Skip to content

Commit eecc6c3

Browse files
authored
Merge pull request #270797 from ElazarK/WI239454-upcoming-to-rn
upcoming note to rn and fix to recommendations
2 parents 5a114be + de1af9d commit eecc6c3

File tree

3 files changed

+59
-57
lines changed

3 files changed

+59
-57
lines changed

articles/defender-for-cloud/recommendations-reference.md

Lines changed: 20 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article lists all Microsoft Defender for Cloud security recomm
44
author: dcurwin
55
ms.service: defender-for-cloud
66
ms.topic: reference
7-
ms.date: 03/13/2024
7+
ms.date: 04/01/2024
88
ms.author: dacurwin
99
ms.custom: generated
1010
ai-usage: ai-assisted
@@ -1239,13 +1239,6 @@ Secure your storage account with greater flexibility using customer-managed keys
12391239

12401240
**Severity**: Low
12411241

1242-
### [Cognitive Services accounts should restrict network access](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243)
1243-
1244-
**Description**: Network access to Cognitive Services accounts should be restricted. Configure network rules so only applications from allowed networks can access the Cognitive Services account. To allow connections from specific internet or on-premises clients, access can be granted to traffic from specific Azure virtual networks or to public internet IP address ranges.
1245-
(Related policy: [Cognitive Services accounts should restrict network access](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f037eea7a-bd0a-46c5-9a66-03aea78705d3)).
1246-
1247-
**Severity**: Medium
1248-
12491242
### [Cognitive Services accounts should use customer owned storage or enable data encryption](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/aa395469-1687-78a7-bf76-f4614ef72977)
12501243

12511244
**Description**: This policy audits any Cognitive Services account not using customer owned storage nor data encryption. For each Cognitive Services account with storage, use either customer owned storage or enable data encryption.
@@ -1477,13 +1470,6 @@ Configure a private endpoint connection to enable access to traffic coming only
14771470

14781471
**Severity**: Medium
14791472

1480-
### [Public network access should be disabled for Cognitive Services accounts](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/684a5b6d-a270-61ce-306e-5cea400dc3a7)
1481-
1482-
**Description**: This policy audits any Cognitive Services account in your environment with public network access enabled. Public network access should be disabled so that only connections from private endpoints are allowed.
1483-
(Related policy: [Public network access should be disabled for Cognitive Services accounts](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f0725b4dd-7e76-479c-a735-68e7ee23d5ca)).
1484-
1485-
**Severity**: Medium
1486-
14871473
### [Public network access should be disabled for MariaDB servers](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/ab153e43-2fb5-0670-2117-70340851ea9b)
14881474

14891475
**Description**: Disable the public network access property to improve security and ensure your Azure Database for MariaDB can only be accessed from a private endpoint. This configuration strictly disables access from any public address space outside of Azure IP range, and denies all logins that match IP or virtual network-based firewall rules.
@@ -2142,6 +2128,18 @@ Note that the following subnet types will be listed as not applicable: GatewaySu
21422128

21432129
**Severity**: Medium
21442130

2131+
### [Azure AI Services resources should restrict network access](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243)
2132+
2133+
**Description**: By restricting network access, you can ensure that only allowed networks can access the service. This can be achieved by configuring network rules so that only applications from allowed networks can access the Azure AI service resource.
2134+
2135+
**Severity**: Medium
2136+
2137+
### [Azure AI Services resources should have key access disabled (disable local authentication)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/13b10b36-aa99-4db6-b00c-dcf87c4761e6)
2138+
2139+
**Description**: Key access (local authentication) is recommended to be disabled for security. Azure OpenAI Studio, typically used in development/testing, requires key access and will not function if key access is disabled. After disabling, Microsoft Entra ID becomes the only access method, which allows maintaining minimum privilege principle and granular control. [Learn more](https://aka.ms/AI/auth).
2140+
2141+
**Severity**: Medium
2142+
21452143
## Deprecated recommendations
21462144

21472145
### Over-provisioned identities in subscriptions should be investigated to reduce the Permission Creep Index (PCI)
@@ -2253,6 +2251,13 @@ Learn more about how endpoint protection for machines is evaluated in [Endpoint
22532251

22542252
**Severity**: High
22552253

2254+
### [Public network access should be disabled for Cognitive Services accounts](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/684a5b6d-a270-61ce-306e-5cea400dc3a7)
2255+
2256+
**Description**: This policy audits any Cognitive Services account in your environment with public network access enabled. Public network access should be disabled so that only connections from private endpoints are allowed.
2257+
(Related policy: [Public network access should be disabled for Cognitive Services accounts](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f0725b4dd-7e76-479c-a735-68e7ee23d5ca)).
2258+
2259+
**Severity**: Medium
2260+
22562261
## Related content
22572262

22582263
- [What are security policies, initiatives, and recommendations?](security-policy-concept.md)

articles/defender-for-cloud/release-notes.md

Lines changed: 38 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Release notes
33
description: This page is updated frequently with the latest updates in Defender for Cloud.
44
ms.topic: overview
5-
ms.date: 03/25/2024
5+
ms.date: 04/02/2024
66
---
77

88
# What's new in Microsoft Defender for Cloud?
@@ -22,9 +22,35 @@ If you're looking for items older than six months, you can find them in the [Arc
2222

2323
## April 2024
2424

25-
|Date | Update |
26-
|--|--|
27-
| April 2| [Containers multicloud recommendations (GA)](#containers-multicloud-recommendations-ga) |
25+
| Date | Update |
26+
| ------- | ---------------------------------------------------------------- |
27+
| April 2 | [Update to recommendations to align with Azure AI Services resources](#update-to-recommendations-to-align-with-azure-ai-services-resources) |
28+
| April 2 | [Deprecation of Cognitive Services recommendation](#deprecation-of-cognitive-services-recommendation) |
29+
| April 2 | [Containers multicloud recommendations (GA)](#containers-multicloud-recommendations-ga) |
30+
31+
### Update to recommendations to align with Azure AI Services resources
32+
33+
April 2, 2024
34+
35+
The following recommendations have been updated to align with the Azure AI Services category (formerly known as Cognitive Services and Cognitive search) to comply with the new Azure AI Services naming format and align with the relevant resources.
36+
37+
| Old recommendation | Updated recommendation |
38+
| ---- | ---- |
39+
| Cognitive Services accounts should restrict network access | [Azure AI Services resources should restrict network access](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243) |
40+
| Cognitive Services accounts should have local authentication methods disabled | [Azure AI Services resources should have key access disabled (disable local authentication)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/13b10b36-aa99-4db6-b00c-dcf87c4761e6) |
41+
| Diagnostic logs in Search services should be enabled | [Diagnostic logs in Azure AI services resources should be enabled](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/dea5192e-1bb3-101b-b70c-4646546f5e1e) |
42+
43+
See the [list of security recommendations](recommendations-reference.md).
44+
45+
### Deprecation of Cognitive Services recommendation
46+
47+
April 2, 2024
48+
49+
The recommendation [`Public network access should be disabled for Cognitive Services accounts`](https://ms.portal.azure.com/?feature.msaljs=true#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/684a5b6d-a270-61ce-306e-5cea400dc3a7) is deprecated. The related policy definition [`Cognitive Services accounts should disable public network access`](https://ms.portal.azure.com/?feature.msaljs=true#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F0725b4dd-7e76-479c-a735-68e7ee23d5ca) has been removed from the regulatory compliance dashboard.
50+
51+
This recommendation is already being covered by another networking recommendation for Azure AI Services, [`Cognitive Services accounts should restrict network access`](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243/showSecurityCenterCommandBar~/false).
52+
53+
See the [list of security recommendations](recommendations-reference.md).
2854

2955
### Containers multicloud recommendations (GA)
3056

@@ -76,27 +102,27 @@ The recommendations affect the secure score calculation.
76102

77103
March 31, 2024
78104

79-
We are announcing the general availability (GA) of the Windows container images support for scanning by Defender for Containers.
105+
We're announcing the general availability (GA) of the Windows container images support for scanning by Defender for Containers.
80106

81107
### Continuous export now includes attack path data
82108

83109
March 25, 2024
84110

85-
We are announcing that continuous export now includes attack path data. This feature allows you to stream security data to Log Analytics in Azure Monitor, to Azure Event Hubs, or to another Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), or IT classic deployment model solution.
111+
We're announcing that continuous export now includes attack path data. This feature allows you to stream security data to Log Analytics in Azure Monitor, to Azure Event Hubs, or to another Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), or IT classic deployment model solution.
86112

87113
Learn more about [continuous export](benefits-of-continuous-export.md).
88114

89115
### Agentless scanning supports CMK encrypted VMs in Azure
90116

91117
March 21, 2024
92118

93-
Until now agentless scanning covered CMK encrypted VMs in AWS and GCP. With this release we are completing support for Azure as well. The capability employs a unique scanning approach for CMK in Azure:
119+
Until now agentless scanning covered CMK encrypted VMs in AWS and GCP. With this release we're completing support for Azure as well. The capability employs a unique scanning approach for CMK in Azure:
94120

95-
- Defender for Cloud does not handle the key or decryption process. Key handling and decryption is seamlessly handled by Azure Compute and is transparent to Defender for Cloud's agentless scanning service.
121+
- Defender for Cloud doesn't handle the key or decryption process. Key handling and decryption are seamlessly handled by Azure Compute and is transparent to Defender for Cloud's agentless scanning service.
96122
- The unencrypted VM disk data is never copied or re-encrypted with another key.
97-
- The original key is not replicated during the process. Purging it eradicates the data on both your production VM and Defender for Cloud’s temporary snapshot.
123+
- The original key isn't replicated during the process. Purging it eradicates the data on both your production VM and Defender for Cloud’s temporary snapshot.
98124

99-
During public preview this capability is not automatically enabled. If you are using Defender for Servers P2 or Defender CSPM and your environment has VMs with CMK encrypted disks, you can now have them scanned for vulnerabilities, secrets and malware following these [enablement steps](enable-agentless-scanning-vms.md#agentless-vulnerability-assessment-on-azure).
125+
During public preview this capability isn't automatically enabled. If you're using Defender for Servers P2 or Defender CSPM and your environment has VMs with CMK encrypted disks, you can now have them scanned for vulnerabilities, secrets and malware following these [enablement steps](enable-agentless-scanning-vms.md#agentless-vulnerability-assessment-on-azure).
100126

101127
- [Learn more on agentless scanning for VMs](concept-agentless-data-collection.md)
102128
- [Learn more on agentless scanning permissions](faq-permissions.yml#which-permissions-are-used-by-agentless-scanning-)
@@ -105,9 +131,9 @@ During public preview this capability is not automatically enabled. If you are u
105131

106132
March 18, 2024
107133

108-
We are announcing new endpoint detection and response recommendations that discover and assesses the configuration of supported endpoint detection and response solutions. If issues are found, these recommendations offer remediation steps.
134+
We're announcing new endpoint detection and response recommendations that discover and assesses the configuration of supported endpoint detection and response solutions. If issues are found, these recommendations offer remediation steps.
109135

110-
The following new agentless endpoint protection recommendations are now available if you have Defender for Servers Plan 2 or the Defender CSPM plan enabled on your subscription with the agentless machine scanning feature enabled. The recommendations support Azure and multicloud machines. On-premises machines are not supported.
136+
The following new agentless endpoint protection recommendations are now available if you have Defender for Servers Plan 2 or the Defender CSPM plan enabled on your subscription with the agentless machine scanning feature enabled. The recommendations support Azure and multicloud machines. On-premises machines aren't supported.
111137

112138
| Recommendation name | Description | Severity |
113139
|--|

articles/defender-for-cloud/upcoming-changes.md

Lines changed: 1 addition & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Important upcoming changes
33
description: Upcoming changes to Microsoft Defender for Cloud that you might need to be aware of and for which you might need to plan.
44
ms.topic: overview
5-
ms.date: 03/28/2024
5+
ms.date: 04/01/2024
66
---
77

88
# Important upcoming changes to Microsoft Defender for Cloud
@@ -29,8 +29,6 @@ If you're looking for the latest release notes, you can find them in the [What's
2929
| [Defender for open-source relational databases updates](#defender-for-open-source-relational-databases-updates) | March 6, 2024 | April, 2024 |
3030
| [Changes in where you access Compliance offerings and Microsoft Actions](#changes-in-where-you-access-compliance-offerings-and-microsoft-actions) | March 3, 2024 | September 30, 2025 |
3131
| [Microsoft Security Code Analysis (MSCA) is no longer operational](#microsoft-security-code-analysis-msca-is-no-longer-operational) | February 26, 2024 | February 26, 2024 |
32-
| [Update recommendations to align with Azure AI Services resources](#update-recommendations-to-align-with-azure-ai-services-resources) | February 20, 2024 | February 28, 2024 |
33-
| [Deprecation of data recommendation](#deprecation-of-data-recommendation) | February 12, 2024 | March 14, 2024 |
3432
| [Decommissioning of Microsoft.SecurityDevOps resource provider](#decommissioning-of-microsoftsecuritydevops-resource-provider) | February 5, 2024 | March 6, 2024 |
3533
| [Change in pricing for multicloud container threat detection](#change-in-pricing-for-multicloud-container-threat-detection) | January 30, 2024 | April 2024 |
3634
| [Enforcement of Defender CSPM for Premium DevOps Security Capabilities](#enforcement-of-defender-cspm-for-premium-devops-security-value) | January 29, 2024 | March 2024 |
@@ -109,33 +107,6 @@ In February 2021, the deprecation of the MSCA task was communicated to all custo
109107

110108
Customers can get the latest DevOps security tooling from Defender for Cloud through [Microsoft Security DevOps](azure-devops-extension.md) and more security tooling through [GitHub Advanced Security for Azure DevOps](https://azure.microsoft.com/products/devops/github-advanced-security).
111109

112-
## Update recommendations to align with Azure AI Services resources
113-
114-
**Announcement date: February 20, 2024**
115-
116-
**Estimated date of change: February 28, 2024**
117-
118-
The Azure AI Services category (formerly known as Cognitive Services) is adding new resource types. As a result, the following recommendations and related policy are set to be updated to comply with the new Azure AI Services naming format and align with the relevant resources.
119-
120-
| Current Recommendation | Updated Recommendation |
121-
| ---- | ---- |
122-
| Cognitive Services accounts should restrict network access | [Azure AI Services resources should restrict network access](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243) |
123-
| Cognitive Services accounts should have local authentication methods disabled | [Azure AI Services resources should have key access disabled (disable local authentication)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/13b10b36-aa99-4db6-b00c-dcf87c4761e6) |
124-
125-
See the [list of security recommendations](recommendations-reference.md).
126-
127-
## Deprecation of data recommendation
128-
129-
**Announcement date: February 12, 2024**
130-
131-
**Estimated date of change: March 14, 2024**
132-
133-
The recommendation [`Public network access should be disabled for Cognitive Services accounts`](https://ms.portal.azure.com/?feature.msaljs=true#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/684a5b6d-a270-61ce-306e-5cea400dc3a7) is set to be deprecated. The related policy definition [`Cognitive Services accounts should disable public network access`](https://ms.portal.azure.com/?feature.msaljs=true#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F0725b4dd-7e76-479c-a735-68e7ee23d5ca) is also being removed from the regulatory compliance dashboard.
134-
135-
This recommendation is already being covered by another networking recommendation for Azure AI Services, [`Cognitive Services accounts should restrict network access`](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243/showSecurityCenterCommandBar~/false).
136-
137-
See the [list of security recommendations](recommendations-reference.md).
138-
139110
## Decommissioning of Microsoft.SecurityDevOps resource provider
140111

141112
**Announcement date: February 5, 2024**

0 commit comments

Comments
 (0)