Skip to content

Commit ed84830

Browse files
committed
Headings for the stages of the process
1 parent 48b8bb9 commit ed84830

File tree

2 files changed

+18
-18
lines changed

2 files changed

+18
-18
lines changed

articles/security-center/built-in-vulnerability-assessment.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -29,16 +29,16 @@ This feature is currently in preview.
2929

3030
The vulnerability scanner extension works as follows:
3131

32-
1. Azure Security Center deploys the Qualys extension to the selected virtual machine/s.
32+
1. **Deploy** - Azure Security Center deploys the Qualys extension to the selected virtual machine/s.
3333

34-
1. The extension collects artifacts and sends them for analysis in the Qualys cloud service in the defined region.
34+
1. **Gather information** - The extension collects artifacts and sends them for analysis in the Qualys cloud service in the defined region.
3535

36-
1. Qualys's cloud service conducts the vulnerability assessment and sends its findings to Security Center.
36+
1. **Analyze** - Qualys's cloud service conducts the vulnerability assessment and sends its findings to Security Center.
3737

3838
> [!IMPORTANT]
3939
> To ensure the privacy, confidentiality, and security of our customers, Microsoft only shares pseudonymous data with Qualys.
4040
41-
1. The findings are available to you in Security Center.
41+
1. **Report** - The findings are available to you in Security Center.
4242

4343
[![Process flow diagram for Azure Security Center's built-in vulnerability scanner](media/built-in-vulnerability-assessment/va-vm-flow-diagram.png)](media/built-in-vulnerability-assessment/va-vm-flow-diagram.png#lightbox)
4444

articles/security-center/security-center-just-in-time.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ From Security Center, you can configure a JIT policy and request access to a VM
7373
1. Click **Save**.
7474

7575
> [!NOTE]
76-
>When JIT VM Access is enabled for a VM, Azure Security Center creates "deny all inbound traffic" rules for the selected ports in the network security groups associated and Azure Firewall with it. If other rules had been created for the selected ports, then the existing rules take priority over the new deny all inbound traffic rules. If there are no existing rules on the selected ports, then the new deny all inbound traffic rules take top priority in the Network Security Groups and Azure Firewall.
76+
>When JIT VM Access is enabled for a VM, Azure Security Center creates "deny all inbound traffic" rules for the selected ports in the network security groups associated and Azure Firewall with it. If other rules had been created for the selected ports, then the existing rules take priority over the new "deny all inbound traffic" rules. If there are no existing rules on the selected ports, then the new "deny all inbound traffic" rules take top priority in the Network Security Groups and Azure Firewall.
7777
7878

7979
## Request JIT access via Security Center
@@ -84,7 +84,7 @@ To request access to a VM via Security Center:
8484

8585
1. Under **Virtual Machine**, click the VMs that you want to request access for. This puts a checkmark next to the VM.
8686

87-
- The icon in the **Connection Details** column indicates whether JIT is enabled on the NSG or FW. If its enabled on both, only the Firewall icon appears.
87+
- The icon in the **Connection Details** column indicates whether JIT is enabled on the NSG or FW. If it's enabled on both, only the Firewall icon appears.
8888

8989
- The **Connection Details** column provides the information required to connect the VM, and its open ports.
9090

@@ -173,7 +173,7 @@ In the Azure portal, when you try to connect to a VM, Azure checks to see if you
173173
174174
Access is requested with the following default parameters:
175175

176-
- **source IP**: Any (*) (cannot be changed)
176+
- **source IP**: 'Any' (*) (cannot be changed)
177177
- **time range**: Three hours (cannot be changed) <!--Isn't this set in the policy-->
178178
- **port number** RDP port 3389 for Windows / port 22 for Linux (can be changed)
179179

@@ -198,14 +198,14 @@ To use the just-in-time VM access solution via PowerShell, use the official Azur
198198

199199
The following example sets a just-in-time VM access policy on a specific VM, and sets the following:
200200

201-
1. Close ports 22 and 3389.
201+
1. Close ports 22 and 3389.
202202

203-
2. Set a maximum time window of 3 hours for each so they can be opened per approved request.
204-
3. Allows the user who is requesting access to control the source IP addresses and allows the user to establish a successful session upon an approved just-in-time access request.
203+
2. Set a maximum time window of 3 hours for each so they can be opened per approved request.
204+
3. Allows the user who is requesting access to control the source IP addresses and allows the user to establish a successful session upon an approved just-in-time access request.
205205

206206
Run the following in PowerShell to accomplish this:
207207

208-
1. Assign a variable that holds the just-in-time VM access policy for a VM:
208+
1. Assign a variable that holds the just-in-time VM access policy for a VM:
209209

210210
$JitPolicy = (@{
211211
id="/subscriptions/SUBSCRIPTIONID/resourceGroups/RESOURCEGROUP/providers/Microsoft.Compute/virtualMachines/VMNAME"
@@ -220,31 +220,31 @@ Run the following in PowerShell to accomplish this:
220220
allowedSourceAddressPrefix=@("*");
221221
maxRequestAccessDuration="PT3H"})})
222222

223-
2. Insert the VM just-in-time VM access policy to an array:
224-
223+
2. Insert the VM just-in-time VM access policy to an array:
224+
225225
$JitPolicyArr=@($JitPolicy)
226226

227-
3. Configure the just-in-time VM access policy on the selected VM:
228-
227+
3. Configure the just-in-time VM access policy on the selected VM:
228+
229229
Set-AzJitNetworkAccessPolicy -Kind "Basic" -Location "LOCATION" -Name "default" -ResourceGroupName "RESOURCEGROUP" -VirtualMachine $JitPolicyArr
230230

231231
### Request access to a VM via PowerShell
232232

233233
In the following example, you can see a just-in-time VM access request to a specific VM in which port 22 is requested to be opened for a specific IP address and for a specific amount of time:
234234

235235
Run the following in PowerShell:
236-
1. Configure the VM request access properties
236+
1. Configure the VM request access properties
237237

238238
$JitPolicyVm1 = (@{
239239
id="/SUBSCRIPTIONID/resourceGroups/RESOURCEGROUP/providers/Microsoft.Compute/virtualMachines/VMNAME"
240240
ports=(@{
241241
number=22;
242242
endTimeUtc="2018-09-17T17:00:00.3658798Z";
243243
allowedSourceAddressPrefix=@("IPV4ADDRESS")})})
244-
2. Insert the VM access request parameters in an array:
244+
2. Insert the VM access request parameters in an array:
245245

246246
$JitPolicyArr=@($JitPolicyVm1)
247-
3. Send the request access (use the resource ID you got in step 1)
247+
3. Send the request access (use the resource ID you got in step 1)
248248

249249
Start-AzJitNetworkAccessPolicy -ResourceId "/subscriptions/SUBSCRIPTIONID/resourceGroups/RESOURCEGROUP/providers/Microsoft.Security/locations/LOCATION/jitNetworkAccessPolicies/default" -VirtualMachine $JitPolicyArr
250250

0 commit comments

Comments
 (0)