Skip to content

Commit daa35c2

Browse files
authored
Merge pull request #272279 from rayne-wiselman/rayne-azure-april-16
secrets docs
2 parents 4748ff2 + e648280 commit daa35c2

12 files changed

+598
-323
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-cloud/secret-scanning.md",
5+
"redirect_url": "/azure/defender-for-cloud/secrets-scanning-servers",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/defender-for-cloud/prevent-misconfigurations.md",
510
"redirect_url": "/azure/defender-for-cloud/manage-mcsb",

articles/defender-for-cloud/TOC.yml

Lines changed: 21 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -213,6 +213,15 @@
213213
href: critical-assets-protection.md
214214
- name: Agentless machine scanning
215215
href: concept-agentless-data-collection.md
216+
- name: Secrets protection
217+
items:
218+
- name: Overview
219+
href: secrets-scanning.md
220+
- name: Protecting VM secrets
221+
href: secrets-scanning-servers.md
222+
- name: Protecting cloud deployment secrets
223+
href: secrets-scanning-cloud-deployment.md
224+
216225
- name: Integrations
217226
items:
218227
- name: ServiceNow
@@ -320,6 +329,12 @@
320329
- name: Attack path analysis and enhanced risk-hunting for containers
321330
displayName: attack paths, paths, security explorer, test
322331
href: how-to-test-attack-path-and-security-explorer-with-vulnerable-container-image.md
332+
- name: Secrets security posture
333+
items:
334+
- name: Remediate issues with VM secrets
335+
href: remediate-server-secrets.md
336+
- name: Remediate cloud deployment secrets
337+
href: remediate-cloud-deployment-secrets.md
323338
- name: Manage security standards and recommendations
324339
items:
325340
- name: Choose standards for your compliance dashboard
@@ -528,9 +543,13 @@
528543
- name: Agentless machine scanning
529544
displayName: agentless, scanning, virtual, machines, freshness, snapshot, snapshots
530545
href: concept-agentless-data-collection.md
531-
- name: Manage secrets with agentless secret scanning
546+
- name: Protect secrets
532547
displayName: secrets, secret scanning, agentless
533-
href: secret-scanning.md
548+
items:
549+
- name: Overview
550+
href: secrets-scanning-servers.md
551+
- name: Remediate VM secrets
552+
href: remediate-server-secrets.md
534553
- name: Protect servers with agentless malware scanning
535554
displayName: agentless, scanning, virtual, machines, freshness, snapshot, snapshots, Microsoft Defender Antivirus
536555
href: agentless-malware-scanning.md

articles/defender-for-cloud/concept-agentless-data-collection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Agentless scanning for virtual machines (VM) provides:
1919
- Broad, frictionless visibility into your software inventory using Microsoft Defender Vulnerability Management.
2020
- Deep analysis of operating system configuration and other machine meta data.
2121
- [Vulnerability assessment](enable-agentless-scanning-vms.md) using Defender Vulnerability Management.
22-
- [Secret scanning](secret-scanning.md) to locate plain text secrets in your compute environment.
22+
- [Secret scanning](secrets-scanning.md) to locate plain text secrets in your compute environment.
2323
- Threat detection with [agentless malware scanning](agentless-malware-scanning.md), using [Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows).
2424

2525
Agentless scanning assists you in the identification process of actionable posture issues without the need for installed agents, network connectivity, or any effect on machine performance. Agentless scanning is available through both the [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) plan and [Defender for Servers P2](plan-defender-for-servers-select-plan.md#plan-features) plan.
@@ -30,7 +30,7 @@ Agentless scanning assists you in the identification process of actionable postu
3030
|---------|---------|
3131
|Release state:| GA |
3232
|Pricing:|Requires either [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) or [Microsoft Defender for Servers Plan 2](plan-defender-for-servers-select-plan.md#plan-features)|
33-
| Supported use cases:| :::image type="icon" source="./media/icons/yes-icon.png"::: [Vulnerability assessment (powered by Defender Vulnerability Management)](deploy-vulnerability-assessment-defender-vulnerability-management.md)<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Software inventory (powered by Defender Vulnerability Management):::image type="icon" source="./media/icons/yes-icon.png"::: [Secret scanning](secret-scanning.md) <br />:::image type="icon" source="./media/icons/yes-icon.png"::: [Malware scanning (Preview)](agentless-malware-scanning.md) **Only available with Defender for Servers plan 2**|
33+
| Supported use cases:| :::image type="icon" source="./media/icons/yes-icon.png"::: [Vulnerability assessment (powered by Defender Vulnerability Management)](deploy-vulnerability-assessment-defender-vulnerability-management.md)<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Software inventory (powered by Defender Vulnerability Management):::image type="icon" source="./media/icons/yes-icon.png"::: [Secret scanning](secrets-scanning.md) <br />:::image type="icon" source="./media/icons/yes-icon.png"::: [Malware scanning (Preview)](agentless-malware-scanning.md) **Only available with Defender for Servers plan 2**|
3434
| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Azure Commercial clouds<br> :::image type="icon" source="./media/icons/no-icon.png"::: Azure Government<br>:::image type="icon" source="./media/icons/no-icon.png"::: Microsoft Azure operated by 21Vianet<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Connected AWS accounts<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Connected GCP projects |
3535
| Operating systems: | :::image type="icon" source="./media/icons/yes-icon.png"::: Windows<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Linux |
3636
| Instance and disk types: | **Azure**<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Standard VMs<br>:::image type="icon" source="./media/icons/no-icon.png"::: Unmanaged disks<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Virtual machine scale set - Flex<br>:::image type="icon" source="./media/icons/no-icon.png"::: Virtual machine scale set - Uniform<br><br>**AWS**<br>:::image type="icon" source="./media/icons/yes-icon.png"::: EC2<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Auto Scale instances<br>:::image type="icon" source="./media/icons/no-icon.png"::: Instances with a ProductCode (Paid AMIs)<br><br>**GCP**<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Compute instances<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Instance groups (managed and unmanaged) |
247 KB
Loading

0 commit comments

Comments
 (0)