You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Create custom standards and recommendations (Azure)
11
11
12
-
Security recommendations in Microsoft Defender for Cloud help you to improve and harden your security posture. Recommendations are based on the security standards you define in subscriptions that have Defender for Cloud onboarded.
12
+
Security recommendations in Microsoft Defender for Cloud help you to improve and harden your security posture. Recommendations are based on the security standards you define in subscriptions that have Defender for Cloud onboarded.
13
13
14
14
[Security standards](security-policy-concept.md) can be based on regulatory compliance standards, and on customized standards. This article describes how to create custom standards and recommendations.
15
15
@@ -20,7 +20,6 @@ Security recommendations in Microsoft Defender for Cloud help you to improve and
20
20
21
21
::: zone pivot="azure-portal"
22
22
23
-
24
23
## Create a custom standard in the portal
25
24
26
25
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -29,12 +28,11 @@ Security recommendations in Microsoft Defender for Cloud help you to improve and
29
28
30
29
1. Select the relevant subscription or management group.
:::image type="content" source="media/custom-security-policies/create-custom-standard.png" alt-text="Screenshot that shows how to create a custom security standard." lightbox="media/custom-security-policies/create-custom-standard.png":::
36
34
37
-
1. Enter a name and description.
35
+
1. Enter a name and description.
38
36
39
37
> [!IMPORTANT]
40
38
> Make sure the name is unique. If you create a custom standard with the same name as an existing standard, it causes a conflict in the information displayed in the dashboard.
@@ -67,7 +65,6 @@ If you want to create a custom recommendation for Azure resources, you currently
67
65
68
66
::: zone pivot="rest-api"
69
67
70
-
71
68
## Create a custom recommendation/standard (legacy)
72
69
73
70
You can create custom recommendations and standards in Defender for cloud by creating policy definitions and initiatives in Azure Policy, and onboarding them in Defender for Cloud.
@@ -77,18 +74,17 @@ Here's how you do that:
77
74
1. Create one or more policy definitions in the [Azure Policy portal](../governance/policy/tutorials/create-custom-policy-definition.md), or [programatically](../governance/policy/how-to/programmatically-create.md).
78
75
1.[Create a policy initiative](../governance/policy/concepts/initiative-definition-structure.md) that contains the custom policy definitions.
79
76
80
-
81
77
## Onboard the initiative as a custom standard (legacy)
82
78
83
79
[Policy assignments](../governance/policy/concepts/assignment-structure.md) are used by Azure Policy to assign Azure resources to a policy or initiative.
84
80
85
81
To onboard an initiative to a custom security standard in Defender for you, you need to include `"ASC":"true"` in the request body as shown here. The `ASC` field onboards the initiative to Microsoft Defender for Cloud.
86
82
87
83
Here's an example of how to do that.
88
-
84
+
89
85
### Example to onboard a custom initiative
90
86
91
-
```
87
+
```json
92
88
PUT
93
89
PUT https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/policySetDefinitions/{policySetDefinitionName}?api-version=2021-06-01
94
90
@@ -145,17 +141,16 @@ Here's an example of how to do that.
145
141
146
142
This example shows you how to remove an assignment:
The built-in recommendations supplied with Microsoft Defender for Cloud include details such as severity levels and remediation instructions. If you want to add this type of information to custom recommendations for Azure, use the REST API.
153
+
The built-in recommendations supplied with Microsoft Defender for Cloud include details such as severity levels and remediation instructions. If you want to add this type of information to custom recommendations for Azure, use the REST API.
159
154
160
155
The two types of information you can add are:
161
156
@@ -166,9 +161,9 @@ The metadata should be added to the policy definition for a policy that is part
For another example for using the securityCenter property, see [this section of the REST API documentation](/rest/api/defenderforcloud/assessments-metadata/create-in-subscription#examples).
224
219
225
-
226
220
## Next steps
227
221
228
222
- [Learn about](create-custom-recommendations.md) Defender for Cloud security standards and recommendations.
229
-
- [Learn about](create-custom-recommendations.md) creating custom standards for AWS accounts and GCP projects.
223
+
- [Learn about](create-custom-recommendations.md) creating custom standards for AWS accounts and GCP projects.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/data-aware-security-dashboard-overview.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,6 +31,7 @@ To access the data security dashboard in Defender for Cloud, select **Data Secur
31
31
-[Enable sensitive data discovery](tutorial-enable-cspm-plan.md#enable-the-components-of-the-defender-cspm-plan) within the Defender CSPM plan.
32
32
33
33
**To receive the alerts for data sensitivity**:
34
+
34
35
- You must [enable Defender for Storage](tutorial-enable-storage-plan.md).
35
36
36
37
## Required permissions and roles
@@ -56,9 +57,9 @@ The data security overview section provides a general overview of your cloud dat
56
57
57
58
-**Coverage status** - displays the limited data coverage for resources without Defender CSPM workload protection:
58
59
59
-
-**Covered** – resources that have the necessary Defender CSPM, or Defender for Storage, or Defender for Databases enabled.
60
-
-**Partially covered** – missing either the Defender CSPM, Defender for Storage, or Defender for Storage plan. Select the tooltip to present a detailed view of what is missing.
61
-
-**Not covered** - resources that aren't covered by Defender CSPM, or Defender for Storage, or Defender for Databases.
60
+
-**Covered** – resources that have the necessary Defender CSPM, or Defender for Storage, or Defender for Databases enabled.
61
+
-**Partially covered** – missing either the Defender CSPM, Defender for Storage, or Defender for Storage plan. Select the tooltip to present a detailed view of what is missing.
62
+
-**Not covered** - resources that aren't covered by Defender CSPM, or Defender for Storage, or Defender for Databases.
62
63
63
64
-**Sensitive resources** – displays how many resources are sensitive.
64
65
@@ -91,7 +92,7 @@ You can select the **Manage data sensitivity settings** to get to the **Data sen
91
92
92
93
### Data resources security status
93
94
94
-
**Sensitive resources status over time** - displays how data security evolves over time with a graph that shows the number of sensitive resources affected by alerts, attack paths, and recommendations within a defined period (last 30, 14, or 7 days).
95
+
**Sensitive resources status over time** - displays how data security evolves over time with a graph that shows the number of sensitive resources affected by alerts, attack paths, and recommendations within a defined period (last 30, 14, or 7 days).
95
96
96
97
:::image type="content" source="media/data-aware-security-dashboard/data-resources-security-status.png" alt-text="Screenshot that shows the data resources security status section of the data security view." lightbox="media/data-aware-security-dashboard/data-resources-security-status.png":::
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-apis-prepare.md
+3-5Lines changed: 3 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,7 @@ Review the requirements on this page before setting up [Microsoft Defender for A
15
15
## Cloud and region support
16
16
17
17
Defender for APIs is available in the Azure commercial cloud, in these regions:
18
+
18
19
- Asia (Southeast Asia, EastAsia)
19
20
- Australia (Australia East, Australia Southeast, Australia Central, Australia Central 2)
20
21
- Brazil (Brazil South, Brazil Southeast)
@@ -27,21 +28,19 @@ Defender for APIs is available in the Azure commercial cloud, in these regions:
27
28
28
29
Review the latest cloud support information for Defender for Cloud plans and features in the [cloud support matrix](support-matrix-cloud-environment.md).
29
30
30
-
31
31
## API support
32
32
33
33
**Feature** | **Supported**
34
-
--- | ---
34
+
--- | ---
35
35
Availability | This feature is available in the Premium, Standard, Basic, and Developer tiers of Azure API Management.
36
-
API gateways | Azure API Management<br/><br/> Defender for APIs currently doesn't onboard APIs that are exposed using the API Management [self-hosted gateway](../api-management/self-hosted-gateway-overview.md), or managed using API Management [workspaces](../api-management/workspaces-overview.md).
36
+
API gateways | Azure API Management<br/><br/> Defender for APIs currently doesn't onboard APIs that are exposed using the API Management [self-hosted gateway](../api-management/self-hosted-gateway-overview.md), or managed using API Management [workspaces](../api-management/workspaces-overview.md).
37
37
API types | Currently, Defender for APIs discovers and analyzes REST APIs.
38
38
Multi-region support | There is currently limited support for API security insights for APIs published in Azure API Management multi-region deployments. Security insights, including data classifications, assessments of inactive APIs, unauthenticated APIs, and external APIs, is limited to supporting API traffic to the primary region (no support for security insights for secondary regions). All security detections and subsequently generated security alerts will work for API traffic sent to both primary and secondary regions.
39
39
40
40
## Defender CSPM integration
41
41
42
42
To explore API security risks using Cloud Security Explorer, the Defender Cloud Security Posture Management (CSPM) plan must be enabled. [Learn more](concept-cloud-security-posture-management.md).
43
43
44
-
45
44
## Onboarding requirements
46
45
47
46
Onboarding requirements for Defender for APIs are as follows.
@@ -56,4 +55,3 @@ Onboarding location | You can [enable Defender for APIs in the Defender for Clou
56
55
## Next steps
57
56
58
57
[Enable and onboard](defender-for-apis-deploy.md) Defender for APIs.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-apis-validation.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,7 +71,7 @@ This page will walk you through the steps to trigger an alert for one of your AP
71
71
72
72
1. In the value field enter **javascript:**.
73
73
74
-
:::image type="content" source="media/defender-for-apis-validation/postman-keys.png" alt-text="Screenshot that shows where to enter the keys and their values in Postman.":::
74
+
:::image type="content" source="media/defender-for-apis-validation/postman-keys.png" alt-text="Screenshot that shows where to enter the keys and their values in Postman.":::
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-dns-introduction.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,4 +45,3 @@ In this article, you learned about Microsoft Defender for DNS.
45
45
For related material, see the following article:
46
46
47
47
Security alerts might be generated by Defender for Cloud or received from other security products. To export all of these alerts to Microsoft Sentinel, any third-party SIEM, or any other external tool, follow the instructions in [Exporting alerts to a SIEM](continuous-export.md).
0 commit comments