You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/other-threat-protections.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Other threat protections
3
-
description: Learn about the threat protections available from Microsoft Defender for Cloud
3
+
description: Learn about the threat protections available from Microsoft Defender for Cloud.
4
4
ms.topic: overview
5
5
ms.date: 05/22/2023
6
6
---
@@ -35,23 +35,22 @@ For a list of the Azure network layer alerts, see the [Reference table of alerts
35
35
36
36
Azure Application Gateway offers a web application firewall (WAF) that provides centralized protection of your web applications from common exploits and vulnerabilities.
37
37
38
-
Web applications are increasingly targeted by malicious attacks that exploit commonly known vulnerabilities. The Application Gateway WAF is based on Core Rule Set 3.2 or higher from the Open Web Application Security Project. The WAF is updated automatically to protect against new vulnerabilities.
38
+
Web applications are increasingly targeted by malicious attacks that exploit commonly known vulnerabilities. The Application Gateway WAF is based on Core Rule Set 3.2 or higher from the Open Web Application Security Project. The WAF is updated automatically to protect against new vulnerabilities.
39
39
40
-
If you have created [WAF Security solution](partner-integration.md#add-data-sources), your WAF alerts are streamed to Defender for Cloud with no other configurations. For more information on the alerts generated by WAF, see [Web application firewall CRS rule groups and rules](../web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md?tabs=owasp31#crs911-31).
40
+
If you created [WAF Security solution](partner-integration.md#add-data-sources), your WAF alerts are streamed to Defender for Cloud with no other configurations. For more information on the alerts generated by WAF, see [Web application firewall CRS rule groups and rules](../web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md?tabs=owasp31#crs911-31).
41
41
42
42
> [!NOTE]
43
43
> Only WAF v1 is supported and will work with Microsoft Defender for Cloud.
44
44
45
-
To deploy Azure's Application Gateway WAF, do the following:
45
+
To deploy Azure's Application Gateway WAF, do the following steps:
46
46
47
47
1. From the Azure portal, open **Defender for Cloud**.
48
48
49
49
1. From Defender for Cloud's menu, select **Security solutions**.
50
50
51
51
1. In the **Add data sources** section, select **Add** for Azure's Application Gateway WAF.
52
52
53
-
:::image type="content" source="media/other-threat-protections/deploy-azure-waf.png" alt-text="Screenshot showing where to select add to deploy WAF." lightbox="media/other-threat-protections/deploy-azure-waf.png":::
54
-
53
+
:::image type="content" source="media/other-threat-protections/deploy-azure-waf.png" alt-text="Screenshot showing where to select add to deploy WAF." lightbox="media/other-threat-protections/deploy-azure-waf.png":::
55
54
56
55
<aname="azure-ddos"></a>
57
56
@@ -67,13 +66,14 @@ If you have Azure DDoS Protection enabled, your DDoS alerts are streamed to Defe
67
66
68
67
## Microsoft Entra Permissions Management (formerly Cloudknox)
69
68
70
-
[Microsoft Entra Permissions Management](../active-directory/cloud-infrastructure-entitlement-management/index.yml) is a cloud infrastructure entitlement management (CIEM) solution. Microsoft Entra Permission Management provides comprehensive visibility and control over permissions for any identity and any resource in Azure, AWS, and GCP.
71
-
69
+
[Microsoft Entra Permissions Management](../active-directory/cloud-infrastructure-entitlement-management/index.yml) is a cloud infrastructure entitlement management (CIEM) solution. Microsoft Entra Permission Management provides comprehensive visibility and control over permissions for any identity and any resource in Azure, AWS, and GCP.
70
+
72
71
As part of the integration, each onboarded Azure subscription, AWS account, and GCP project give you a view of your [Permission Creep Index (PCI)](../active-directory/cloud-infrastructure-entitlement-management/ui-dashboard.md). The PCI is an aggregated metric that periodically evaluates the level of risk associated with the number of unused or excessive permissions across identities and resources. PCI measures how risky identities can potentially be, based on the permissions available to them.
73
72
74
-
:::image type="content" source="media/other-threat-protections/permission-creep-index.png" alt-text="Screenshot of the three associated permission creed index recommendations for Azure, AWS and GCP." lightbox="media/other-threat-protections/permission-creep-index.png":::
73
+
:::image type="content" source="media/other-threat-protections/permission-creep-index.png" alt-text="Screenshot of the three associated permission creed index recommendations for Azure, AWS, and GCP." lightbox="media/other-threat-protections/permission-creep-index.png":::
75
74
76
75
## Next steps
76
+
77
77
To learn more about the security alerts from these threat protection features, see the following articles:
78
78
79
79
-[Reference table for all Defender for Cloud alerts](alerts-reference.md)
title: Review cloud security posture in Microsoft Defender for Cloud
3
-
description: Learn about cloud security posture in Microsoft Defender for Cloud
3
+
description: Learn about cloud security posture in Microsoft Defender for Cloud.
4
4
ms.date: 11/02/2023
5
5
ms.topic: conceptual
6
6
---
7
7
8
-
# Review cloud security posture
8
+
# Review cloud security posture
9
9
10
-
Microsoft Defender for Cloud provides a unified view into the security posture of hybrid cloud workloads with the
11
-
interactive **Overview** dashboard. Select any element on the dashboard to get more information.
10
+
Microsoft Defender for Cloud provides a unified view into the security posture of hybrid cloud workloads with the interactive **Overview** dashboard. Select any element on the dashboard to get more information.
12
11
13
12
:::image type="content" source="./media/overview-page/overview-07-2023.png" alt-text="Screenshot of Defender for Cloud's overview page." lightbox="./media/overview-page/overview-07-2023.png":::
14
13
15
14
## Metrics
16
15
17
-
18
16
The **top menu bar** offers:
19
17
20
-
-**Subscriptions** - You can view and filter the list of subscriptions by selecting this button. Defender for Cloud will adjust the display to reflect the security posture of the selected subscriptions.
18
+
-**Subscriptions** - You can view and filter the list of subscriptions by selecting this button. Defender for Cloud adjusts the display to reflect the security posture of the selected subscriptions.
21
19
-**What's new** - Opens the [release notes](release-notes.md) so you can keep up to date with new features, bug fixes, and deprecated functionality.
22
20
-**High-level numbers** for the connected cloud accounts, showing the context of the information in the main tiles, and the number of assessed resources, active recommendations, and security alerts. Select the assessed resources number to access [Asset inventory](asset-inventory.md). Learn more about connecting your [AWS accounts](quickstart-onboard-aws.md) and your [GCP projects](quickstart-onboard-gcp.md).
23
21
@@ -29,8 +27,8 @@ The center of the page displays the **feature tiles**, each linking to a high pr
29
27
30
28
-**Security posture** - Defender for Cloud continually assesses your resources, subscriptions, and organization for security issues. It then aggregates all the findings into a single score so that you can understand, at a glance, your current security situation: the higher the score, the lower the identified risk level. [Learn more](secure-score-security-controls.md).
31
29
-**Workload protections** - This is the cloud workload protection platform (CWPP) integrated within Defender for Cloud for advanced, intelligent protection of your workloads running on Azure, on-premises machines, or other cloud providers. For each resource type, there's a corresponding Microsoft Defender plan. The tile shows the coverage of your connected resources (for the currently selected subscriptions) and the recent alerts, color-coded by severity. Learn more about [the Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads).
32
-
-**Regulatory compliance** - Based on continuous assessments of your hybrid and multi-cloud resources,Defender for Cloud provides insights into your compliance with the standards that matter to your organization. Defender for Cloud analyzes risk factors in your environment according to security best practices. These assessments are mapped to compliance controls from a supported set of standards. [Learn more](regulatory-compliance-dashboard.md).
33
-
-**Inventory** - The asset inventory page of Microsoft Defender for Cloud provides a single page for viewing the security posture of the resources you've connected to Microsoft Defender for Cloud. All resources with unresolved security recommendations are shown in the inventory. If you've enabled the integration with Microsoft Defender for Endpoint and enabled Microsoft Defender for Servers, you'll also have access to a software inventory. The tile on the overview page shows you at a glance the total healthy and unhealthy resources (for the currently selected subscriptions). [Learn more](asset-inventory.md).
30
+
-**Regulatory compliance** - Based on continuous assessments of your hybrid and multicloud resources,Defender for Cloud provides insights into your compliance with the standards that matter to your organization. Defender for Cloud analyzes risk factors in your environment according to security best practices. These assessments are mapped to compliance controls from a supported set of standards. [Learn more](regulatory-compliance-dashboard.md).
31
+
-**Inventory** - The asset inventory page of Microsoft Defender for Cloud provides a single page for viewing the security posture of the resources you connected to Microsoft Defender for Cloud. All resources with unresolved security recommendations are shown in the inventory. If you enabled the integration with Microsoft Defender for Endpoint and enabled Microsoft Defender for Servers, you also have access to a software inventory. The tile on the overview page shows you at a glance the total healthy and unhealthy resources (for the currently selected subscriptions). [Learn more](asset-inventory.md).
34
32
35
33
## Insights
36
34
@@ -44,6 +42,5 @@ The **Insights** pane offers customized items for your environment including:
44
42
## Next steps
45
43
46
44
-[Learn more](concept-cloud-security-posture-management.md) about cloud security posture management.
47
-
-[Learn more](security-policy-concept.md) about security standards and recommendations
48
-
-[Review your asset inventory](asset-inventory.md)
49
-
45
+
-[Learn more](security-policy-concept.md) about security standards and recommendations.
46
+
-[Review your asset inventory](asset-inventory.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/plan-defender-for-servers.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ The following table shows an overview of the Defender for Servers deployment pro
42
42
| Enable Defender for Servers | • When you enable a paid plan, Defender for Cloud enables the *Security* solution on its default workspace.<br /><br />• Enable Defender for Servers Plan 1 (subscription only) or Plan 2 (subscription and workspace).<br /><br />• After enabling a plan, decide how you want to install agents and extensions on Azure VMs in the subscription or workgroup.<br /><br />•By default, auto-provisioning is enabled for some extensions. |
43
43
| Protect AWS/GCP machines | • For a Defender for Servers deployment, you set up a connector, turn off plans you don't need, configure auto-provisioning settings, authenticate to AWS/GCP, and deploy the settings.<br /><br />• Auto-provisioning includes the agents used by Defender for Cloud and the Azure Connected Machine agent for onboarding to Azure with Azure Arc.<br /><br />• AWS uses a CloudFormation template.<br /><br />• GCP uses a Cloud Shell template.<br /><br />• Recommendations start appearing in the portal. |
44
44
| Protect on-premises servers | • Onboard them as Azure Arc machines and deploy agents with automation provisioning. |
45
-
| Foundational CSPM | • There are no charges when you use foundational CSPM with no plans enabled.<br /><br />• AWS/GCP machines don't need to be set up with Azure Arc for foundational CSPM. On-premises machines do.<br /><br />• Some foundational recommendations rely only agents: Antimalware / endpoint protection (Log Analytics agent or Azure Monitor agent) \| OS baselines recommendations (Log Analytics agent or Azure Monitor agent and Guest Configuration extension) \|
45
+
| Foundational CSPM | • There are no charges when you use foundational CSPM with no plans enabled.<br /><br />• AWS/GCP machines don't need to be set up with Azure Arc for foundational CSPM. On-premises machines do.<br /><br />• Some foundational recommendations rely only agents: Antimalware / endpoint protection (Log Analytics agent or Azure Monitor agent) \| OS baselines recommendations (Log Analytics agent or Azure Monitor agent and Guest Configuration extension) \||
46
46
47
47
- Learn more about [foundational cloud security posture management (CSPM)](concept-cloud-security-posture-management.md).
48
48
- Learn more about [Azure Arc](../azure-arc/index.yml) onboarding.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/plan-multicloud-security-determine-ownership-requirements.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ Depending on the size of your organization, separate teams will manage [security
21
21
22
22
| Security function | Details |
23
23
|---|---|
24
-
|[Security Operations (SecOps)](/azure/cloud-adoption-framework/organize/cloud-security-operations-center) | Reducing organizational risk by reducing the time in which bad actors have access to corporate resources. Reactive detection, analysis, response and remediation of attacks. Proactive threat hunting.
24
+
|[Security Operations (SecOps)](/azure/cloud-adoption-framework/organize/cloud-security-operations-center)| Reducing organizational risk by reducing the time in which bad actors have access to corporate resources. Reactive detection, analysis, response and remediation of attacks. Proactive threat hunting. |
25
25
|[Security architecture](/azure/cloud-adoption-framework/organize/cloud-security-architecture)| Security design summarizing and documenting the components, tools, processes, teams, and technologies that protect your business from risk.|
26
26
|[Security compliance management](/azure/cloud-adoption-framework/organize/cloud-security-compliance-management)| Processes that ensure the organization is compliant with regulatory requirements and internal policies.|
27
27
|[People security](/azure/cloud-adoption-framework/organize/cloud-security-people)|Protecting the organization from human risk to security.|
@@ -31,7 +31,7 @@ Depending on the size of your organization, separate teams will manage [security
31
31
|[Identity and key management](/azure/cloud-adoption-framework/organize/cloud-security-identity-keys)|Authenticating and authorizing users, services, devices, and apps. Provide secure distribution and access for cryptographic operations.|
32
32
|[Threat intelligence](/azure/cloud-adoption-framework/organize/cloud-security-threat-intelligence)| Making decisions and acting on security threat intelligence that provides context and actionable insights on active attacks and potential threats.|
33
33
|[Posture management](/azure/cloud-adoption-framework/organize/cloud-security-posture-management)|Continuously reporting on, and improving, your organizational security posture.|
34
-
|[Incident preparation](/azure/cloud-adoption-framework/organize/cloud-security-incident-preparation)|Building tools, processes, and expertise to respond to security incidents.
34
+
|[Incident preparation](/azure/cloud-adoption-framework/organize/cloud-security-incident-preparation)|Building tools, processes, and expertise to respond to security incidents.|
0 commit comments