You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/security-center-recommendations.md
+23-17Lines changed: 23 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,31 +38,37 @@ In [Setting security policies in Azure Security Center](tutorial-security-policy
38
38
Current policy recommendations center around system updates, baseline rules, anti-malware programs, [network security groups](../virtual-network/security-overview.md) on subnets and network interfaces, SQL database auditing, SQL database transparent data encryption, and web application firewalls. [Setting security policies](tutorial-security-policy.md) provides a description of each recommendation option.
39
39
40
40
### Monitor recommendations
41
-
After setting a security policy, Security Center analyzes the security state of your resources to identify potential vulnerabilities. The **Recommendations** tile under **Overview**lets you know the total number of recommendations identified by Security Center.
41
+
After setting a security policy, Security Center analyzes the security state of your resources to identify potential vulnerabilities. The **Recommendations** tile under **Overview**shows the total number of recommendations identified by Security Center.
42
42
43
43

44
44
45
-
To see the details of each recommendation, select the **Recommendations tile** under **Overview**. The **Recommendations** list opens.
46
-
45
+
1. Select the **Recommendations tile** under **Overview**. The **Recommendations** list opens.
You can filter recommendations. To filter the recommendations, select **Filter** on the **Recommendations** blade. The **Filter** blade opens and you select the severity and state values you wish to see.
50
-
51
-
***RECOMMENDATIONS**: The recommendation.
52
-
***SECURE SCORE IMPACT**: A score generated by Security Center using your security recommendations, and applying advanced algorithms to determine how crucial each recommendation is. For more information, see [Secure score calculation](security-center-secure-score.md#secure-score-calculation).
53
-
***RESOURCE**: Lists the resources to which this recommendation applies.
54
-
***STATUS BARS**: Describes the severity of that particular recommendation:
55
-
***High (Red)**: A vulnerability exists with a meaningful resource (such as an application, a VM, or a network security group) and requires attention.
56
-
***Medium (Orange)**: A vulnerability exists and non-critical or additional steps are required to eliminate it or to complete a process.
57
-
***Low (Blue)**: A vulnerability exists that should be addressed but does not require immediate attention. (By default, low recommendations aren't presented, but you can filter on low recommendations if you want to see them.)
58
-
***Healthy (Green)**:
59
-
***Not Available (Grey)**:
60
-
48
+
You can filter recommendations. To filter the recommendations, select **Filter** on the **Recommendations** blade. The **Filter** blade opens and you select the severity and state values you wish to see.
49
+
50
+
***RECOMMENDATIONS**: The recommendation.
51
+
***SECURE SCORE IMPACT**: A score generated by Security Center using your security recommendations, and applying advanced algorithms to determine how crucial each recommendation is. For more information, see [Secure score calculation](security-center-secure-score.md#secure-score-calculation).
52
+
***RESOURCE**: Lists the resources to which this recommendation applies.
53
+
***STATUS BARS**: Describes the severity of that particular recommendation:
54
+
***High (Red)**: A vulnerability exists with a meaningful resource (such as an application, a VM, or a network security group) and requires attention.
55
+
***Medium (Orange)**: A vulnerability exists and non-critical or additional steps are required to eliminate it or to complete a process.
56
+
***Low (Blue)**: A vulnerability exists that should be addressed but does not require immediate attention. (By default, low recommendations aren't presented, but you can filter on low recommendations if you want to see them.)
57
+
***Healthy (Green)**:
58
+
***Not Available (Grey)**:
59
+
60
+
1. To view each recommendation's details, click on the recommendation.
>You will want to understand the[classic and Resource Manager deployment models](../azure-classic-rm.md) for Azure resources.
65
+
See[classic and Resource Manager deployment models](../azure-classic-rm.md) for Azure resources.
63
66
64
67
### Apply recommendations
65
-
> After reviewing all recommendations, decide which one you should apply first. We recommend that you use the secure score impact to evaluate which recommendations should be applied first.
68
+
> After reviewing all recommendations, decide which one to apply first. We recommend that you use the secure score impact to evaluate which recommendations should be applied first.
69
+
70
+
1. From the list, click on the recommendation.
71
+
1. Follow the instructions in the *Remediation steps* section.
0 commit comments