You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/recommendations-reference.md
+20-15Lines changed: 20 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This article lists all Microsoft Defender for Cloud security recomm
4
4
author: dcurwin
5
5
ms.service: defender-for-cloud
6
6
ms.topic: reference
7
-
ms.date: 03/13/2024
7
+
ms.date: 04/01/2024
8
8
ms.author: dacurwin
9
9
ms.custom: generated
10
10
ai-usage: ai-assisted
@@ -1239,13 +1239,6 @@ Secure your storage account with greater flexibility using customer-managed keys
1239
1239
1240
1240
**Severity**: Low
1241
1241
1242
-
### [Cognitive Services accounts should restrict network access](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243)
1243
-
1244
-
**Description**: Network access to Cognitive Services accounts should be restricted. Configure network rules so only applications from allowed networks can access the Cognitive Services account. To allow connections from specific internet or on-premises clients, access can be granted to traffic from specific Azure virtual networks or to public internet IP address ranges.
1245
-
(Related policy: [Cognitive Services accounts should restrict network access](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f037eea7a-bd0a-46c5-9a66-03aea78705d3)).
1246
-
1247
-
**Severity**: Medium
1248
-
1249
1242
### [Cognitive Services accounts should use customer owned storage or enable data encryption](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/aa395469-1687-78a7-bf76-f4614ef72977)
1250
1243
1251
1244
**Description**: This policy audits any Cognitive Services account not using customer owned storage nor data encryption. For each Cognitive Services account with storage, use either customer owned storage or enable data encryption.
@@ -1477,13 +1470,6 @@ Configure a private endpoint connection to enable access to traffic coming only
1477
1470
1478
1471
**Severity**: Medium
1479
1472
1480
-
### [Public network access should be disabled for Cognitive Services accounts](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/684a5b6d-a270-61ce-306e-5cea400dc3a7)
1481
-
1482
-
**Description**: This policy audits any Cognitive Services account in your environment with public network access enabled. Public network access should be disabled so that only connections from private endpoints are allowed.
1483
-
(Related policy: [Public network access should be disabled for Cognitive Services accounts](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f0725b4dd-7e76-479c-a735-68e7ee23d5ca)).
1484
-
1485
-
**Severity**: Medium
1486
-
1487
1473
### [Public network access should be disabled for MariaDB servers](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/ab153e43-2fb5-0670-2117-70340851ea9b)
1488
1474
1489
1475
**Description**: Disable the public network access property to improve security and ensure your Azure Database for MariaDB can only be accessed from a private endpoint. This configuration strictly disables access from any public address space outside of Azure IP range, and denies all logins that match IP or virtual network-based firewall rules.
@@ -2142,6 +2128,18 @@ Note that the following subnet types will be listed as not applicable: GatewaySu
2142
2128
2143
2129
**Severity**: Medium
2144
2130
2131
+
### [Azure AI Services resources should restrict network access](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243)
2132
+
2133
+
**Description**: By restricting network access, you can ensure that only allowed networks can access the service. This can be achieved by configuring network rules so that only applications from allowed networks can access the Azure AI service resource.
2134
+
2135
+
**Severity**: Medium
2136
+
2137
+
### [Azure AI Services resources should have key access disabled (disable local authentication)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/13b10b36-aa99-4db6-b00c-dcf87c4761e6)
2138
+
2139
+
**Description**: Key access (local authentication) is recommended to be disabled for security. Azure OpenAI Studio, typically used in development/testing, requires key access and will not function if key access is disabled. After disabling, Microsoft Entra ID becomes the only access method, which allows maintaining minimum privilege principle and granular control. [Learn more](https://aka.ms/AI/auth).
2140
+
2141
+
**Severity**: Medium
2142
+
2145
2143
## Deprecated recommendations
2146
2144
2147
2145
### Over-provisioned identities in subscriptions should be investigated to reduce the Permission Creep Index (PCI)
@@ -2253,6 +2251,13 @@ Learn more about how endpoint protection for machines is evaluated in [Endpoint
2253
2251
2254
2252
**Severity**: High
2255
2253
2254
+
### [Public network access should be disabled for Cognitive Services accounts](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/684a5b6d-a270-61ce-306e-5cea400dc3a7)
2255
+
2256
+
**Description**: This policy audits any Cognitive Services account in your environment with public network access enabled. Public network access should be disabled so that only connections from private endpoints are allowed.
2257
+
(Related policy: [Public network access should be disabled for Cognitive Services accounts](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f0725b4dd-7e76-479c-a735-68e7ee23d5ca)).
2258
+
2259
+
**Severity**: Medium
2260
+
2256
2261
## Related content
2257
2262
2258
2263
-[What are security policies, initiatives, and recommendations?](security-policy-concept.md)
| April 2 |[Update to recommendations to align with Azure AI Services resources](#update-to-recommendations-to-align-with-azure-ai-services-resources)|
28
+
| April 2 |[Deprecation of Cognitive Services recommendation](#deprecation-of-cognitive-services-recommendation)|
29
+
| April 2 |[Containers multicloud recommendations (GA)](#containers-multicloud-recommendations-ga)|
30
+
31
+
### Update to recommendations to align with Azure AI Services resources
32
+
33
+
April 2, 2024
34
+
35
+
The following recommendations have been updated to align with the Azure AI Services category (formerly known as Cognitive Services and Cognitive search) to comply with the new Azure AI Services naming format and align with the relevant resources.
36
+
37
+
| Old recommendation | Updated recommendation |
38
+
| ---- | ---- |
39
+
| Cognitive Services accounts should restrict network access |[Azure AI Services resources should restrict network access](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243)|
40
+
| Cognitive Services accounts should have local authentication methods disabled |[Azure AI Services resources should have key access disabled (disable local authentication)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/13b10b36-aa99-4db6-b00c-dcf87c4761e6)|
41
+
| Diagnostic logs in Search services should be enabled |[Diagnostic logs in Azure AI services resources should be enabled](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/dea5192e-1bb3-101b-b70c-4646546f5e1e)|
42
+
43
+
See the [list of security recommendations](recommendations-reference.md).
44
+
45
+
### Deprecation of Cognitive Services recommendation
46
+
47
+
April 2, 2024
48
+
49
+
The recommendation [`Public network access should be disabled for Cognitive Services accounts`](https://ms.portal.azure.com/?feature.msaljs=true#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/684a5b6d-a270-61ce-306e-5cea400dc3a7) is deprecated. The related policy definition [`Cognitive Services accounts should disable public network access`](https://ms.portal.azure.com/?feature.msaljs=true#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F0725b4dd-7e76-479c-a735-68e7ee23d5ca) has been removed from the regulatory compliance dashboard.
50
+
51
+
This recommendation is already being covered by another networking recommendation for Azure AI Services, [`Cognitive Services accounts should restrict network access`](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243/showSecurityCenterCommandBar~/false).
52
+
53
+
See the [list of security recommendations](recommendations-reference.md).
28
54
29
55
### Containers multicloud recommendations (GA)
30
56
@@ -76,27 +102,27 @@ The recommendations affect the secure score calculation.
76
102
77
103
March 31, 2024
78
104
79
-
We are announcing the general availability (GA) of the Windows container images support for scanning by Defender for Containers.
105
+
We're announcing the general availability (GA) of the Windows container images support for scanning by Defender for Containers.
80
106
81
107
### Continuous export now includes attack path data
82
108
83
109
March 25, 2024
84
110
85
-
We are announcing that continuous export now includes attack path data. This feature allows you to stream security data to Log Analytics in Azure Monitor, to Azure Event Hubs, or to another Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), or IT classic deployment model solution.
111
+
We're announcing that continuous export now includes attack path data. This feature allows you to stream security data to Log Analytics in Azure Monitor, to Azure Event Hubs, or to another Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), or IT classic deployment model solution.
86
112
87
113
Learn more about [continuous export](benefits-of-continuous-export.md).
88
114
89
115
### Agentless scanning supports CMK encrypted VMs in Azure
90
116
91
117
March 21, 2024
92
118
93
-
Until now agentless scanning covered CMK encrypted VMs in AWS and GCP. With this release we are completing support for Azure as well. The capability employs a unique scanning approach for CMK in Azure:
119
+
Until now agentless scanning covered CMK encrypted VMs in AWS and GCP. With this release we're completing support for Azure as well. The capability employs a unique scanning approach for CMK in Azure:
94
120
95
-
- Defender for Cloud does not handle the key or decryption process. Key handling and decryption is seamlessly handled by Azure Compute and is transparent to Defender for Cloud's agentless scanning service.
121
+
- Defender for Cloud doesn't handle the key or decryption process. Key handling and decryption are seamlessly handled by Azure Compute and is transparent to Defender for Cloud's agentless scanning service.
96
122
- The unencrypted VM disk data is never copied or re-encrypted with another key.
97
-
- The original key is not replicated during the process. Purging it eradicates the data on both your production VM and Defender for Cloud’s temporary snapshot.
123
+
- The original key isn't replicated during the process. Purging it eradicates the data on both your production VM and Defender for Cloud’s temporary snapshot.
98
124
99
-
During public preview this capability is not automatically enabled. If you are using Defender for Servers P2 or Defender CSPM and your environment has VMs with CMK encrypted disks, you can now have them scanned for vulnerabilities, secrets and malware following these [enablement steps](enable-agentless-scanning-vms.md#agentless-vulnerability-assessment-on-azure).
125
+
During public preview this capability isn't automatically enabled. If you're using Defender for Servers P2 or Defender CSPM and your environment has VMs with CMK encrypted disks, you can now have them scanned for vulnerabilities, secrets and malware following these [enablement steps](enable-agentless-scanning-vms.md#agentless-vulnerability-assessment-on-azure).
100
126
101
127
-[Learn more on agentless scanning for VMs](concept-agentless-data-collection.md)
102
128
-[Learn more on agentless scanning permissions](faq-permissions.yml#which-permissions-are-used-by-agentless-scanning-)
@@ -105,9 +131,9 @@ During public preview this capability is not automatically enabled. If you are u
105
131
106
132
March 18, 2024
107
133
108
-
We are announcing new endpoint detection and response recommendations that discover and assesses the configuration of supported endpoint detection and response solutions. If issues are found, these recommendations offer remediation steps.
134
+
We're announcing new endpoint detection and response recommendations that discover and assesses the configuration of supported endpoint detection and response solutions. If issues are found, these recommendations offer remediation steps.
109
135
110
-
The following new agentless endpoint protection recommendations are now available if you have Defender for Servers Plan 2 or the Defender CSPM plan enabled on your subscription with the agentless machine scanning feature enabled. The recommendations support Azure and multicloud machines. On-premises machines are not supported.
136
+
The following new agentless endpoint protection recommendations are now available if you have Defender for Servers Plan 2 or the Defender CSPM plan enabled on your subscription with the agentless machine scanning feature enabled. The recommendations support Azure and multicloud machines. On-premises machines aren't supported.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/upcoming-changes.md
+1-30Lines changed: 1 addition & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Important upcoming changes
3
3
description: Upcoming changes to Microsoft Defender for Cloud that you might need to be aware of and for which you might need to plan.
4
4
ms.topic: overview
5
-
ms.date: 03/28/2024
5
+
ms.date: 04/01/2024
6
6
---
7
7
8
8
# Important upcoming changes to Microsoft Defender for Cloud
@@ -29,8 +29,6 @@ If you're looking for the latest release notes, you can find them in the [What's
29
29
|[Defender for open-source relational databases updates](#defender-for-open-source-relational-databases-updates)| March 6, 2024 | April, 2024 |
30
30
|[Changes in where you access Compliance offerings and Microsoft Actions](#changes-in-where-you-access-compliance-offerings-and-microsoft-actions)| March 3, 2024 | September 30, 2025 |
31
31
|[Microsoft Security Code Analysis (MSCA) is no longer operational](#microsoft-security-code-analysis-msca-is-no-longer-operational)| February 26, 2024 | February 26, 2024 |
32
-
|[Update recommendations to align with Azure AI Services resources](#update-recommendations-to-align-with-azure-ai-services-resources)| February 20, 2024 | February 28, 2024 |
33
-
|[Deprecation of data recommendation](#deprecation-of-data-recommendation)| February 12, 2024 | March 14, 2024 |
34
32
|[Decommissioning of Microsoft.SecurityDevOps resource provider](#decommissioning-of-microsoftsecuritydevops-resource-provider)| February 5, 2024 | March 6, 2024 |
35
33
|[Change in pricing for multicloud container threat detection](#change-in-pricing-for-multicloud-container-threat-detection)| January 30, 2024 | April 2024 |
36
34
|[Enforcement of Defender CSPM for Premium DevOps Security Capabilities](#enforcement-of-defender-cspm-for-premium-devops-security-value)| January 29, 2024 | March 2024 |
@@ -109,33 +107,6 @@ In February 2021, the deprecation of the MSCA task was communicated to all custo
109
107
110
108
Customers can get the latest DevOps security tooling from Defender for Cloud through [Microsoft Security DevOps](azure-devops-extension.md) and more security tooling through [GitHub Advanced Security for Azure DevOps](https://azure.microsoft.com/products/devops/github-advanced-security).
111
109
112
-
## Update recommendations to align with Azure AI Services resources
113
-
114
-
**Announcement date: February 20, 2024**
115
-
116
-
**Estimated date of change: February 28, 2024**
117
-
118
-
The Azure AI Services category (formerly known as Cognitive Services) is adding new resource types. As a result, the following recommendations and related policy are set to be updated to comply with the new Azure AI Services naming format and align with the relevant resources.
119
-
120
-
| Current Recommendation | Updated Recommendation |
121
-
| ---- | ---- |
122
-
| Cognitive Services accounts should restrict network access |[Azure AI Services resources should restrict network access](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243)|
123
-
| Cognitive Services accounts should have local authentication methods disabled |[Azure AI Services resources should have key access disabled (disable local authentication)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/13b10b36-aa99-4db6-b00c-dcf87c4761e6)|
124
-
125
-
See the [list of security recommendations](recommendations-reference.md).
126
-
127
-
## Deprecation of data recommendation
128
-
129
-
**Announcement date: February 12, 2024**
130
-
131
-
**Estimated date of change: March 14, 2024**
132
-
133
-
The recommendation [`Public network access should be disabled for Cognitive Services accounts`](https://ms.portal.azure.com/?feature.msaljs=true#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/684a5b6d-a270-61ce-306e-5cea400dc3a7) is set to be deprecated. The related policy definition [`Cognitive Services accounts should disable public network access`](https://ms.portal.azure.com/?feature.msaljs=true#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F0725b4dd-7e76-479c-a735-68e7ee23d5ca) is also being removed from the regulatory compliance dashboard.
134
-
135
-
This recommendation is already being covered by another networking recommendation for Azure AI Services, [`Cognitive Services accounts should restrict network access`](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243/showSecurityCenterCommandBar~/false).
136
-
137
-
See the [list of security recommendations](recommendations-reference.md).
138
-
139
110
## Decommissioning of Microsoft.SecurityDevOps resource provider
0 commit comments