **Alert on Kube-System namespace** rule is an out-of-the-box suggestion and can be modified like any other rule.
44+
45+
:::image type="content" source="media/binary-drift-detection/default-rule.png" alt-text="Screenshot of Default rule appears at the bottom of the list of rules." lightbox="media/binary-drift-detection/default-rule.png":::
46+
47+
1. To add a new rule, select **Add rule**. A side panel appears where you can configure the rule.
48+
49+
:::image type="content" source="media/binary-drift-detection/add-rule.png" alt-text="Screenshot of Select Add rule to create and configure a new rule." lightbox="media/binary-drift-detection/add-rule.png":::
50+
51+
1. To configure the rule, define the following fields:
52+
53+
- **Rule name**: A descriptive name for the rule.
54+
- **Action**: Select **Drift detection alert** if the rule should generate an alert or **Ignore drift detection** to exclude it from alert generation.
55+
- **Scope description**: A description of the scope to which the rule applies.
56+
- **Cloud scope**: The cloud provider to which the rule applies. You can choose any combination of Azure, AWS, or GCP. If you expand a cloud provider, you can select specific subscription. If you don't select the entire cloud provider, new subscriptions added to the cloud provider won't be included in the rule.
57+
- **Resource scope**: Here you can add conditions based on the following categories: **Container name**, **Image name**, **Namespace**, **Pod labels**, **Pod name**, or **Cluster name**. Then choose an operator: **Starts with**, **Ends with**, **Equals**, or **Contains**. Finally, enter the value to match. You can add as many conditions as needed by selecting **+Add condition**.
58+
- **Allow list for processes**: A list of processes that are allowed to run in the container. If a process not on this list is detected, an alert is generated.
59+
60+
Here's an example of a rule that allows the `dev1.exe` process to run in containers in the Azure cloud scope, whose image names start with either *Test123* or *env123*:
61+
62+
:::image type="content" source="media/binary-drift-detection/rule-configuration.png" alt-text="Example of a rule configuration with all the fields defined." lightbox="media/binary-drift-detection/rule-configuration.png":::
63+
64+
1. Select **Apply** to save the rule.
65+
66+
1. Once you configure your rule, select and drag the rule up or down on the list to change its priority. The rule with the highest priority is evaluated first. If there's a match, it either generates an alert or ignores it (based on what was chosen for that rule) and the evaluation stops. If no match is found, the next rule is evaluated. If there's no match for any rule, the default rule is applied.
67+
68+
1. To edit an existing rule, choose the rule and select **Edit**. This opens the side panel where you can make changes to the rule.
69+
70+
1. You can select **Duplicate rule** to create a copy of a rule. This can be useful if you want to create a similar rule with only minor changes.
71+
72+
1. To delete a rule, select **Delete rule**.
73+
74+
1. After you configured your rules, select **Save** to apply the changes and create the policy.
75+
1. Within 30 minutes, the sensors on the protected clusters are updated with the new policy.
76+
77+
## Monitor and manage alerts
78+
79+
The alert system is designed to notify you of any binary drifts, helping you maintain the integrity of your container images. If an unauthorized external process is detected that matches your defined policy conditions, an alert with high severity is generated for you to review.
80+
81+
## Adjust policies as needed
82+
83+
Based on the alerts you receive and your review of them, you might find it necessary to adjust your rules in the binary drift policy. This could involve refining conditions, adding new rules, or removing ones that generate too many false positives. The goal is to ensure that the defined binary drift policies with their rules effectively balance security needs with operational efficiency.
84+
85+
The effectiveness of binary drift detection relies on your active engagement in configuring, monitoring, and adjusting policies to suit your environment's unique requirements.
86+
87+
## Related content
88+
89+
- [Overview of Container security in Microsoft Defender for Containers](defender-for-containers-introduction.md)

articles/defender-for-cloud/defender-for-containers-introduction.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,8 @@ You can learn more by watching this video from the Defender for Cloud in the Fie
5454

5555
### Sensor-based capabilities
5656

57+
**Binary drift detection** - Defender for Containers provides a sensor-based capability that alerts you about potential security threats by detecting unauthorized external processes within containers. You can define drift policies to specify conditions under which alerts should be generated, helping you distinguish between legitimate activities and potential threats. For more information, see [Binary drift protection (preview)](binary-drift-detection.md).
58+
5759
**Kubernetes data plane hardening** - To protect the workloads of your Kubernetes containers with best practice recommendations, you can install the [Azure Policy for Kubernetes](../governance/policy/concepts/policy-for-kubernetes.md). Learn more about [monitoring components](monitoring-components.md) for Defender for Cloud.
5860

5961
With the add-on on your Kubernetes cluster, every request to the Kubernetes API server is monitored against the predefined set of best practices before being persisted to the cluster. You can then configure it to enforce the best practices and mandate them for future workloads.

articles/defender-for-cloud/enable-defender-for-databases-azure.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,10 @@ Learn more about this Microsoft Defender plan in [Overview of Microsoft Defender
4949
5050
1. Select **Save**
5151

52+
## Related content
53+
54+
- [Optional configurations after in-place migration from Azure Database for MySQL Single Server to Flexible Server](/azure/mysql/migrate/whats-happening-to-mysql-single-server#configure-microsoft-defender-for-cloud-properties-in-flexible-server).
55+
5256
## Next step
5357

5458
> [!div class="nextstepaction"]
58.7 KB
Loading
43.7 KB
Loading
36.7 KB
Loading
65.2 KB
Loading

0 commit comments

Comments
 (0)