Skip to content

Commit e625fc2

Browse files
authored
Merge pull request #265993 from dcurwin/fix-formatting-feb12-2024
Fix formatting
2 parents 520b66f + 0a99b48 commit e625fc2

10 files changed

+74
-86
lines changed

articles/defender-for-cloud/custom-security-policies.md

Lines changed: 49 additions & 55 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ zone_pivot_groups: manage-asc-initiatives
99

1010
# Create custom standards and recommendations (Azure)
1111

12-
Security recommendations in Microsoft Defender for Cloud help you to improve and harden your security posture. Recommendations are based on the security standards you define in subscriptions that have Defender for Cloud onboarded.
12+
Security recommendations in Microsoft Defender for Cloud help you to improve and harden your security posture. Recommendations are based on the security standards you define in subscriptions that have Defender for Cloud onboarded.
1313

1414
[Security standards](security-policy-concept.md) can be based on regulatory compliance standards, and on customized standards. This article describes how to create custom standards and recommendations.
1515

@@ -20,7 +20,6 @@ Security recommendations in Microsoft Defender for Cloud help you to improve and
2020

2121
::: zone pivot="azure-portal"
2222

23-
2423
## Create a custom standard in the portal
2524

2625
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -29,12 +28,11 @@ Security recommendations in Microsoft Defender for Cloud help you to improve and
2928

3029
1. Select the relevant subscription or management group.
3130

32-
3331
1. Select **Security policies** > **+ Create** > **Custom standard**.
3432

3533
:::image type="content" source="media/custom-security-policies/create-custom-standard.png" alt-text="Screenshot that shows how to create a custom security standard." lightbox="media/custom-security-policies/create-custom-standard.png":::
3634

37-
1. Enter a name and description.
35+
1. Enter a name and description.
3836

3937
> [!IMPORTANT]
4038
> Make sure the name is unique. If you create a custom standard with the same name as an existing standard, it causes a conflict in the information displayed in the dashboard.
@@ -67,7 +65,6 @@ If you want to create a custom recommendation for Azure resources, you currently
6765

6866
::: zone pivot="rest-api"
6967

70-
7168
## Create a custom recommendation/standard (legacy)
7269

7370
You can create custom recommendations and standards in Defender for cloud by creating policy definitions and initiatives in Azure Policy, and onboarding them in Defender for Cloud.
@@ -77,18 +74,17 @@ Here's how you do that:
7774
1. Create one or more policy definitions in the [Azure Policy portal](../governance/policy/tutorials/create-custom-policy-definition.md), or [programatically](../governance/policy/how-to/programmatically-create.md).
7875
1. [Create a policy initiative](../governance/policy/concepts/initiative-definition-structure.md) that contains the custom policy definitions.
7976

80-
8177
## Onboard the initiative as a custom standard (legacy)
8278

8379
[Policy assignments](../governance/policy/concepts/assignment-structure.md) are used by Azure Policy to assign Azure resources to a policy or initiative.
8480

8581
To onboard an initiative to a custom security standard in Defender for you, you need to include `"ASC":"true"` in the request body as shown here. The `ASC` field onboards the initiative to Microsoft Defender for Cloud.
8682

8783
Here's an example of how to do that.
88-
84+
8985
### Example to onboard a custom initiative
9086

91-
```
87+
```json
9288
PUT
9389
PUT https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/policySetDefinitions/{policySetDefinitionName}?api-version=2021-06-01
9490

@@ -145,17 +141,16 @@ Here's an example of how to do that.
145141

146142
This example shows you how to remove an assignment:
147143

148-
```
144+
```json
149145
DELETE
150146
https://management.azure.com/{scope}/providers/Microsoft.Authorization/policyAssignments/{policyAssignmentName}?api-version=2018-05-01
151147
```
152148

153149
::: zone-end
154150

155-
156151
## Enhance custom recommendations (legacy)
157152

158-
The built-in recommendations supplied with Microsoft Defender for Cloud include details such as severity levels and remediation instructions. If you want to add this type of information to custom recommendations for Azure, use the REST API.
153+
The built-in recommendations supplied with Microsoft Defender for Cloud include details such as severity levels and remediation instructions. If you want to add this type of information to custom recommendations for Azure, use the REST API.
159154

160155
The two types of information you can add are:
161156

@@ -166,9 +161,9 @@ The metadata should be added to the policy definition for a policy that is part
166161

167162
```json
168163
"metadata": {
169-
"securityCenter": {
170-
"RemediationDescription": "Custom description goes here",
171-
"Severity": "High"
164+
"securityCenter": {
165+
"RemediationDescription": "Custom description goes here",
166+
"Severity": "High"
172167
},
173168
```
174169

@@ -177,53 +172,52 @@ Here's another example of a custom policy including the metadata/securityCenter
177172
```json
178173
{
179174
"properties": {
180-
"displayName": "Security - ERvNet - AuditRGLock",
181-
"policyType": "Custom",
182-
"mode": "All",
183-
"description": "Audit required resource groups lock",
184-
"metadata": {
185-
"securityCenter": {
186-
"RemediationDescription": "Resource Group locks can be set via Azure Portal -> Resource Group -> Locks",
187-
"Severity": "High"
188-
}
189-
},
190-
"parameters": {
191-
"expressRouteLockLevel": {
192-
"type": "String",
193-
"metadata": {
194-
"displayName": "Lock level",
195-
"description": "Required lock level for ExpressRoute resource groups."
196-
},
197-
"allowedValues": [
198-
"CanNotDelete",
199-
"ReadOnly"
200-
]
201-
}
202-
},
203-
"policyRule": {
204-
"if": {
205-
"field": "type",
206-
"equals": "Microsoft.Resources/subscriptions/resourceGroups"
207-
},
208-
"then": {
209-
"effect": "auditIfNotExists",
210-
"details": {
211-
"type": "Microsoft.Authorization/locks",
212-
"existenceCondition": {
213-
"field": "Microsoft.Authorization/locks/level",
214-
"equals": "[parameters('expressRouteLockLevel')]"
215-
}
216-
}
217-
}
218-
}
175+
"displayName": "Security - ERvNet - AuditRGLock",
176+
"policyType": "Custom",
177+
"mode": "All",
178+
"description": "Audit required resource groups lock",
179+
"metadata": {
180+
"securityCenter": {
181+
"RemediationDescription": "Resource Group locks can be set via Azure Portal -> Resource Group -> Locks",
182+
"Severity": "High"
183+
}
184+
},
185+
"parameters": {
186+
"expressRouteLockLevel": {
187+
"type": "String",
188+
"metadata": {
189+
"displayName": "Lock level",
190+
"description": "Required lock level for ExpressRoute resource groups."
191+
},
192+
"allowedValues": [
193+
"CanNotDelete",
194+
"ReadOnly"
195+
]
196+
}
197+
},
198+
"policyRule": {
199+
"if": {
200+
"field": "type",
201+
"equals": "Microsoft.Resources/subscriptions/resourceGroups"
202+
},
203+
"then": {
204+
"effect": "auditIfNotExists",
205+
"details": {
206+
"type": "Microsoft.Authorization/locks",
207+
"existenceCondition": {
208+
"field": "Microsoft.Authorization/locks/level",
209+
"equals": "[parameters('expressRouteLockLevel')]"
210+
}
211+
}
212+
}
213+
}
219214
}
220215
}
221216
```
222217

223218
For another example for using the securityCenter property, see [this section of the REST API documentation](/rest/api/defenderforcloud/assessments-metadata/create-in-subscription#examples).
224219

225-
226220
## Next steps
227221

228222
- [Learn about](create-custom-recommendations.md) Defender for Cloud security standards and recommendations.
229-
- [Learn about](create-custom-recommendations.md) creating custom standards for AWS accounts and GCP projects.
223+
- [Learn about](create-custom-recommendations.md) creating custom standards for AWS accounts and GCP projects.

articles/defender-for-cloud/data-aware-security-dashboard-overview.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ To access the data security dashboard in Defender for Cloud, select **Data Secur
3131
- [Enable sensitive data discovery](tutorial-enable-cspm-plan.md#enable-the-components-of-the-defender-cspm-plan) within the Defender CSPM plan.
3232

3333
**To receive the alerts for data sensitivity**:
34+
3435
- You must [enable Defender for Storage](tutorial-enable-storage-plan.md).
3536

3637
## Required permissions and roles
@@ -56,9 +57,9 @@ The data security overview section provides a general overview of your cloud dat
5657

5758
- **Coverage status** - displays the limited data coverage for resources without Defender CSPM workload protection:
5859

59-
- **Covered** – resources that have the necessary Defender CSPM, or Defender for Storage, or Defender for Databases enabled.
60-
- **Partially covered** – missing either the Defender CSPM, Defender for Storage, or Defender for Storage plan. Select the tooltip to present a detailed view of what is missing.
61-
- **Not covered** - resources that aren't covered by Defender CSPM, or Defender for Storage, or Defender for Databases.
60+
- **Covered** – resources that have the necessary Defender CSPM, or Defender for Storage, or Defender for Databases enabled.
61+
- **Partially covered** – missing either the Defender CSPM, Defender for Storage, or Defender for Storage plan. Select the tooltip to present a detailed view of what is missing.
62+
- **Not covered** - resources that aren't covered by Defender CSPM, or Defender for Storage, or Defender for Databases.
6263

6364
- **Sensitive resources** – displays how many resources are sensitive.
6465

@@ -91,7 +92,7 @@ You can select the **Manage data sensitivity settings** to get to the **Data sen
9192

9293
### Data resources security status
9394

94-
**Sensitive resources status over time** - displays how data security evolves over time with a graph that shows the number of sensitive resources affected by alerts, attack paths, and recommendations within a defined period (last 30, 14, or 7 days).
95+
**Sensitive resources status over time** - displays how data security evolves over time with a graph that shows the number of sensitive resources affected by alerts, attack paths, and recommendations within a defined period (last 30, 14, or 7 days).
9596

9697
:::image type="content" source="media/data-aware-security-dashboard/data-resources-security-status.png" alt-text="Screenshot that shows the data resources security status section of the data security view." lightbox="media/data-aware-security-dashboard/data-resources-security-status.png":::
9798

articles/defender-for-cloud/defender-for-apis-manage.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,5 +59,3 @@ You can learn more about how to [build queries with cloud security explorer](how
5959
## Next steps
6060

6161
[Learn about](defender-for-apis-introduction.md) Defender for APIs.
62-
63-

articles/defender-for-cloud/defender-for-apis-prepare.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ Review the requirements on this page before setting up [Microsoft Defender for A
1515
## Cloud and region support
1616

1717
Defender for APIs is available in the Azure commercial cloud, in these regions:
18+
1819
- Asia (Southeast Asia, EastAsia)
1920
- Australia (Australia East, Australia Southeast, Australia Central, Australia Central 2)
2021
- Brazil (Brazil South, Brazil Southeast)
@@ -27,21 +28,19 @@ Defender for APIs is available in the Azure commercial cloud, in these regions:
2728

2829
Review the latest cloud support information for Defender for Cloud plans and features in the [cloud support matrix](support-matrix-cloud-environment.md).
2930

30-
3131
## API support
3232

3333
**Feature** | **Supported**
34-
--- | ---
34+
--- | ---
3535
Availability | This feature is available in the Premium, Standard, Basic, and Developer tiers of Azure API Management.
36-
API gateways | Azure API Management<br/><br/> Defender for APIs currently doesn't onboard APIs that are exposed using the API Management [self-hosted gateway](../api-management/self-hosted-gateway-overview.md), or managed using API Management [workspaces](../api-management/workspaces-overview.md).
36+
API gateways | Azure API Management<br/><br/> Defender for APIs currently doesn't onboard APIs that are exposed using the API Management [self-hosted gateway](../api-management/self-hosted-gateway-overview.md), or managed using API Management [workspaces](../api-management/workspaces-overview.md).
3737
API types | Currently, Defender for APIs discovers and analyzes REST APIs.
3838
Multi-region support | There is currently limited support for API security insights for APIs published in Azure API Management multi-region deployments. Security insights, including data classifications, assessments of inactive APIs, unauthenticated APIs, and external APIs, is limited to supporting API traffic to the primary region (no support for security insights for secondary regions). All security detections and subsequently generated security alerts will work for API traffic sent to both primary and secondary regions.
3939

4040
## Defender CSPM integration
4141

4242
To explore API security risks using Cloud Security Explorer, the Defender Cloud Security Posture Management (CSPM) plan must be enabled. [Learn more](concept-cloud-security-posture-management.md).
4343

44-
4544
## Onboarding requirements
4645

4746
Onboarding requirements for Defender for APIs are as follows.
@@ -56,4 +55,3 @@ Onboarding location | You can [enable Defender for APIs in the Defender for Clou
5655
## Next steps
5756

5857
[Enable and onboard](defender-for-apis-deploy.md) Defender for APIs.
59-

articles/defender-for-cloud/defender-for-apis-validation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ This page will walk you through the steps to trigger an alert for one of your AP
7171

7272
1. In the value field enter **javascript:**.
7373

74-
:::image type="content" source="media/defender-for-apis-validation/postman-keys.png" alt-text="Screenshot that shows where to enter the keys and their values in Postman.":::
74+
:::image type="content" source="media/defender-for-apis-validation/postman-keys.png" alt-text="Screenshot that shows where to enter the keys and their values in Postman.":::
7575

7676
1. Select **Send**
7777

articles/defender-for-cloud/defender-for-databases-introduction.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,8 +55,6 @@ Threat intelligence enriched security alerts are triggered when there are:
5555
> [!TIP]
5656
> View the full list of security alerts for database servers [in the alerts reference page](alerts-reference.md#alerts-osrdb).
5757
58-
59-
6058
## Next steps
6159

6260
In this article, you learned about Microsoft Defender for open-source relational databases.

articles/defender-for-cloud/defender-for-dns-introduction.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,4 +45,3 @@ In this article, you learned about Microsoft Defender for DNS.
4545
For related material, see the following article:
4646

4747
Security alerts might be generated by Defender for Cloud or received from other security products. To export all of these alerts to Microsoft Sentinel, any third-party SIEM, or any other external tool, follow the instructions in [Exporting alerts to a SIEM](continuous-export.md).
48-

0 commit comments

Comments
 (0)