Skip to content

Commit f41da97

Browse files
authored
Merge pull request #94962 from memildin/asc-melvyn-seofixes
Shortened title lengths
2 parents 342958a + d3d4619 commit f41da97

9 files changed

+35
-37
lines changed

articles/security-center/quick-onboard-linux-computer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Azure Security Center Quickstart - Onboard your Linux computers to Security Center | Microsoft Docs
2+
title: Onboard Linux computers to Azure Security Center | Microsoft Docs
33
description: This quickstart shows you how to onboard your Linux computers to Security Center.
44
services: security-center
55
documentationcenter: na

articles/security-center/security-center-alerts-cloud-smart.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Cloud smart alert correlation in Azure Security Center (incidents) | Microsoft Docs
2+
title: Azure Security Center incidents - correlated alerts | Microsoft Docs
33
description: This topic explains how fusion uses cloud smart alert correlation to generate security incidents in Azure Security Center.
44
services: security-center
55
documentationcenter: na

articles/security-center/security-center-alerts-compute.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.author: memildin
1616
---
1717
# Threat detection for cloud native computing in Azure Security Center
1818

19-
As a native solution, Azure Security Center has unique visibility into internal logs for attack methodology identification across multiple targets. This article presents the alerts available for the following Azure services:
19+
As a native solution, Azure Security Center has unique visibility into internal logs for attack methodology identification across multiple targets. This article presents the alerts available for the following Azure services:
2020

2121
* [Azure App Service](#app-services)
2222
* [Azure Containers](#azure-containers)
@@ -74,9 +74,9 @@ Also, our global team of security researchers constantly monitor the threat land
7474
7575
|Alert|Description|
7676
|---|---|
77-
|**PREVIEW - Role binding to the cluster-admin role detected**|Kubernetes audit log analysis detected a new binding to the cluster-admin role resulting in administrator privileges. Unnecessarily providing administrator privileges might result in privilege escalation issues in the cluster.|
77+
|**PREVIEW - Role binding to the cluster-admin role detected**|Kubernetes audit log analysis detected a new binding to the cluster-admin role resulting in administrator privileges. Unnecessarily providing administrator privileges might result in privilege escalation issues in the cluster.|
7878
|**PREVIEW - Exposed Kubernetes dashboard detected**|Kubernetes audit log analysis detected exposure of the Kubernetes Dashboard by a LoadBalancer service. Exposed dashboards allow unauthenticated access to the cluster management and pose a security threat.|
79-
|**PREVIEW - New high privileges role detected**|Kubernetes audit log analysis detected a new role with high privileges. A binding to a role with high privileges gives the user/group elevated privileges in the cluster. Unnecessarily providing elevated privileges might result in privilege escalation issues in the cluster.|
79+
|**PREVIEW - New high privileges role detected**|Kubernetes audit log analysis detected a new role with high privileges. A binding to a role with high privileges gives the user/group elevated privileges in the cluster. Unnecessarily providing elevated privileges might result in privilege escalation issues in the cluster.|
8080
|**PREVIEW - New container in the kube-system namespace detected**|Kubernetes audit log analysis detected a new container in the kube-system namespace that isn’t among the containers that normally run in this namespace. The kube-system namespaces shouldn't contain user resources. Attackers can use this namespace to hide malicious components.|
8181
|**PREVIEW - Digital currency mining container detected**|Kubernetes audit log analysis detected a container that has an image associated with a digital currency mining tool.|
8282
|**PREVIEW - Privileged container detected**|Kubernetes audit log analysis detected a new privileged container. A privileged container has access to the node’s resources and breaks the isolation between containers. If compromised, an attacker can use the privileged container to gain access to the node.|

articles/security-center/security-center-endpoint-protection.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -31,23 +31,23 @@ Azure Security Center provides health assessments of [supported](https://docs.mi
3131

3232
* Any of the following properties are false:
3333

34-
**AMServiceEnabled**
34+
**AMServiceEnabled**
3535

36-
**AntispywareEnabled**
36+
**AntispywareEnabled**
3737

38-
**RealTimeProtectionEnabled**
38+
**RealTimeProtectionEnabled**
3939

40-
**BehaviorMonitorEnabled**
40+
**BehaviorMonitorEnabled**
4141

42-
**IoavProtectionEnabled**
42+
**IoavProtectionEnabled**
4343

44-
**OnAccessProtectionEnabled**
44+
**OnAccessProtectionEnabled**
4545

4646
* If one or both of the following properties are 7 or more.
4747

48-
**AntispywareSignatureAge**
48+
**AntispywareSignatureAge**
4949

50-
**AntivirusSignatureAge**
50+
**AntivirusSignatureAge**
5151

5252
## Microsoft System Center endpoint protection
5353

@@ -57,23 +57,23 @@ Azure Security Center provides health assessments of [supported](https://docs.mi
5757

5858
* At least one of the following properties is false:
5959

60-
**AMServiceEnabled**
61-
62-
**AntispywareEnabled**
60+
**AMServiceEnabled**
61+
62+
**AntispywareEnabled**
6363

64-
**RealTimeProtectionEnabled**
64+
**RealTimeProtectionEnabled**
6565

66-
**BehaviorMonitorEnabled**
66+
**BehaviorMonitorEnabled**
6767

68-
**IoavProtectionEnabled**
68+
**IoavProtectionEnabled**
6969

70-
**OnAccessProtectionEnabled**
70+
**OnAccessProtectionEnabled**
7171
7272
* If one or both of the following Signature Updates is greater or equal to 7.
7373

74-
**AntispywareSignatureAge**
74+
**AntispywareSignatureAge**
7575

76-
**AntivirusSignatureAge**
76+
**AntivirusSignatureAge**
7777

7878
## Trend Micro
7979

articles/security-center/security-center-onboarding.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Onboarding to Azure Security Center Standard for enhanced security | Microsoft Docs
2+
title: Standard tier's enhanced security - Azure Security Center | Microsoft Docs
33
description: " Learn how to onboard to Azure Security Center Standard for enhanced security. "
44
services: security-center
55
documentationcenter: na

articles/security-center/security-center-pricing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Upgrade to Security Center's Standard tier for enhanced security | Microsoft Docs
2+
title: Pricing of Azure Security Center tiers | Microsoft Docs
33
description: This article provides information on pricing for Azure Security Center.
44
services: security-center
55
documentationcenter: na

articles/security-center/security-center-sql-service-recommendations.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Protect Azure data and storage services in Azure Security Center | Microsoft Docs
2+
title: Data & storage recommendations - Azure Security Center | Microsoft Docs
33
description: This document addresses recommendations in Azure Security Center that help you protect your data and Azure SQL service and stay in compliance with security policies.
44
services: security-center
55
documentationcenter: na
@@ -22,16 +22,16 @@ This topic shows you how to view and implement security recommendations for data
2222

2323
1. In the **Resource security hygiene** section, click **Data and storage resources**.
2424

25-
![Data & storage resources](./media/security-center-monitoring/click-data.png)
25+
![Data & storage resources](./media/security-center-monitoring/click-data.png)
2626

2727
The **Data security** page opens with recommendations for data resources.
2828

29-
![Data Resources](./media/security-center-monitoring/sql-overview.png)
29+
![Data Resources](./media/security-center-monitoring/sql-overview.png)
3030

31-
From this page, you can:
31+
From this page, you can:
3232

33-
* Click the **Overview** tab lists all the data resources recommendations to be remediated.
34-
* Click each tab, and view the recommendations by resource type.
33+
* Click the **Overview** tab lists all the data resources recommendations to be remediated.
34+
* Click each tab, and view the recommendations by resource type.
3535

3636
> [!NOTE]
3737
> For more information about storage encryption, see [Azure Storage encryption for data at rest](../storage/common/storage-service-encryption.md).
@@ -60,7 +60,7 @@ From this page, you can:
6060
|Storage account|20|Secure transfer to storage accounts should be enabled|Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking.|
6161
|Redis|20|Only secure connections to your Redis Cache should be enabled|Enable only connections via SSL to Azure Cache for Redis. Use of secure connections ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking.|
6262
|SQL|15|Transparent Data Encryption on SQL databases should be enabled|Enable transparent data encryption to protect data-at-rest and meet compliance requirements.|
63-
|SQL|15|SQL server auditing should be enabled|Enable auditing for Azure SQL servers. (Azure SQL service only. Doesn't include SQL running on your virtual machines.)|
63+
|SQL|15|SQL server auditing should be enabled|Enable auditing for Azure SQL servers. (Azure SQL service only. Doesn't include SQL running on your virtual machines.)|
6464
|Data lake analytics|5|Diagnostics logs in Data Lake Analytics should be enabled|Enable logs and retain them up to a year. This enables you to recreate activity trails for investigation purposes when a security incident occurs or your network is compromised. |
6565
|Data lake store|5|Diagnostics logs in Azure Data Lake Store should be enabled|Enable logs and retain them up to a year. This enables you to recreate activity trails for investigation purposes when a security incident occurs or your network is compromised. |
6666
|SQL|30|Vulnerabilities on your SQL databases should be remediated|SQL Vulnerability Assessment scans your database for security vulnerabilities and exposes any deviations from best practices such as misconfigurations, excessive permissions, and unprotected sensitive data. Resolving the vulnerabilities found can greatly improve your database security stature.|

articles/security-center/tutorial-protect-resources.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Azure Security Center Tutorial - Protect your resources with Azure Security Center | Microsoft Docs
2+
title: Access & application controls tutorial - Azure Security Center | Microsoft Docs
33
description: This tutorial shows you how to configure a just-in-time VM access policy and an application control policy.
44
services: security-center
55
documentationcenter: na
@@ -25,8 +25,6 @@ In this tutorial you learn how to:
2525
> * Configure a just-in-time VM access policy
2626
> * Configure an application control policy
2727
28-
If you don’t have an Azure subscription, create a [free account](https://azure.microsoft.com/pricing/free-trial/) before you begin.
29-
3028
## Prerequisites
3129
To step through the features covered in this tutorial, you must be on Security Center’s Standard pricing tier. You can try Security Center Standard at no cost. To learn more, see the [pricing page](https://azure.microsoft.com/pricing/details/security-center/). The quickstart [Onboard your Azure subscription to Security Center Standard](security-center-get-started.md) walks you through how to upgrade to Standard.
3230

@@ -91,7 +89,7 @@ Adaptive application controls help you define a set of applications that are all
9189
4. Once you finish your selections, select **Create**.
9290

9391
## Clean up resources
94-
Other quickstarts and tutorials in this collection build upon this quickstart. If you plan to continue on to work with subsequent quickstarts and tutorials, continue running the Standard tier and keep automatic provisioning enabled. If you do not plan to continue or wish to return to the Free tier:
92+
Other quickstarts and tutorials in this collection build upon this quickstart. If you plan to continue to work with subsequent quickstarts and tutorials, continue running the Standard tier and keep automatic provisioning enabled. If you do not plan to continue or wish to return to the Free tier:
9593

9694
1. Return to the Security Center main menu and select **Security Policy**.
9795
2. Select the subscription or policy that you want to return to Free. **Security policy** opens.

articles/security-center/tutorial-security-incident.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Azure Security Center Tutorial - Respond to security incidents | Microsoft Docs
2+
title: Incident response tutorial - Azure Security Center | Microsoft Docs
33
description: Azure Security Center Tutorial - Respond to security incidents
44
services: security-center
55
documentationcenter: na
@@ -61,7 +61,7 @@ Security Center provides a unified view of all security alerts. Security alerts
6161

6262
1. On the Security Center main menu under **DETECTION**, select **Security alerts**:
6363

64-
![Security alerts](./media/tutorial-security-incident/tutorial-security-incident-fig1.png)
64+
![Security alerts](./media/tutorial-security-incident/tutorial-security-incident-fig1.png)
6565

6666
2. In the list of alerts, click on a security incident, which is a collection of alerts, to learn more about this incident. **Security incident detected** opens.
6767

0 commit comments

Comments
 (0)