Skip to content

Commit e5cfad2

Browse files
Merge pull request #202271 from ElazarK/mfa-release
mfa moved from upcoming to rn
2 parents 0b30622 + cad7af1 commit e5cfad2

File tree

1 file changed

+37
-3
lines changed

1 file changed

+37
-3
lines changed

articles/defender-for-cloud/release-notes.md

Lines changed: 37 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ ms.author: benmansheim
66
ms.topic: reference
77
ms.date: 09/20/2022
88
---
9-
---
109

1110
# What's new in Microsoft Defender for Cloud?
1211

@@ -21,9 +20,12 @@ To learn about *planned* changes that are coming soon to Defender for Cloud, see
2120
2221
## September 2022
2322

23+
Updates in September include:
24+
2425
- [Suppress alerts based on Container and Kubernetes entities](#suppress-alerts-based-on-container-and-kubernetes-entities)
2526
- [Defender for Servers supports File Integrity Monitoring with Azure Monitor Agent](#defender-for-servers-supports-file-integrity-monitoring-with-azure-monitor-agent)
2627
- [Legacy Assessments APIs deprecation](#legacy-assessments-apis-deprecation)
28+
- [Extra recommendations added to identity](#extra-recommendations-added-to-identity)
2729

2830
### Suppress alerts based on Container and Kubernetes entities
2931

@@ -63,6 +65,38 @@ The following APIs are deprecated:
6365

6466
These three APIs exposed old formats of assessments and are replaced by the [Assessments APIs](/rest/api/defenderforcloud/assessments) and [SubAssessments APIs](/rest/api/defenderforcloud/sub-assessments). All data that is exposed by these legacy APIs are also available in the new APIs.
6567

68+
### Extra recommendations added to identity
69+
70+
Defender for Cloud's recommendations for improving the management of users and accounts.
71+
72+
#### New recommendations
73+
74+
The new release contains the following capabilities:
75+
76+
- **Extended evaluation scope** – Coverage has been improved for identity accounts without MFA and external accounts on Azure resources (instead of subscriptions only) which allows your security administrators to view role assignments per account.
77+
78+
- **Improved freshness interval** - The identity recommendations now have a freshness interval of 12 hours.
79+
80+
- **Account exemption capability** - Defender for Cloud has many features you can use to customize your experience and ensure that your secure score reflects your organization's security priorities. For example, you can [exempt resources and recommendations from your secure score](exempt-resource.md).
81+
82+
This update allows you to exempt specific accounts from evaluation with the six recommendations listed in the following table.
83+
84+
Typically, you'd exempt emergency “break glass” accounts from MFA recommendations, because such accounts are often deliberately excluded from an organization's MFA requirements. Alternatively, you might have external accounts that you'd like to permit access to, that don't have MFA enabled.
85+
86+
> [!TIP]
87+
> When you exempt an account, it won't be shown as unhealthy and also won't cause a subscription to appear unhealthy.
88+
89+
|Recommendation| Assessment key|
90+
|-|-|
91+
|MFA should be enabled on accounts with owner permissions on your subscription|94290b00-4d0c-d7b4-7cea-064a9554e681|
92+
|MFA should be enabled on accounts with read permissions on your subscription|151e82c5-5341-a74b-1eb0-bc38d2c84bb5|
93+
|MFA should be enabled on accounts with write permissions on your subscription|57e98606-6b1e-6193-0e3d-fe621387c16b|
94+
|External accounts with owner permissions should be removed from your subscription|c3b6ae71-f1f0-31b4-e6c1-d5951285d03d|
95+
|External accounts with read permissions should be removed from your subscription|a8c6a4ad-d51e-88fe-2979-d3ee3c864f8b|
96+
|External accounts with write permissions should be removed from your subscription|04e7147b-0deb-9796-2e5c-0336343ceb3d|
97+
98+
The recommendations although in preview, will appear next to the recommendations that are currently in GA.
99+
66100
## August 2022
67101

68102
Updates in August include:
@@ -82,9 +116,9 @@ Learn more about [viewing vulnerabilities for running images](defender-for-conta
82116

83117
### Azure Monitor Agent integration now in preview
84118

85-
Defender for Cloud now includes preview support for the [Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) (AMA). AMA is intended to replace the legacy Log Analytics agent (also referred to as the Microsoft Monitoring Agent (MMA)), which is on a path to deprecation. AMA [provides a number of benefits](../azure-monitor/agents/azure-monitor-agent-migration.md#benefits) over legacy agents.
119+
Defender for Cloud now includes preview support for the [Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) (AMA). AMA is intended to replace the legacy Log Analytics agent (also referred to as the Microsoft Monitoring Agent (MMA)), which is on a path to deprecation. AMA [provides many benefits](../azure-monitor/agents/azure-monitor-agent-migration.md#benefits) over legacy agents.
86120

87-
In Defender for Cloud, when you [enable auto provisioning for AMA](auto-deploy-azure-monitoring-agent.md), the agent is deployed on **existing and new** VMs and Azure Arc-enabled machines that are detected in your subscriptions. If Defender for Cloud plans are enabled, AMA collects configuration information and event logs from Azure VMs and Azure Arc machines. Note that the AMA integration is in preview, so we recommend using it in test environments, rather than in production environments.
121+
In Defender for Cloud, when you [enable auto provisioning for AMA](auto-deploy-azure-monitoring-agent.md), the agent is deployed on **existing and new** VMs and Azure Arc-enabled machines that are detected in your subscriptions. If Defenders for Cloud plans are enabled, AMA collects configuration information and event logs from Azure VMs and Azure Arc machines. The AMA integration is in preview, so we recommend using it in test environments, rather than in production environments.
88122

89123

90124
### Deprecated VM alerts regarding suspicious activity related to a Kubernetes cluster

0 commit comments

Comments
 (0)