Skip to content

Commit ef3e6f4

Browse files
Merge pull request #266249 from dcurwin/fix-formatting-feb14-2024
Fix formatting
2 parents fccd334 + 7d6693d commit ef3e6f4

File tree

5 files changed

+40
-43
lines changed

5 files changed

+40
-43
lines changed

articles/defender-for-cloud/managing-and-responding-alerts.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -35,14 +35,14 @@ When triaging security alerts, you should prioritize alerts based on their alert
3535

3636
Each alert contains information regarding the alert that assists you in your investigation.
3737

38-
**To investigate a security alert**:
38+
**To investigate a security alert**:
3939

40-
1. Select an alert. A side pane opens and shows a description of the alert and all the affected resources.
40+
1. Select an alert. A side pane opens and shows a description of the alert and all the affected resources.
4141

4242
:::image type="content" source="./media/managing-and-responding-alerts/alerts-details-pane.png" alt-text="Screenshot of the high-level details view of a security alert.":::
4343

4444
1. Review the high-level information about the security alert.
45-
45+
4646
- Alert severity, status, and activity time
4747
- Description that explains the precise activity that was detected
4848
- Affected resources
@@ -51,7 +51,7 @@ Each alert contains information regarding the alert that assists you in your inv
5151
1. Select **View full details**.
5252

5353
The right pane includes the **Alert details** tab containing further details of the alert to help you investigate the issue: IP addresses, files, processes, and more.
54-
54+
5555
:::image type="content" source="./media/managing-and-responding-alerts/security-center-alert-remediate.png" alt-text="Screenshot that shows the full details page for an alert.":::
5656

5757
Also in the right pane is the **Take action** tab. Use this tab to take further actions regarding the security alert. Actions such as:
@@ -71,21 +71,21 @@ The alerts list includes checkboxes so you can handle multiple alerts at once. F
7171

7272
1. Filter according to the alerts you want to handle in bulk.
7373

74-
In this example, the alerts with severity of `Informational` for the resource `ASC-AKS-CLOUD-TALK` are selected.
74+
In this example, the alerts with severity of `Informational` for the resource `ASC-AKS-CLOUD-TALK` are selected.
7575

7676
:::image type="content" source="media/managing-and-responding-alerts/processing-alerts-bulk-filter.png" alt-text="Screenshot that shows how to filter alerts to show related alerts.":::
7777

78-
1. Use the checkboxes to select the alerts to be processed.
78+
1. Use the checkboxes to select the alerts to be processed.
7979

80-
In this example, all alerts are selected. The **Change status** button is now available.
80+
In this example, all alerts are selected. The **Change status** button is now available.
8181

8282
:::image type="content" source="media/managing-and-responding-alerts/processing-alerts-bulk-select.png" alt-text="Screenshot of selecting all alerts to handle in bulk.":::
8383

8484
1. Use the **Change status** options to set the desired status.
8585

8686
:::image type="content" source="media/managing-and-responding-alerts/processing-alerts-bulk-change-status.png" alt-text="Screenshot of the security alerts status tab.":::
8787

88-
The alerts shown in the current page have their status changed to the selected value.
88+
The alerts shown in the current page have their status changed to the selected value.
8989

9090
## Respond to a security alert
9191

@@ -97,7 +97,7 @@ After investigating a security alert, you can respond to the alert from within M
9797

9898
:::image type="content" source="./media/managing-and-responding-alerts/alert-details-take-action.png" alt-text="Screenshot of the security alerts take action tab." lightbox="./media/managing-and-responding-alerts/alert-details-take-action.png":::
9999

100-
1. Review the **Mitigate the threat** section for the manual investigation steps necessary to mitigate the issue.
100+
1. Review the **Mitigate the threat** section for the manual investigation steps necessary to mitigate the issue.
101101

102102
1. To harden your resources and prevent future attacks of this kind, remediate the security recommendations in the **Prevent future attacks** section.
103103

@@ -113,11 +113,11 @@ After investigating a security alert, you can respond to the alert from within M
113113

114114
The alert is removed from the main alerts list. You can use the filter from the alerts list page to view all alerts with **Dismissed** status.
115115

116-
1. We encourage you to provide feedback about the alert to Microsoft:
116+
1. We encourage you to provide feedback about the alert to Microsoft:
117117
1. Marking the alert as **Useful** or **Not useful**.
118118
1. Select a reason and add a comment.
119119

120-
:::image type="content" source="./media/managing-and-responding-alerts/alert-feedback.png" alt-text="Screenshot of the provide feedback to Microsoft window which allows you to select the usefulness of an alert.":::
120+
:::image type="content" source="./media/managing-and-responding-alerts/alert-feedback.png" alt-text="Screenshot of the provide feedback to Microsoft window that allows you to select the usefulness of an alert.":::
121121

122122
> [!TIP]
123123
> We review your feedback to improve our algorithms and provide better security alerts.

articles/defender-for-cloud/monitoring-components.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Defender for Cloud depends on the [Log Analytics agent](../azure-monitor/agents/
7676
- [Log Analytics agent for Windows supported operating systems](../azure-monitor/agents/agents-overview.md#supported-operating-systems)
7777
- [Log Analytics agent for Linux supported operating systems](../azure-monitor/agents/agents-overview.md#supported-operating-systems)
7878

79-
Also ensure your Log Analytics agent is [properly configured to send data to Defender for Cloud](working-with-log-analytics-agent.md#manual-agent)
79+
Also ensure your Log Analytics agent is [properly configured to send data to Defender for Cloud](working-with-log-analytics-agent.md#manual-agent).
8080

8181
<a name="preexisting"></a>
8282

@@ -95,7 +95,7 @@ The following use cases explain how deployment of the Log Analytics agent works
9595
- **System Center Operations Manager agent is installed on the machine** - Defender for Cloud will install the Log Analytics agent extension side by side to the existing Operations Manager. The existing Operations Manager agent will continue to report to the Operations Manager server normally. The Operations Manager agent and Log Analytics agent share common run-time libraries, which will be updated to the latest version during this process.
9696

9797
- **A pre-existing VM extension is present**:
98-
- When the Monitoring Agent is installed as an extension, the extension configuration allows reporting to only a single workspace. Defender for Cloud doesn't override existing connections to user workspaces. Defender for Cloud will store security data from the VM in the workspace already connected, if the "Security" or "SecurityCenterFree" solution has been installed on it. Defender for Cloud might upgrade the extension version to the latest version in this process.
98+
- When the Monitoring Agent is installed as an extension, the extension configuration allows reporting to only a single workspace. Defender for Cloud doesn't override existing connections to user workspaces. Defender for Cloud will store security data from the VM in the workspace already connected, if the "Security" or "SecurityCenterFree" solution was installed on it. Defender for Cloud might upgrade the extension version to the latest version in this process.
9999
- To see to which workspace the existing extension is sending data to, run the *TestCloudConnection.exe* tool to validate connectivity with Microsoft Defender for Cloud, as described in [Verify Log Analytics Agent connectivity](/services-hub/unified/health/assessments-troubleshooting#verify-log-analytics-agent-connectivity). Alternatively, you can open Log Analytics workspaces, select a workspace, select the VM, and look at the Log Analytics agent connection.
100100
- If you have an environment where the Log Analytics agent is installed on client workstations and reporting to an existing Log Analytics workspace, review the list of [operating systems supported by Microsoft Defender for Cloud](security-center-os-coverage.md) to make sure your operating system is supported.
101101

@@ -139,7 +139,7 @@ Learn more about Azure's [Guest Configuration extension](../governance/machine-c
139139

140140
### Defender for Containers extensions
141141

142-
This table shows the availability details for the components that are required by the protections offered by [Microsoft Defender for Containers](defender-for-containers-introduction.md).
142+
This table shows the availability details for the components required by the protections offered by [Microsoft Defender for Containers](defender-for-containers-introduction.md).
143143

144144
By default, the required extensions are enabled when you enable Defender for Containers from the Azure portal.
145145

@@ -150,7 +150,7 @@ By default, the required extensions are enabled when you enable Defender for Con
150150
| Required roles and permissions (subscription-level): | [Owner](../role-based-access-control/built-in-roles.md#owner) or [User Access Administrator](../role-based-access-control/built-in-roles.md#user-access-administrator) | [Owner](../role-based-access-control/built-in-roles.md#owner) or [User Access Administrator](../role-based-access-control/built-in-roles.md#user-access-administrator) |
151151
| Supported destinations: | The AKS Defender agent only supports [AKS clusters that have RBAC enabled](../aks/concepts-identity.md#kubernetes-rbac). | [See Kubernetes distributions supported for Arc-enabled Kubernetes](supported-machines-endpoint-solutions-clouds-containers.md?tabs=azure-aks#kubernetes-distributions-and-configurations) |
152152
| Policy-based: | :::image type="icon" source="./media/icons/yes-icon.png"::: Yes | :::image type="icon" source="./media/icons/yes-icon.png"::: Yes |
153-
| Clouds: | **Defender agent**:<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure Government, Microsoft Azure operated by 21Vianet<br>**Azure Policy for Kubernetes **:<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Azure Government, Microsoft Azure operated by 21Vianet|**Defender agent**:<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure Government, Microsoft Azure operated by 21Vianet<br>**Azure Policy for Kubernetes**:<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure Government, Microsoft Azure operated by 21Vianet|
153+
| Clouds: | **Defender agent**:<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure Government, Microsoft Azure operated by 21Vianet<br>**Azure Policy for Kubernetes**:<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Azure Government, Microsoft Azure operated by 21Vianet|**Defender agent**:<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure Government, Microsoft Azure operated by 21Vianet<br>**Azure Policy for Kubernetes**:<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure Government, Microsoft Azure operated by 21Vianet|
154154

155155
Learn more about the [roles used to provision Defender for Containers extensions](permissions.md#roles-used-to-automatically-provision-agents-and-extensions).
156156

articles/defender-for-cloud/multi-factor-authentication-enforcement.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Security recommendations for multifactor authentication
3-
description: Learn how to enforce multifactor authentication for your Azure subscriptions using Microsoft Defender for Cloud
3+
description: Learn how to enforce multifactor authentication for your Azure subscriptions using Microsoft Defender for Cloud.
44
ms.topic: conceptual
55
ms.date: 08/22/2023
66
---
@@ -21,7 +21,6 @@ The following recommendations in the Enable MFA control ensure you're meeting th
2121
- Accounts with write permissions on Azure resources should be MFA enabled
2222
- Accounts with read permissions on Azure resources should be MFA enabled
2323

24-
2524
There are three ways to enable MFA and be compliant with the two recommendations in Defender for Cloud: security defaults, per-user assignment, and conditional access (CA) policy.
2625

2726
### Free option - security defaults
@@ -72,7 +71,7 @@ To see which accounts don't have MFA enabled, use the following Azure Resource G
7271

7372
1. Enter the following query and select **Run query**.
7473

75-
```
74+
```Kusto
7675
securityresources
7776
| where type =~ "microsoft.security/assessments/subassessments"
7877
| where id has "assessments/dabc9bc4-b8a8-45bd-9a5a-43000df8aa1c" or id has "assessments/c0cb17b2-0607-48a7-b0e0-903ed22de39b" or id has "assessments/6240402e-f77c-46fa-9060-a7ce53997754"
@@ -95,7 +94,6 @@ To see which accounts don't have MFA enabled, use the following Azure Resource G
9594
- Conditional Access policy applied to Microsoft Entra roles (such as all global admins, external users, external domain, etc.) isn't supported yet.
9695
- External MFA solutions such as Okta, Ping, Duo, and more aren't supported within the identity MFA recommendations.
9796
98-
9997
## Next steps
10098
10199
To learn more about recommendations that apply to other Azure resource types, see the following articles:

articles/defender-for-cloud/onboard-management-group.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.date: 02/21/2023
77

88
# Enable Defender for Cloud on all subscriptions in a management group
99

10-
You can use Azure Policy to enable Microsoft Defender for Cloud on all the Azure subscriptions within the same management group (MG). This is more convenient than accessing them individually from the portal, and works even if the subscriptions belong to different owners.
10+
You can use Azure Policy to enable Microsoft Defender for Cloud on all the Azure subscriptions within the same management group (MG). This is more convenient than accessing them individually from the portal, and works even if the subscriptions belong to different owners.
1111

1212
## Prerequisites
1313

@@ -32,7 +32,7 @@ az provider register --namespace Microsoft.Security --management-group-id …
3232
> [!TIP]
3333
> Other than the scope, there are no required parameters.
3434
35-
1. Select **Remediation**, and select **Create a remediation task** to ensure all existing subscriptions that don't have Defender for Cloud enabled, will get onboarded.
35+
1. Select **Remediation**, and select **Create a remediation task** to ensure all existing subscriptions that don't have Defender for Cloud enabled will get onboarded.
3636

3737
:::image type="content" source="./media/get-started/remediation-task.png" alt-text="Screenshot that shows how to create a remediation task for the Azure Policy definition Enable Defender for Cloud on your subscription.":::
3838

@@ -50,16 +50,16 @@ The remediation task will then enable Defender for Cloud's basic functionality o
5050

5151
## Optional modifications
5252

53-
There are various ways you might choose to modify the Azure Policy definition:
53+
There are various ways you might choose to modify the Azure Policy definition:
5454

5555
- **Define compliance differently** - The supplied policy classifies all subscriptions in the MG that aren't yet registered with Defender for Cloud as “non-compliant”. You might choose to set it to all subscriptions without Defender for Cloud's enhanced security features enabled.
5656

5757
The supplied definition, defines *either* of the 'pricing' settings below as compliant. Meaning that a subscription set to 'standard' or 'free' is compliant.
5858

5959
> [!TIP]
60-
> When any Microsoft Defender plan is enabled, it's described in a policy definition as being on the 'Standard' setting. When it's disabled, it's 'Free'. To learn about the differences between these plans, see [Microsoft Defender for Cloud's Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads).
60+
> When any Microsoft Defender plan is enabled, it's described in a policy definition as being on the 'Standard' setting. When it's disabled, it's 'Free'. To learn about the differences between these plans, see [Microsoft Defender for Cloud's Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads).
6161
62-
```
62+
```json
6363
"existenceCondition": {
6464
"anyof": [
6565
{
@@ -76,7 +76,7 @@ There are various ways you might choose to modify the Azure Policy definition:
7676

7777
If you change it to the following, only subscriptions set to 'standard' would be classified as compliant:
7878

79-
```
79+
```json
8080
"existenceCondition": {
8181
{
8282
"field": "microsoft.security/pricings/pricingTier",
@@ -87,12 +87,11 @@ There are various ways you might choose to modify the Azure Policy definition:
8787

8888
- **Define some Microsoft Defender plans to apply when enabling Defender for Cloud** - The supplied policy enables Defender for Cloud without any of the optional enhanced security features. You might choose to enable one or more of the Microsoft Defender plans.
8989

90-
The supplied definition's `deployment` section has a parameter `pricingTier`. By default, this is set to `free`, but you can modify it.
91-
90+
The supplied definition's `deployment` section has a parameter `pricingTier`. By default, this is set to `free`, but you can modify it.
9291

93-
## Next steps:
92+
## Next steps
9493

95-
Now that you've onboarded an entire management group, enable the enhanced security features.
94+
Now that you onboarded an entire management group, enable the enhanced security features.
9695

9796
> [!div class="nextstepaction"]
9897
> [Enable enhanced protections](enable-enhanced-security.md)

0 commit comments

Comments
 (0)