Skip to content

Commit df75108

Browse files
committed
PM feedback changes in intro
1 parent 1b2823c commit df75108

7 files changed

+65
-78
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 16 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -156,25 +156,23 @@
156156
- name: Reference list of attack paths and cloud security graph components
157157
displayName: attack, paths, security, graph, components
158158
href: attack-path-reference.md
159-
- name: Protect servers
159+
- name: Plan Defender for Servers deployment
160160
items:
161-
- name: Plan Defender for Servers deployment
162-
items:
163-
- name: Get started
164-
displayName: VM, JIT, plan 1, plan 2, plans, vulnerability assessment, threat management, defender for endpoint, vulnerability scanner, Qualys, FIM, File integrity monitoring, adaptive application controls, adaptive network hardening, docker, fileless attack detection, auditd, simulate alerts
165-
href: plan-defender-for-servers.md
166-
- name: Review data residency and workspace design
167-
href: plan-defender-for-servers-data-workspace.md
168-
- name: Determine roles and access
169-
href: plan-defender-for-servers-roles.md
170-
- name: Select a plan
171-
href: plan-defender-for-servers-select-plan.md
172-
- name: Review agents and extensions
173-
href: plan-defender-for-servers-agents.md
174-
- name: Scale a Defender for Servers deployment
175-
href: plan-defender-for-servers-scale.md
176-
- name: Common questions
177-
href: faq-defender-for-servers.yml
161+
- name: Get started
162+
displayName: VM, JIT, plan 1, plan 2, plans, vulnerability assessment, threat management, defender for endpoint, vulnerability scanner, Qualys, FIM, File integrity monitoring, adaptive application controls, adaptive network hardening, docker, fileless attack detection, auditd, simulate alerts
163+
href: plan-defender-for-servers.md
164+
- name: Review data residency and workspace design
165+
href: plan-defender-for-servers-data-workspace.md
166+
- name: Determine roles and access
167+
href: plan-defender-for-servers-roles.md
168+
- name: Select a plan
169+
href: plan-defender-for-servers-select-plan.md
170+
- name: Review agents and extensions
171+
href: plan-defender-for-servers-agents.md
172+
- name: Scale a Defender for Servers deployment
173+
href: plan-defender-for-servers-scale.md
174+
- name: Common questions
175+
href: faq-defender-for-servers.yml
178176
- name: Protect cloud workloads
179177
items:
180178
- name: Agentless scanning

articles/defender-for-cloud/defender-for-cloud-introduction.md

Lines changed: 16 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -7,15 +7,11 @@ ms.date: 12/05/2022
77
---
88
# What is Microsoft Defender for Cloud?
99

10-
Microsoft Defender for Cloud is a unified security solution for Azure, AWS, and GCP resources, and on-premises machines. Defended for Cloud combines the capabilities of:
10+
Microsoft Defender for Cloud is a cloud-native application protection platform (CNAPP) with a set of security measures and practices designed to protect cloud-based applications from various cyber threats and vulnerabilities. Defender for Cloud combines the capabilities of:
1111

12-
- A cloud-native application protection platform (CNAPP) that protects your cloud applications in development and at runtime
12+
- A development security operations (DevSecOps) solution that unifies security management at the code level across multicloud and multiple-pipeline environments
1313
- A cloud security posture management (CSPM) solution that surfaces actions that you can take to prevent breaches
14-
- A cloud workload protection platform (CWPP) with specific protections for servers, containers, databases, and other workloads
15-
16-
Evaluate your organization’s security posture across clouds and continually assess its state with a secure score. Use recommendations and other Defender for Cloud capabilities to improve your score and posture.
17-
18-
Defender for Cloud includes Foundational CSPM (Free) capabilities for free. You can also enable advanced CSPM capabilities and cloud workload protections by enabling paid Defender plans.
14+
- A cloud workload protection platform (CWPP) with specific protections for servers, containers, storage, databases, and other workloads
1915

2016
![Diagram that shows the core functionality of Microsoft Defender for Cloud.](media/defender-for-cloud-introduction/defender-for-cloud-pillars.png)
2117

@@ -33,42 +29,41 @@ Today’s applications require security awareness at the code, infrastructure, a
3329

3430
The security of your cloud and on-premises resources depends on proper configuration and deployment. Defender for Cloud recommendations identify the steps that you can take to secure your environment.
3531

32+
Defender for Cloud includes Foundational CSPM (Free) capabilities for free. You can also enable advanced CSPM capabilities and cloud workload protections by enabling paid Defender plans.
33+
3634
| Capability | What problem does it solve? | Get started | Defender plan and pricing |
3735
| ---------- | --------------------------- | ----------- | ------------------------- |
3836
| [Centralized policy management](security-policy-concept.md) | Define the security conditions that you want to maintain across your environment. The policy translates to recommendations that identify resource configurations that violate your security policy. The [Microsoft cloud security benchmark](concept-regulatory-compliance.md) is a built-in standard that applies security principles with detailed technical implementation guidance for Azure, for other cloud providers (such as AWS and GCP), and for other Microsoft clouds. | [Customize security a policy](custom-security-policies.md) | Foundational CSPM (Free) |
3937
| [Secure score]( secure-score-security-controls.md) | Summarize your security posture based on the security recommendations. As you remediate recommendations, your secure score improves. | [Track your secure score](secure-score-access-and-track.md) | Foundational CSPM (Free) |
4038
| [Multicloud coverage](plan-multicloud-security-get-started.md) | Connect to your multicloud environments with agentless methods for CSPM insight and CWP protection. | Connect your [Amazon AWS](quickstart-onboard-aws.md) and [Google GCP](quickstart-onboard-gcp.md) cloud resources to Defender for Cloud | Foundational CSPM (Free) |
4139
| [Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) | Use the dashboard to see weaknesses in your security posture. | [Enable CSPM tools](enable-enhanced-security.md) | Foundational CSPM (Free) |
42-
| [Advanced Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) | Get advanced tools to identify weaknesses in your security posture, including:</br>- Governance to drive actions to improve your security posture</br>- Regulatory compliance to verify compliance with security standards</br>- Cloud security explorer to build a comprehensive view of your environment | [Enable CSPM tools](enable-enhanced-security.md) | Defender CSPM |
43-
| [Attack path analysis](concept-attack-path.md) | Model traffic on your network to identify potential risks before you implement changes to your environment. | [Build queries to analyze paths](how-to-manage-cloud-security-explorer.md) | Defender CSPM |
40+
| [Advanced Cloud Security Posture Management](concept-cloud-security-posture-management.md) | Get advanced tools to identify weaknesses in your security posture, including:</br>- Governance to drive actions to improve your security posture</br>- Regulatory compliance to verify compliance with security standards</br>- Cloud security explorer to build a comprehensive view of your environment | [Enable CSPM tools](enable-enhanced-security.md) | Defender CSPM |
41+
| [Attack path analysis](concept-attack-path.md#what-is-attack-path-analysis) | Model traffic on your network to identify potential risks before you implement changes to your environment. | [Build queries to analyze paths](how-to-manage-attack-path.md) | Defender CSPM |
42+
| [Cloud Security Explorer](concept-attack-path.md#what-is-cloud-security-explorer) | A map of your cloud environment that lets you build queries to find security risks. | [Build queries to find security risks](how-to-manage-cloud-security-explorer.md) | Defender CSPM |
4443
| [Security governance](governance-rules.md#building-an-automated-process-for-improving-security-with-governance-rules) | Drive security improvements through your organization by assigning tasks to resource owners and tracking progress in aligning your security state with your security policy. | [Define governance rules](governance-rules.md#defining-governance-rules-to-automatically-set-the-owner-and-due-date-of-recommendations) | Defender CSPM |
44+
| [Microsoft Entra Permissions Management](../active-directory/cloud-infrastructure-entitlement-management/index.yml) | Provide comprehensive visibility and control over permissions for any identity and any resource in Azure, AWS, and GCP. | [Review your Permission Creep Index (CPI)](other-threat-protections.md#entra-permission-management-formerly-cloudknox) | Defender CSPM |
4545

4646
## Protect cloud workloads
4747

48-
### Cloud Workload Protections (CWP)
48+
### Cloud workload protections
49+
50+
Proactive security principles require that you implement security practices that protect your workloads from threats. Cloud workload protections (CWP) surface workload-specific recommendations that lead you to the right security controls to protect your workloads.
4951

50-
Proactive security principles require that you implement security practices that protect your workloads from threats. Cloud workload protections surface workload-specific recommendations that lead you to the right security controls to protect your workloads.
52+
When your environment is threatened, you need to know right away the nature and severity of the threat so you can plan your response. After you identify a threat in your environment, you need to quickly respond to limit the risk to your resources.
5153

5254
| Capability | What problem does it solve? | Get started | Defender plan and pricing |
5355
| ---------- | --------------------------- | ----------- | ------------------------- |
5456
| Protect cloud servers | Provide server protections through Microsoft Defender for Endpoint or extended protection with just-in-time network access, file integrity monitoring, vulnerability assessment, and more. | [Secure your multicloud and on-premises servers](defender-for-servers-introduction.md) | [Defender for Servers](https://azure.microsoft.com/pricing/details/defender-for-cloud/) |
5557
| Identify threats to your storage resources | Detect unusual and potentially harmful attempts to access or exploit your storage accounts using advanced threat detection capabilities and Microsoft Threat Intelligence data to provide contextual security alerts. | [Protect your cloud storage resources](defender-for-storage-introduction.md) | [Defender for Storage](https://azure.microsoft.com/pricing/details/defender-for-cloud/) |
5658
| Protect cloud databases | Protect your entire database estate with attack detection and threat response for the most popular database types in Azure to protect the database engines and data types, according to their attack surface and security risks. | [Deploy specialized protections for cloud and on-premises databases](quickstart-enable-database-protections.md) | - [Defender for Azure SQL Databases](https://azure.microsoft.com/pricing/details/defender-for-cloud/)</br>- [Defender for SQL servers on machines](https://azure.microsoft.com/pricing/details/defender-for-cloud/)</br>- [Defender for Open-source relational databases](https://azure.microsoft.com/pricing/details/defender-for-cloud/)</br>- [Defender for Azure Cosmos DB](https://azure.microsoft.com/pricing/details/defender-for-cloud/) |
5759
| Protect containers | Secure your containers so you can improve, monitor, and maintain the security of your clusters, containers, and their applications with environment hardening, vulnerability assessments, and run-time protection. | [Find security risks in your containers](defender-for-containers-introduction.md) | [Defender for Containers](https://azure.microsoft.com/pricing/details/defender-for-cloud/) |
58-
59-
### Threat detection and response
60-
61-
When your environment is threatened, you need to know right away the nature and severity of the threat so you can plan your response. After you identify a threat in your environment, you need to quickly respond to limit the risk to your resources.
62-
63-
| Capability | What problem does it solve? | Get started | Defender plan and pricing |
64-
| ---------- | --------------------------- | ----------- | ------------------------- |
6560
| [Infrastructure service insights](asset-inventory.md) | Diagnose weaknesses in your application infrastructure that can leave your environment susceptible to attack. | - [Identify attacks targeting applications running over App Service](defender-for-app-service-introduction.md)</br>- [Detect attempts to exploit Key Vault accounts](defender-for-key-vault-introduction.md)</br>- [Get alerted on suspicious Resource Manager operations](defender-for-resource-manager-introduction.md)</br>- [Expose anomalous DNS activities](defender-for-dns-introduction.md) | - [Defender for App Service](https://azure.microsoft.com/pricing/details/defender-for-cloud/)</br></br>- [Defender for Key Vault](https://azure.microsoft.com/pricing/details/defender-for-cloud/)</br></br>- [Defender for Resource Manager](https://azure.microsoft.com/pricing/details/defender-for-cloud/)</br></br>- [Defender for DNS](https://azure.microsoft.com/pricing/details/defender-for-cloud/)|
66-
| [Security alerts](alerts-overview.md) | Get informed you of real-time events that threaten the security of your environment. Alerts are categorized and assigned severity levels to indicate proper responses. | [Manage security alerts]( managing-and-responding-alerts.md) | Defender CSPM |
67-
| [Security incidents](alerts-overview.md#what-are-security-incidents) | Correlate alerts to identify attack patterns and integrate with Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), and IT Service Management (ITSM) solutions to respond to threats and limit the risk to your resources. | [Export alerts to SIEM, SOAR, or ITSM systems](export-to-siem.md) | Defender CSPM |
61+
| [Security alerts](alerts-overview.md) | Get informed of real-time events that threaten the security of your environment. Alerts are categorized and assigned severity levels to indicate proper responses. | [Manage security alerts]( managing-and-responding-alerts.md) | [Any workload protection Defender plan](#cloud-workload-protections-cwp) |
62+
| [Security incidents](alerts-overview.md#what-are-security-incidents) | Correlate alerts to identify attack patterns and integrate with Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), and IT Service Management (ITSM) solutions to respond to threats and limit the risk to your resources. | [Export alerts to SIEM, SOAR, or ITSM systems](export-to-siem.md) | [Any workload protection Defender plan](#cloud-workload-protections-cwp) |
6863

6964
## Learn More
7065

71-
You can also check out:
66+
For more information about Defender for Cloud and how it works, check out:
7267

7368
- A [step-by-step walkthrough](https://mslearn.cloudguides.com/en-us/guides/Protect%20your%20multi-cloud%20environment%20with%20Microsoft%20Defender%20for%20Cloud) of Defender for Cloud
7469
- An interview about Defender for Cloud with an expert in cybersecurity in [Lessons Learned from the Field](episode-six.md)
@@ -77,9 +72,5 @@ You can also check out:
7772

7873
## Next steps
7974

80-
- To get started with Defender for Cloud, you need a subscription to Microsoft Azure. If you don't have a subscription, [sign up for a free trial](https://azure.microsoft.com/free/).
81-
- Defender for Cloud's free plan is enabled on all your current Azure subscriptions when you visit the Defender for Cloud pages in the Azure portal for the first time, or if enabled programmatically via the REST API. To take advantage of advanced security management and threat detection capabilities, you must enable the Defender plans. These features are free for the first 30 days. [Learn more about the pricing](https://azure.microsoft.com/pricing/details/defender-for-cloud/).
82-
- If you're ready to enable enhanced security features now, [Enable enhanced security features](enable-enhanced-security.md) walks you through the steps.
83-
8475
> [!div class="nextstepaction"]
8576
> [Enable Microsoft Defender plans](enable-enhanced-security.md)

articles/defender-for-cloud/permissions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: User roles and permissions in Microsoft Defender for Cloud
33
description: This article explains how Microsoft Defender for Cloud uses role-based access control to assign permissions to users and identify the permitted actions for each role.
4-
ms.topic: overview
4+
ms.topic: limits-and-quotas
55
ms.custom: ignite-2022
66
ms.date: 01/24/2023
77
---

articles/defender-for-cloud/plan-defender-for-servers-data-workspace.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@ You can learn how to [Analyze usage in Log Analytics workspace](../azure-monitor
171171
172172
Based on your usage, you won't be billed until you've used your daily allowance. If you're receiving a bill, it's only for the data used after the 500-MB limit is reached, or for other service that doesn't fall under the coverage of Defender for Cloud.
173173
174-
## How can I manage my costs?
174+
### How can I manage my costs?
175175
176176
You may want to manage your costs and limit the amount of data collected for a solution by limiting it to a particular set of agents. Use [solution targeting](../azure-monitor/insights/solution-targeting.md) to apply a scope to the solution and target a subset of computers in the workspace. If you're using solution targeting, Defender for Cloud lists the workspace as not having a solution.
177177
> [!IMPORTANT]

articles/defender-for-cloud/support-matrix-defender-for-cloud.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Features supported in different Azure cloud environments - Microsoft Defender for Cloud
33
description: Learn about the Azure cloud environments where Defender for Cloud can be used.
4-
ms.topic: overview
4+
ms.topic: limits-and-quotas
55
author: bmansheim
66
ms.author: benmansheim
77
ms.date: 02/07/2023

0 commit comments

Comments
 (0)