Skip to content

Commit d505904

Browse files
Merge pull request #244425 from AlizaBernstein/WI-124067-fix-permissions-contributor-role-in-table
WI-124067-fix-permissions-contributor-role-in-table
2 parents 8fe62a8 + 3222d82 commit d505904

File tree

1 file changed

+13
-15
lines changed

1 file changed

+13
-15
lines changed

articles/defender-for-cloud/exempt-resource.md

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -24,11 +24,11 @@ In such cases, you can create an exemption for a recommendation to:
2424

2525
## Availability
2626

27-
| Aspect | Details |
27+
Aspect | Details |
2828
| ------------------------------- | ----------------------------------------------------------- |
2929
| Release state: | Preview<br>[!INCLUDE [Legalese](../../includes/defender-for-cloud-preview-legal-text.md)] |
3030
| Pricing: | This is a premium Azure Policy capability that's offered at no more cost for customers with Microsoft Defender for Cloud's enhanced security features enabled. For other users, charges might apply in the future.
31-
| Required roles and permissions: | **Owner** or **Resource Policy Contributor** to create an exemption<br>To create a rule, you need permissions to edit policies in Azure Policy.<br>Learn more in [Azure RBAC permissions in Azure Policy](../governance/policy/overview.md#azure-rbac-permissions-in-azure-policy). |
31+
| Required roles and permissions: | **Owner** or **Security Admin** or **Resource Policy Contributor** to create an exemption<br>To create a rule, you need permissions to edit policies in Azure Policy.<br>Learn more in [Azure RBAC permissions in Azure Policy](../governance/policy/overview.md#azure-rbac-permissions-in-azure-policy). |
3232
| Limitations: | Exemptions can be created only for recommendations included in Defender for Cloud's default initiative, [Microsoft cloud security benchmark](/security/benchmark/azure/introduction), or any of the supplied regulatory standard initiatives. Recommendations that are generated from custom initiatives can't be exempted. Learn more about the relationships between [policies, initiatives, and recommendations](security-policy-concept.md). |
3333
| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: National (Azure Government, Azure China 21Vianet) |
3434

@@ -70,22 +70,22 @@ To create an exemption rule:
7070
1. Enter a description.
7171
1. Select **Create**.
7272

73-
:::image type="content" source="media/exempt-resource/defining-recommendation-exemption.png" alt-text="Steps to create an exemption rule to exempt a recommendation from your subscription or management group.":::
73+
:::image type="content" source="media/exempt-resource/defining-recommendation-exemption.png" alt-text="Steps to create an exemption rule to exempt a recommendation from your subscription or management group." lightbox="media/exempt-resource/defining-recommendation-exemption.png":::
7474

7575
When the exemption takes effect (it might take up to 30 minutes):
7676
- The recommendation or resources won't impact your secure score.
7777
- If you've exempted specific resources, they'll be listed in the **Not applicable** tab of the recommendation details page.
7878
- If you've exempted a recommendation, it will be hidden by default on Defender for Cloud's recommendations page. This is because the default options of the **Recommendation status** filter on that page are to exclude **Not applicable** recommendations. The same is true if you exempt all recommendations in a security control.
7979

80-
:::image type="content" source="media/exempt-resource/recommendations-filters-hiding-not-applicable.png" alt-text="Default filters on Microsoft Defender for Cloud's recommendations page hide the not applicable recommendations and security controls":::
80+
:::image type="content" source="media/exempt-resource/recommendations-filters-hiding-not-applicable.png" alt-text="Default filters on Microsoft Defender for Cloud's recommendations page hide the not applicable recommendations and security controls." lightbox="media/exempt-resource/recommendations-filters-hiding-not-applicable.png":::
8181

8282
- The information strip at the top of the recommendation details page updates the number of exempted resources:
8383

8484
:::image type="content" source="./media/exempt-resource/info-banner.png" alt-text="Number of exempted resources.":::
8585

8686
1. To review your exempted resources, open the **Not applicable** tab:
8787

88-
:::image type="content" source="./media/exempt-resource/modifying-exemption.png" alt-text="Modifying an exemption.":::
88+
:::image type="content" source="./media/exempt-resource/modifying-exemption.png" alt-text="Modifying an exemption." lightbox="media/exempt-resource/modifying-exemption.png":::
8989

9090
The reason for each exemption is included in the table (1).
9191

@@ -96,7 +96,7 @@ To create an exemption rule:
9696
> [!IMPORTANT]
9797
> To see the specific exemptions relevant to one recommendation, filter the list according to the relevant scope and recommendation name.
9898
99-
:::image type="content" source="./media/exempt-resource/policy-page-exemption.png" alt-text="Azure Policy's exemption page":::
99+
:::image type="content" source="./media/exempt-resource/policy-page-exemption.png" alt-text="Azure Policy's exemption page." lightbox="media/exempt-resource/policy-page-exemption.png":::
100100

101101
> [!TIP]
102102
> Alternatively, [use Azure Resource Graph to find recommendations with exemptions](#find-recommendations-with-exemptions-using-azure-resource-graph).
@@ -107,17 +107,17 @@ As explained earlier on this page, exemption rules are a powerful tool providing
107107

108108
To keep track of how your users are exercising this capability, we've created an Azure Resource Manager (ARM) template that deploys a Logic App Playbook and all necessary API connections to notify you when an exemption has been created.
109109

110-
- To learn more about the playbook, see the tech community blog post [How to keep track of Resource Exemptions in Microsoft Defender for Cloud](https://techcommunity.microsoft.com/t5/azure-security-center/how-to-keep-track-of-resource-exemptions-in-azure-security/ba-p/1770580)
110+
- To learn more about the playbook, see the tech community blog post [How to keep track of Resource Exemptions in Microsoft Defender for Cloud](https://techcommunity.microsoft.com/t5/azure-security-center/how-to-keep-track-of-resource-exemptions-in-azure-security/ba-p/1770580).
111111
- You'll find the ARM template in the [Microsoft Defender for Cloud GitHub repository](https://github.com/Azure/Azure-Security-Center/tree/master/Workflow%20automation/Notify-ResourceExemption)
112-
- To deploy all the necessary components, [use this automated process](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Security-Center%2Fmaster%2FWorkflow%2520automation%2FNotify-ResourceExemption%2Fazuredeploy.json)
112+
- To deploy all the necessary components, [use this automated process](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Security-Center%2Fmaster%2FWorkflow%2520automation%2FNotify-ResourceExemption%2Fazuredeploy.json).
113113

114114
## Use the inventory to find resources that have exemptions applied
115115

116116
The asset inventory page of Microsoft Defender for Cloud provides a single page for viewing the security posture of the resources you've connected to Defender for Cloud. Learn more in [Explore and manage your resources with asset inventory](asset-inventory.md).
117117

118118
The inventory page includes many filters to let you narrow the list of resources to the ones of most interest for any given scenario. One such filter is the **Contains exemptions**. Use this filter to find all resources that have been exempted from one or more recommendations.
119119

120-
:::image type="content" source="media/exempt-resource/inventory-filter-exemptions.png" alt-text="Defender for Cloud's asset inventory page and the filter to find resources with exemptions":::
120+
:::image type="content" source="media/exempt-resource/inventory-filter-exemptions.png" alt-text="Defender for Cloud's asset inventory page and the filter to find resources with exemptions." lightbox="media/exempt-resource/inventory-filter-exemptions.png":::
121121

122122
## Find recommendations with exemptions using Azure Resource Graph
123123

@@ -127,7 +127,7 @@ To view all recommendations that have exemption rules:
127127

128128
1. Open **Azure Resource Graph Explorer**.
129129

130-
:::image type="content" source="./media/multi-factor-authentication-enforcement/opening-resource-graph-explorer.png" alt-text="Launching Azure Resource Graph Explorer** recommendation page" :::
130+
:::image type="content" source="./media/multi-factor-authentication-enforcement/opening-resource-graph-explorer.png" alt-text="Launching Azure Resource Graph Explorer** recommendation page." lightbox="media/multi-factor-authentication-enforcement/opening-resource-graph-explorer.png":::
131131

132132
1. Enter the following query and select **Run query**.
133133

@@ -158,12 +158,10 @@ To view all recommendations that have exemption rules:
158158
Learn more in the following pages:
159159
160160
- [Learn more about Azure Resource Graph](../governance/resource-graph/index.yml).
161-
- [How to create queries with Azure Resource Graph Explorer](../governance/resource-graph/first-query-portal.md)
162-
- [Kusto Query Language (KQL)](/azure/data-explorer/kusto/query/)
161+
- [How to create queries with Azure Resource Graph Explorer](../governance/resource-graph/first-query-portal.md).
162+
- [Kusto Query Language (KQL)](/azure/data-explorer/kusto/query/).
163163
164164
165165
## Next steps
166166
167-
In this article, you learned how to exempt a resource from a recommendation so that it doesn't impact your secure score. For more information about secure score, see:
168-
169-
- [Secure score in Microsoft Defender for Cloud](secure-score-security-controls.md)
167+
In this article, you learned how to exempt a resource from a recommendation so that it doesn't impact your secure score. For more information about secure score, see [Secure score in Microsoft Defender for Cloud](secure-score-security-controls.md).

0 commit comments

Comments
 (0)