You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/managing-and-responding-alerts.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,14 +35,14 @@ When triaging security alerts, you should prioritize alerts based on their alert
35
35
36
36
Each alert contains information regarding the alert that assists you in your investigation.
37
37
38
-
**To investigate a security alert**:
38
+
**To investigate a security alert**:
39
39
40
-
1. Select an alert. A side pane opens and shows a description of the alert and all the affected resources.
40
+
1. Select an alert. A side pane opens and shows a description of the alert and all the affected resources.
41
41
42
42
:::image type="content" source="./media/managing-and-responding-alerts/alerts-details-pane.png" alt-text="Screenshot of the high-level details view of a security alert.":::
43
43
44
44
1. Review the high-level information about the security alert.
45
-
45
+
46
46
- Alert severity, status, and activity time
47
47
- Description that explains the precise activity that was detected
48
48
- Affected resources
@@ -51,7 +51,7 @@ Each alert contains information regarding the alert that assists you in your inv
51
51
1. Select **View full details**.
52
52
53
53
The right pane includes the **Alert details** tab containing further details of the alert to help you investigate the issue: IP addresses, files, processes, and more.
54
-
54
+
55
55
:::image type="content" source="./media/managing-and-responding-alerts/security-center-alert-remediate.png" alt-text="Screenshot that shows the full details page for an alert.":::
56
56
57
57
Also in the right pane is the **Take action** tab. Use this tab to take further actions regarding the security alert. Actions such as:
@@ -71,21 +71,21 @@ The alerts list includes checkboxes so you can handle multiple alerts at once. F
71
71
72
72
1. Filter according to the alerts you want to handle in bulk.
73
73
74
-
In this example, the alerts with severity of `Informational` for the resource `ASC-AKS-CLOUD-TALK` are selected.
74
+
In this example, the alerts with severity of `Informational` for the resource `ASC-AKS-CLOUD-TALK` are selected.
75
75
76
76
:::image type="content" source="media/managing-and-responding-alerts/processing-alerts-bulk-filter.png" alt-text="Screenshot that shows how to filter alerts to show related alerts.":::
77
77
78
-
1. Use the checkboxes to select the alerts to be processed.
78
+
1. Use the checkboxes to select the alerts to be processed.
79
79
80
-
In this example, all alerts are selected. The **Change status** button is now available.
80
+
In this example, all alerts are selected. The **Change status** button is now available.
81
81
82
82
:::image type="content" source="media/managing-and-responding-alerts/processing-alerts-bulk-select.png" alt-text="Screenshot of selecting all alerts to handle in bulk.":::
83
83
84
84
1. Use the **Change status** options to set the desired status.
85
85
86
86
:::image type="content" source="media/managing-and-responding-alerts/processing-alerts-bulk-change-status.png" alt-text="Screenshot of the security alerts status tab.":::
87
87
88
-
The alerts shown in the current page have their status changed to the selected value.
88
+
The alerts shown in the current page have their status changed to the selected value.
89
89
90
90
## Respond to a security alert
91
91
@@ -97,7 +97,7 @@ After investigating a security alert, you can respond to the alert from within M
97
97
98
98
:::image type="content" source="./media/managing-and-responding-alerts/alert-details-take-action.png" alt-text="Screenshot of the security alerts take action tab." lightbox="./media/managing-and-responding-alerts/alert-details-take-action.png":::
99
99
100
-
1.Review the **Mitigate the threat** section for the manual investigation steps necessary to mitigate the issue.
100
+
1.Review the **Mitigate the threat** section for the manual investigation steps necessary to mitigate the issue.
101
101
102
102
1. To harden your resources and prevent future attacks of this kind, remediate the security recommendations in the **Prevent future attacks** section.
103
103
@@ -113,11 +113,11 @@ After investigating a security alert, you can respond to the alert from within M
113
113
114
114
The alert is removed from the main alerts list. You can use the filter from the alerts list page to view all alerts with **Dismissed** status.
115
115
116
-
1.We encourage you to provide feedback about the alert to Microsoft:
116
+
1.We encourage you to provide feedback about the alert to Microsoft:
117
117
1. Marking the alert as **Useful** or **Not useful**.
118
118
1. Select a reason and add a comment.
119
119
120
-
:::image type="content" source="./media/managing-and-responding-alerts/alert-feedback.png" alt-text="Screenshot of the provide feedback to Microsoft window which allows you to select the usefulness of an alert.":::
120
+
:::image type="content" source="./media/managing-and-responding-alerts/alert-feedback.png" alt-text="Screenshot of the provide feedback to Microsoft window that allows you to select the usefulness of an alert.":::
121
121
122
122
> [!TIP]
123
123
> We review your feedback to improve our algorithms and provide better security alerts.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/monitoring-components.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -76,7 +76,7 @@ Defender for Cloud depends on the [Log Analytics agent](../azure-monitor/agents/
76
76
-[Log Analytics agent for Windows supported operating systems](../azure-monitor/agents/agents-overview.md#supported-operating-systems)
77
77
-[Log Analytics agent for Linux supported operating systems](../azure-monitor/agents/agents-overview.md#supported-operating-systems)
78
78
79
-
Also ensure your Log Analytics agent is [properly configured to send data to Defender for Cloud](working-with-log-analytics-agent.md#manual-agent)
79
+
Also ensure your Log Analytics agent is [properly configured to send data to Defender for Cloud](working-with-log-analytics-agent.md#manual-agent).
80
80
81
81
<aname="preexisting"></a>
82
82
@@ -95,7 +95,7 @@ The following use cases explain how deployment of the Log Analytics agent works
95
95
-**System Center Operations Manager agent is installed on the machine** - Defender for Cloud will install the Log Analytics agent extension side by side to the existing Operations Manager. The existing Operations Manager agent will continue to report to the Operations Manager server normally. The Operations Manager agent and Log Analytics agent share common run-time libraries, which will be updated to the latest version during this process.
96
96
97
97
-**A pre-existing VM extension is present**:
98
-
- When the Monitoring Agent is installed as an extension, the extension configuration allows reporting to only a single workspace. Defender for Cloud doesn't override existing connections to user workspaces. Defender for Cloud will store security data from the VM in the workspace already connected, if the "Security" or "SecurityCenterFree" solution has been installed on it. Defender for Cloud might upgrade the extension version to the latest version in this process.
98
+
- When the Monitoring Agent is installed as an extension, the extension configuration allows reporting to only a single workspace. Defender for Cloud doesn't override existing connections to user workspaces. Defender for Cloud will store security data from the VM in the workspace already connected, if the "Security" or "SecurityCenterFree" solution was installed on it. Defender for Cloud might upgrade the extension version to the latest version in this process.
99
99
- To see to which workspace the existing extension is sending data to, run the *TestCloudConnection.exe* tool to validate connectivity with Microsoft Defender for Cloud, as described in [Verify Log Analytics Agent connectivity](/services-hub/unified/health/assessments-troubleshooting#verify-log-analytics-agent-connectivity). Alternatively, you can open Log Analytics workspaces, select a workspace, select the VM, and look at the Log Analytics agent connection.
100
100
- If you have an environment where the Log Analytics agent is installed on client workstations and reporting to an existing Log Analytics workspace, review the list of [operating systems supported by Microsoft Defender for Cloud](security-center-os-coverage.md) to make sure your operating system is supported.
101
101
@@ -139,7 +139,7 @@ Learn more about Azure's [Guest Configuration extension](../governance/machine-c
139
139
140
140
### Defender for Containers extensions
141
141
142
-
This table shows the availability details for the components that are required by the protections offered by [Microsoft Defender for Containers](defender-for-containers-introduction.md).
142
+
This table shows the availability details for the components required by the protections offered by [Microsoft Defender for Containers](defender-for-containers-introduction.md).
143
143
144
144
By default, the required extensions are enabled when you enable Defender for Containers from the Azure portal.
145
145
@@ -150,7 +150,7 @@ By default, the required extensions are enabled when you enable Defender for Con
150
150
| Required roles and permissions (subscription-level): |[Owner](../role-based-access-control/built-in-roles.md#owner) or [User Access Administrator](../role-based-access-control/built-in-roles.md#user-access-administrator)|[Owner](../role-based-access-control/built-in-roles.md#owner) or [User Access Administrator](../role-based-access-control/built-in-roles.md#user-access-administrator)|
151
151
| Supported destinations: | The AKS Defender agent only supports [AKS clusters that have RBAC enabled](../aks/concepts-identity.md#kubernetes-rbac). |[See Kubernetes distributions supported for Arc-enabled Kubernetes](supported-machines-endpoint-solutions-clouds-containers.md?tabs=azure-aks#kubernetes-distributions-and-configurations)|
| Clouds: |**Defender agent**:<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure Government, Microsoft Azure operated by 21Vianet<br>**Azure Policy for Kubernetes**:<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Azure Government, Microsoft Azure operated by 21Vianet|**Defender agent**:<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure Government, Microsoft Azure operated by 21Vianet<br>**Azure Policy for Kubernetes**:<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure Government, Microsoft Azure operated by 21Vianet|
153
+
| Clouds: |**Defender agent**:<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure Government, Microsoft Azure operated by 21Vianet<br>**Azure Policy for Kubernetes**:<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Azure Government, Microsoft Azure operated by 21Vianet|**Defender agent**:<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure Government, Microsoft Azure operated by 21Vianet<br>**Azure Policy for Kubernetes**:<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure Government, Microsoft Azure operated by 21Vianet|
154
154
155
155
Learn more about the [roles used to provision Defender for Containers extensions](permissions.md#roles-used-to-automatically-provision-agents-and-extensions).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/multi-factor-authentication-enforcement.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Security recommendations for multifactor authentication
3
-
description: Learn how to enforce multifactor authentication for your Azure subscriptions using Microsoft Defender for Cloud
3
+
description: Learn how to enforce multifactor authentication for your Azure subscriptions using Microsoft Defender for Cloud.
4
4
ms.topic: conceptual
5
5
ms.date: 08/22/2023
6
6
---
@@ -21,7 +21,6 @@ The following recommendations in the Enable MFA control ensure you're meeting th
21
21
- Accounts with write permissions on Azure resources should be MFA enabled
22
22
- Accounts with read permissions on Azure resources should be MFA enabled
23
23
24
-
25
24
There are three ways to enable MFA and be compliant with the two recommendations in Defender for Cloud: security defaults, per-user assignment, and conditional access (CA) policy.
26
25
27
26
### Free option - security defaults
@@ -72,7 +71,7 @@ To see which accounts don't have MFA enabled, use the following Azure Resource G
72
71
73
72
1. Enter the following query and select **Run query**.
74
73
75
-
```
74
+
```Kusto
76
75
securityresources
77
76
| where type =~ "microsoft.security/assessments/subassessments"
78
77
| where id has "assessments/dabc9bc4-b8a8-45bd-9a5a-43000df8aa1c" or id has "assessments/c0cb17b2-0607-48a7-b0e0-903ed22de39b" or id has "assessments/6240402e-f77c-46fa-9060-a7ce53997754"
@@ -95,7 +94,6 @@ To see which accounts don't have MFA enabled, use the following Azure Resource G
95
94
- Conditional Access policy applied to Microsoft Entra roles (such as all global admins, external users, external domain, etc.) isn't supported yet.
96
95
- External MFA solutions such as Okta, Ping, Duo, and more aren't supported within the identity MFA recommendations.
97
96
98
-
99
97
## Next steps
100
98
101
99
To learn more about recommendations that apply to other Azure resource types, see the following articles:
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/onboard-management-group.md
+9-10Lines changed: 9 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.date: 02/21/2023
7
7
8
8
# Enable Defender for Cloud on all subscriptions in a management group
9
9
10
-
You can use Azure Policy to enable Microsoft Defender for Cloud on all the Azure subscriptions within the same management group (MG). This is more convenient than accessing them individually from the portal, and works even if the subscriptions belong to different owners.
10
+
You can use Azure Policy to enable Microsoft Defender for Cloud on all the Azure subscriptions within the same management group (MG). This is more convenient than accessing them individually from the portal, and works even if the subscriptions belong to different owners.
> Other than the scope, there are no required parameters.
34
34
35
-
1. Select **Remediation**, and select **Create a remediation task** to ensure all existing subscriptions that don't have Defender for Cloud enabled, will get onboarded.
35
+
1. Select **Remediation**, and select **Create a remediation task** to ensure all existing subscriptions that don't have Defender for Cloud enabled will get onboarded.
36
36
37
37
:::image type="content" source="./media/get-started/remediation-task.png" alt-text="Screenshot that shows how to create a remediation task for the Azure Policy definition Enable Defender for Cloud on your subscription.":::
38
38
@@ -50,16 +50,16 @@ The remediation task will then enable Defender for Cloud's basic functionality o
50
50
51
51
## Optional modifications
52
52
53
-
There are various ways you might choose to modify the Azure Policy definition:
53
+
There are various ways you might choose to modify the Azure Policy definition:
54
54
55
55
-**Define compliance differently** - The supplied policy classifies all subscriptions in the MG that aren't yet registered with Defender for Cloud as “non-compliant”. You might choose to set it to all subscriptions without Defender for Cloud's enhanced security features enabled.
56
56
57
57
The supplied definition, defines *either* of the 'pricing' settings below as compliant. Meaning that a subscription set to 'standard' or 'free' is compliant.
58
58
59
59
> [!TIP]
60
-
> When any Microsoft Defender plan is enabled, it's described in a policy definition as being on the 'Standard' setting. When it's disabled, it's 'Free'. To learn about the differences between these plans, see [Microsoft Defender for Cloud's Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads).
60
+
> When any Microsoft Defender plan is enabled, it's described in a policy definition as being on the 'Standard' setting. When it's disabled, it's 'Free'. To learn about the differences between these plans, see [Microsoft Defender for Cloud's Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads).
61
61
62
-
```
62
+
```json
63
63
"existenceCondition": {
64
64
"anyof": [
65
65
{
@@ -76,7 +76,7 @@ There are various ways you might choose to modify the Azure Policy definition:
76
76
77
77
If you change it to the following, only subscriptions set to 'standard' would be classified as compliant:
@@ -87,12 +87,11 @@ There are various ways you might choose to modify the Azure Policy definition:
87
87
88
88
- **Define some Microsoft Defender plans to apply when enabling Defender for Cloud** - The supplied policy enables Defender for Cloud without any of the optional enhanced security features. You might choose to enable one or more of the Microsoft Defender plans.
89
89
90
-
The supplied definition's `deployment` section has a parameter `pricingTier`. By default, this is set to `free`, but you can modify it.
91
-
90
+
The supplied definition's `deployment` section has a parameter `pricingTier`. By default, this is set to `free`, but you can modify it.
92
91
93
-
## Next steps:
92
+
## Next steps
94
93
95
-
Now that you've onboarded an entire management group, enable the enhanced security features.
94
+
Now that you onboarded an entire management group, enable the enhanced security features.
0 commit comments