Skip to content

Commit d7980ad

Browse files
authored
Merge pull request #259492 from ElazarK/wi185672-qualy-mdvm
qualys mdvm
2 parents 62edf8e + f3cf2a4 commit d7980ad

File tree

9 files changed

+249
-7
lines changed

9 files changed

+249
-7
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -530,6 +530,12 @@
530530
- name: Automatically enable a vulnerability assessment solution
531531
displayName: qualys, rapid7, vulnerability, auto provision
532532
href: auto-deploy-vulnerability-assessment.md
533+
- name: Transition to the integrated Microsoft Defender Vulnerability Management vulnerability assessment solution
534+
displayName: qualys, rapid7, vulnerability, migrate, transition, Microsoft Defender Vulnerability Management, mdvm
535+
href: how-to-transition-to-built-in.md
536+
- name: Common questions
537+
displayName: questions, common, MDVM, Qualys, BYOL, bring your own license, agent, consolidated, vulnerability, management, faq, frequently asked questions
538+
href: faq-scanner-detection.yml
533539
- name: Enable just-in-time access on VMs
534540
displayName: jit, management, ports
535541
href: just-in-time-access-usage.md

articles/defender-for-cloud/deploy-vulnerability-assessment-byol-vm.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,14 @@ ms.topic: how-to
55
ms.custom: ignite-2022
66
ms.author: dacurwin
77
author: dcurwin
8-
ms.date: 06/29/2023
8+
ms.date: 12/18/2023
99
---
1010

1111
# Enable vulnerability scanning with a Bring Your Own License (BYOL) solution
1212

13-
If you've enabled **Microsoft Defender for Servers**, you're able to use Microsoft Defender for Cloud's built-in vulnerability assessment tool as described in [Integrated Qualys vulnerability scanner for virtual machines](./deploy-vulnerability-assessment-vm.md). This tool is integrated into Defender for Cloud and doesn't require any external licenses - everything's handled seamlessly inside Defender for Cloud. In addition, the integrated scanner supports Azure Arc-enabled machines.
13+
The Defender for Servers plan in Microsoft Defender for Cloud has a [built-in vulnerability assessment tool](./deploy-vulnerability-assessment-vm.md). The vulnerability assessment tool doesn't require any external licenses and supports Azure Arc-enabled machines.
1414

15-
Alternatively, you might want to deploy your own privately licensed vulnerability assessment solution from [Qualys](https://www.qualys.com/lp/azure) or [Rapid7](https://www.rapid7.com/products/insightvm/). You can install one of these partner solutions on multiple VMs belonging to the same subscription (but not to Azure Arc-enabled machines).
15+
If you don't want to use the integrated vulnerability assessment tool, you can use your own privately licensed vulnerability assessment solution from [Qualys](https://www.qualys.com/lp/azure) or [Rapid7](https://www.rapid7.com/products/insightvm/). This article explains the steps needed to deploy one of these partner solutions on multiple VMs belonging to the same subscription (but not to Azure Arc-enabled machines).
1616

1717
## Availability
1818

@@ -40,7 +40,7 @@ Supported solutions report vulnerability data to the partner's management platfo
4040

4141
Your VMs appear in one or more of the following groups:
4242

43-
- **Healthy resources** – Defender for Cloud has detected a vulnerability assessment solution running on these VMs.
43+
- **Healthy resources** – Defender for Cloud detected a vulnerability assessment solution running on these VMs.
4444
- **Unhealthy resources** – A vulnerability scanner extension can be deployed to these VMs.
4545
- **Not applicable resources** – these VMs can't have a vulnerability scanner extension deployed.
4646

@@ -52,7 +52,7 @@ Supported solutions report vulnerability data to the partner's management platfo
5252
> - If you haven't got a third-party vulnerability scanner configured, you won't be offered the opportunity to deploy it.
5353
> - If your selected VMs aren't protected by Microsoft Defender for Servers, the Defender for Cloud integrated vulnerability scanner option will be unavailable.
5454
55-
:::image type="content" source="media/deploy-vulnerability-assessment-vm/select-vulnerability-solution.png" alt-text="Screenshot of the solutions screen after you have selected the fix button for your resource.":::
55+
:::image type="content" source="media/deploy-vulnerability-assessment-vm/select-vulnerability-solution.png" alt-text="Screenshot of the solutions screen after you select the fix button for your resource.":::
5656

5757
1. If you're setting up a new BYOL configuration, select **Configure a new third-party vulnerability scanner**, select the relevant extension, select **Proceed**, and enter the details from the provider as follows:
5858

@@ -112,6 +112,8 @@ Example (this example doesn't include valid license details):
112112
-publicKey 'MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCOiOLXjOywMfLZIBGPZLwSocf1Q64GASLK9OHFEmanBl1nkJhZDrZ4YD5lM98fThYbAx1Rde2iYV1ze/wDlX4cIvFAyXuN7HbdkeIlBl6vWXEBZpUU17bOdJOUGolzEzNBhtxi/elEZLghq9Chmah82me/okGMIhJJsCiTtglVQIDAQAB'
113113
```
114114

115+
Learn more about obtaining the [Qualys Virtual Scanner Appliance](https://azuremarketplace.microsoft.com/marketplace/apps/qualysguard.qualys-virtual-scanner-app?tab=Overview) in Azure Marketplace.
116+
115117
## Next steps
116118

117119
- [Remediate the findings from your vulnerability assessment solution](remediate-vulnerability-findings-vm.md)

articles/defender-for-cloud/deploy-vulnerability-assessment-vm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: dcurwin
55
ms.author: dacurwin
66
ms.topic: how-to
77
ms.custom: ignite-2022
8-
ms.date: 06/29/2023
8+
ms.date: 12/18/2023
99
---
1010

1111
# Enable vulnerability scanning with the integrated Qualys scanner
@@ -72,7 +72,7 @@ The vulnerability scanner extension works as follows:
7272
7373
Your machines appear in one or more of the following groups:
7474

75-
- **Healthy resources** – Defender for Cloud has detected a vulnerability assessment solution running on these machines.
75+
- **Healthy resources** – Defender for Cloud detected a vulnerability assessment solution running on these machines.
7676
- **Unhealthy resources** – A vulnerability scanner extension can be deployed to these machines.
7777
- **Not applicable resources**[these machines aren't supported for the vulnerability scanner extension](faq-vulnerability-assessments.yml).
7878

Lines changed: 74 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,74 @@
1+
### YamlMime:FAQ
2+
metadata:
3+
title: Common questions - the built-in Microsoft Defender Vulnerability Management solution
4+
description: Frequently asked general questions about the built-in Microsoft Defender Vulnerability Management solution
5+
services: defender-for-cloud
6+
author: elkrieger
7+
ms.author: elkrieger
8+
manager: raynew
9+
ms.topic: faq
10+
ms.date: 12/03/2023
11+
title: Common questions about the built-in Microsoft Defender Vulnerability Management solution
12+
summary: |
13+
14+
sections:
15+
- name: Ignored
16+
questions:
17+
- question: |
18+
What are the benefits of having one consolidate VA solution, powered by Microsoft Defender Vulnerability Management (MVDM) across Defender for Cloud?
19+
answer: |
20+
1. **Hybrid approach:** offers flexible deployments options, by utilizing a consistent vulnerability scanner across various use cases. It's applicable in multicloud environments and different host runtimes:
21+
22+
- **Agentless vulnerability assessment:** Enabling agentless scanning on a subscription automatically scan all virtual machines in Azure, AWS, and GCP for software inventory and vulnerabilities, powered by MDVM.
23+
24+
- **Consolidated agent:** (MDVM) uses the same agent as Microsoft Defender for Endpoints (MDE) to protect servers, so, if you're an existing MDE customer, you're automatically covered by MDVM.
25+
26+
1. **Software vulnerability evidence (coming soon)**: The MDVM scanner identifies vulnerable software and provides the corresponding file path and/or registry key as evidence.
27+
28+
1. **Software inventory:** The MDVM scanner detects applications installed on virtual machines and establishes a correlation between the software and its associated known vulnerabilities.
29+
30+
1. **MDVM premium capabilities:** Customers of Defender for Servers P2 have the added benefit of access to premium capabilities of Microsoft Defender’s vulnerability management. These include Certificate Assessment, Baseline Assessment, Block vulnerable applications, and more. You can learn more about [MDVM's premium capabilities](https://learn.microsoft.com/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-capabilities?view=o365-worldwide)
31+
32+
33+
- question: |
34+
How can I view the VA findings generated by MDVM with a focus on CVE ID?
35+
answer: |
36+
You can use the [CVE workbook](https://aka.ms/CVEDashboard) which covers both the built-in Qualys VA solution and the built-in MDVM solution. The CVE workbook provides an overview of machines in your environment that have open vulnerabilities with a focus on CVE IDs. It shows vulnerability findings for either Microsoft Defender Vulnerability Management, or the integrated Qualys VA scanner.
37+
38+
39+
- question: |
40+
Why is there a different total number of vulnerabilities on the Recommendation page between MDVM and Qualys?
41+
answer: |
42+
The vulnerability assessment solution for servers, powered by MDVM, provides a unified and consolidated view of vulnerable software on the Recommendations page. Qualys utilizes the Qualys IDs that often contain one or two CVEs. MDVM consolidates these CVEs into a single or a few Vulnerability IDs. MDVM aggregates these CVEs into a single or a few Vulnerability IDs. This consolidation addresses multiple vulnerabilities within the same software simultaneously.
43+
44+
45+
- question: |
46+
What are the operating systems (OS) that are compatible with the MDVM scanner?
47+
answer: |
48+
Refer to the [list of compatible operating systems](https://learn.microsoft.com/microsoft-365/security/defender-vulnerability-management/tvm-supported-os?view=o365-worldwide) that are compatible with the MDVM scanner.
49+
50+
If your machine’s operating system isn't on the list of compatible OS, an upgrade is necessary to allow MDVM to perform a scan.
51+
52+
53+
- question: |
54+
Which agent is being used by the built-in MDVM VA solution?
55+
answer: |
56+
The built-in MDVM scanner in Defender for Cloud uses the same agent as Microsoft Defender for Endpoint. If endpoint protection is enabled, the MDVM agent is already enabled.
57+
58+
59+
- question: |
60+
If I'm using an EDR solution other than MDE, how can I upgrade my VA solution to MDVM?
61+
answer: |
62+
For cloud VMs, we recommend enabling agentless scanning under the Defender for Servers P2 plan, to provide a more comprehensive coverage while ensuring minimal effect on your machine’s performance.
63+
64+
If you're utilizing an on-premises machine, the [installation of the MDE agent is mandatory](https://learn.microsoft.com/microsoft-365/security/defender-endpoint/configure-server-endpoints?view=o365-worldwide). The MDVM solution requires the agent in order to conduct vulnerability scans.
65+
66+
67+
- question: |
68+
How can the premium capabilities offered by MDVM be accessed?
69+
answer: |
70+
Premium capabilities currently can be accessed through the [MDVM portal](https://security.microsoft.com/). Navigate to the [MDVM portal](https://security.microsoft.com/), and access the premium capabilities features under the vulnerability assessment section.
71+
72+
:::image type="content" source="media/faq-scanner-detection/dashboard.png" alt-text="Screenshot of the MDVM dashboard.":::
73+
74+
Learn more about [MDVM's premium capabilities](https://learn.microsoft.com/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management-capabilities?view=o365-worldwide).
Lines changed: 160 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,160 @@
1+
---
2+
title: Transition to the integrated Microsoft Defender Vulnerability Management vulnerability assessment solution
3+
description: Learn how to transition to the Microsoft Defender Vulnerability Management solution in Microsoft Defender for Cloud
4+
services: defender-for-cloud
5+
ms.service: defender-for-cloud
6+
ms.topic: how-to
7+
ms.date: 12/18/2023
8+
---
9+
10+
# Transition to the integrated Microsoft Defender Vulnerability Management vulnerability assessment solution
11+
12+
With the Defender for Servers plan in Microsoft Defender for Cloud, you can scan compute assets for vulnerabilities. If you're currently using a vulnerability assessment solution other than the Microsoft Defender Vulnerability Management vulnerability assessment solution, this article provides instructions on transitioning to the integrated Defender Vulnerability Management solution.
13+
14+
To transition to the integrated Defender Vulnerability Management solution, you can use the Azure portal, use an Azure policy definition (for Azure VMs), or use REST APIs.
15+
16+
- [Transition with Azure policy (for Azure VMs)](#transition-with-azure-policy-for-azure-vms)
17+
- [Transition with Defender for Cloud’s portal](#transition-with-defender-for-clouds-portal)
18+
- [Transition with REST API](#transition-with-rest-api)
19+
20+
## Transition with Azure policy (for Azure VMs)
21+
22+
1. Sign in to the [Azure portal](https://portal.azure.com/).
23+
24+
1. Navigate to **Policy** > **Definitions**.
25+
26+
1. Search for `Setup subscriptions to transition to an alternative vulnerability assessment solution`.
27+
28+
1. Select **Assign**.
29+
30+
1. Select a scope and enter an assignment name.
31+
32+
1. Select **Review + create**.
33+
34+
1. Review the information you entered and select **Create**.
35+
36+
This policy ensures that all Virtual Machines (VM) within a selected subscription are safeguarded with the built-in Defender Vulnerability Management solution.
37+
38+
Once you complete the transition to the Defender Vulnerability Management solution, you need to [Remove the old vulnerability assessment solution](#remove-the-old-vulnerability-assessment-solution)
39+
40+
## Transition with Defender for Cloud’s portal
41+
42+
In the Defender for Cloud portal, you have the ability to change the vulnerability assessment solution to the built-in Defender Vulnerability Management solution.
43+
44+
1. Sign in to the [Azure portal](https://portal.azure.com/).
45+
46+
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings**
47+
48+
1. Select the relevant subscription.
49+
50+
1. Locate the Defender for Servers plan and select **Settings**.
51+
52+
:::image type="content" source="media/how-to-migrate-to-built-in/settings-server.png" alt-text="Screenshot of the Defender for Cloud plan page that shows where to locate and select the settings button under the servers plan." lightbox="media/how-to-migrate-to-built-in/settings-server.png":::
53+
54+
1. Toggle `Vulnerability assessment for machines` to **On**.
55+
56+
If `Vulnerability assessment for machines` was already set to on, select **Edit configuration**
57+
58+
:::image type="content" source="media/how-to-migrate-to-built-in/edit-configuration.png" alt-text="Screenshot of the servers plan that shows where the edit configuration button is located." lightbox="media/how-to-migrate-to-built-in/edit-configuration.png":::
59+
60+
1. Select **Microsoft Defender Vulnerability Management**.
61+
62+
1. Select **Apply**.
63+
64+
1. Ensure that `Endpoint protection` or `Agentless scanning for machines` are toggled to **On**.
65+
66+
:::image type="content" source="media/how-to-migrate-to-built-in/two-to-one.png" alt-text="Screenshot that shows where to turn on endpoint protection and agentless scanning for machines is located." lightbox="media/how-to-migrate-to-built-in/two-to-one.png":::
67+
68+
1. Select **Continue**.
69+
70+
1. Select **Save**.
71+
72+
Once you complete the transition to the Defender Vulnerability Management solution, you need to [Remove the old vulnerability assessment solution](#remove-the-old-vulnerability-assessment-solution)
73+
74+
## Transition with REST API
75+
76+
### REST API for Azure VMs
77+
78+
Using this REST API, you can easily migrate your subscription, at scale, from any vulnerability assessment solution to the Defender Vulnerability Management solution.
79+
80+
`PUT https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.Security/serverVulnerabilityAssessmentsSettings/AzureServersSetting?api-version=2022-01-01-preview`
81+
82+
```json
83+
{
84+
"kind": "AzureServersSetting",
85+
"properties": {
86+
"selectedProvider": "MdeTvm"
87+
}
88+
}
89+
```
90+
91+
Once you complete the transition to the Defender Vulnerability Management solution, you need to [Remove the old vulnerability assessment solution](#remove-the-old-vulnerability-assessment-solution)
92+
93+
### REST API for multicloud VMs
94+
95+
Using this REST API, you can easily migrate your subscription, at scale, from any vulnerability assessment solution to the Defender Vulnerability Management solution.
96+
97+
`PUT https://management.azure.com/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/Microsoft.Security/securityconnectors/{connectorName}?api-version=2022-08-01-preview`
98+
99+
```json
100+
{
101+
"properties": {
102+
"hierarchyIdentifier": "{GcpProjectNumber}",
103+
"environmentName": "GCP",
104+
"offerings": [
105+
​ {
106+
​ "offeringType": "CspmMonitorGcp",
107+
​ "nativeCloudConnection": {
108+
​ "workloadIdentityProviderId": "{cspm}",
109+
​ "serviceAccountEmailAddress": "{emailAddressRemainsAsIs}"
110+
​ }
111+
​ },
112+
​ {
113+
​ "offeringType": "DefenderCspmGcp"
114+
​ },
115+
​ {
116+
​ "offeringType": "DefenderForServersGcp",
117+
​ "defenderForServers": {
118+
​ "workloadIdentityProviderId": "{defender-for-servers}",
119+
​ "serviceAccountEmailAddress": "{emailAddressRemainsAsIs}"
120+
​ },
121+
​ "arcAutoProvisioning": {
122+
​ "enabled": true,
123+
​ "configuration": {}
124+
​ },
125+
​ "mdeAutoProvisioning": {
126+
​ "enabled": true,
127+
​ "configuration": {}
128+
​ },
129+
​ "vaAutoProvisioning": {
130+
​ "enabled": true,
131+
​ "configuration": {
132+
​ "type": "TVM"
133+
​ }
134+
​ },
135+
​ "subPlan": "{P1/P2}"
136+
​ }
137+
],
138+
"environmentData": {
139+
​ "environmentType": "GcpProject",
140+
​ "projectDetails": {
141+
​ "projectId": "{GcpProjectId}",
142+
​ "projectNumber": "{GcpProjectNumber}",
143+
​ "workloadIdentityPoolId": "{identityPoolIdRemainsTheSame}"
144+
​ }
145+
}
146+
},
147+
"location": "{connectorRegion}"
148+
}
149+
```
150+
151+
## Remove the old vulnerability assessment solution
152+
153+
After migrating to the built-in Defender Vulnerability Management solution in Defender for Cloud, you need to offboard each VM from their old vulnerability assessment solution using either of the following methods:
154+
155+
- [Delete the VM extension with PowerShell](/powershell/module/az.compute/remove-azvmextension?view=azps-11.0.0).
156+
- [REST API DELETE request](/rest/api/compute/virtual-machine-extensions/delete?view=rest-compute-2023-07-01&tabs=HTTP).
157+
158+
## Next steps
159+
160+
[Common questions about vulnerability scanning questions](faq-scanner-detection.yml)
619 KB
Loading
80.1 KB
Loading
184 KB
Loading
51.3 KB
Loading

0 commit comments

Comments
 (0)