Skip to content

Commit f4d1ecb

Browse files
authored
Merge pull request #193867 from bmansheim/change-to-Defender-for-Servers
Change Defender for servers to Defender for Servers
2 parents 335a477 + 092c792 commit f4d1ecb

30 files changed

+132
-132
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@
136136
- name: Protect your machines
137137
displayName: hybrid, arc, Azure Defender for machines
138138
items:
139-
- name: Overview of Defender for servers
139+
- name: Overview of Defender for Servers
140140
displayName: VM
141141
href: defender-for-servers-introduction.md
142142
- name: Apply Azure security baselines

articles/defender-for-cloud/adaptive-application-controls.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ No enforcement options are currently available. Adaptive application controls ar
3939
|Aspect|Details|
4040
|----|:----|
4141
|Release state:|General availability (GA)|
42-
|Pricing:|Requires [Microsoft Defender for servers Plan 2](defender-for-servers-introduction.md#what-are-the-microsoft-defender-for-server-plans)|
42+
|Pricing:|Requires [Microsoft Defender for Servers Plan 2](defender-for-servers-introduction.md#what-are-the-microsoft-defender-for-server-plans)|
4343
|Supported machines:|:::image type="icon" source="./media/icons/yes-icon.png"::: Azure and non-Azure machines running Windows and Linux<br>:::image type="icon" source="./media/icons/yes-icon.png"::: [Azure Arc](../azure-arc/index.yml) machines|
4444
|Required roles and permissions:|**Security Reader** and **Reader** roles can both view groups and the lists of known-safe applications<br>**Contributor** and **Security Admin** roles can both edit groups and the lists of known-safe applications|
4545
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National (Azure Government, Azure China 21Vianet)<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Connected AWS accounts|
@@ -77,7 +77,7 @@ Select the recommendation, or open the adaptive application controls page to vie
7777
- AppLocker is not available (Windows Server Core installations)
7878

7979
> [!TIP]
80-
> Defender for Cloud needs at least two weeks of data to define the unique recommendations per group of machines. Machines that have recently been created, or which belong to subscriptions that were only recently protected by Microsoft Defender for servers, will appear under the **No recommendation** tab.
80+
> Defender for Cloud needs at least two weeks of data to define the unique recommendations per group of machines. Machines that have recently been created, or which belong to subscriptions that were only recently protected by Microsoft Defender for Servers, will appear under the **No recommendation** tab.
8181
8282
1. Open the **Recommended** tab. The groups of machines with recommended allowlists appears.
8383

@@ -238,7 +238,7 @@ Some of the functions that are available from the REST API:
238238
No enforcement options are currently available. Adaptive application controls are intended to provide **security alerts** if any application runs other than the ones you've defined as safe. They have a range of benefits ([What are the benefits of adaptive application controls?](#what-are-the-benefits-of-adaptive-application-controls)) and are extremely customizable as shown on this page.
239239

240240
### Why do I see a Qualys app in my recommended applications?
241-
[Microsoft Defender for servers](defender-for-servers-introduction.md) includes vulnerability scanning for your machines at no extra cost. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Defender for Cloud. For details of this scanner and instructions for how to deploy it, see [Defender for Cloud's integrated Qualys vulnerability assessment solution](deploy-vulnerability-assessment-vm.md).
241+
[Microsoft Defender for Servers](defender-for-servers-introduction.md) includes vulnerability scanning for your machines at no extra cost. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Defender for Cloud. For details of this scanner and instructions for how to deploy it, see [Defender for Cloud's integrated Qualys vulnerability assessment solution](deploy-vulnerability-assessment-vm.md).
242242

243243
To ensure no alerts are generated when Defender for Cloud deploys the scanner, the adaptive application controls recommended allowlist includes the scanner for all machines.
244244

articles/defender-for-cloud/adaptive-network-hardening.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ This page explains how to configure and manage adaptive network hardening in Def
1818
|Aspect|Details|
1919
|----|:----|
2020
|Release state:|General availability (GA)|
21-
|Pricing:|Requires [Microsoft Defender for servers Plan 2](defender-for-servers-introduction.md#what-are-the-microsoft-defender-for-server-plans)|
21+
|Pricing:|Requires [Microsoft Defender for Servers Plan 2](defender-for-servers-introduction.md#what-are-the-microsoft-defender-for-server-plans)|
2222
|Required roles and permissions:|Write permissions on the machine’s NSGs|
2323
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/no-icon.png"::: National (Azure Government, Azure China 21Vianet)<br>:::image type="icon" source="./media/icons/no-icon.png"::: Connected AWS accounts|
2424

@@ -46,7 +46,7 @@ For example, let's say the existing NSG rule is to allow traffic from 140.20.30.
4646
* **Unscanned resources**: VMs that the adaptive network hardening algorithm cannot be run on because of one of the following reasons:
4747
* **VMs are Classic VMs**: Only Azure Resource Manager VMs are supported.
4848
* **Not enough data is available**: In order to generate accurate traffic hardening recommendations, Defender for Cloud requires at least 30 days of traffic data.
49-
* **VM is not protected by Microsoft Defender for servers**: Only VMs protected with [Microsoft Defender for servers](defender-for-servers-introduction.md) are eligible for this feature.
49+
* **VM is not protected by Microsoft Defender for Servers**: Only VMs protected with [Microsoft Defender for Servers](defender-for-servers-introduction.md) are eligible for this feature.
5050

5151
:::image type="content" source="./media/adaptive-network-hardening/recommendation-details-page.png" alt-text="Details page of the recommendation Adaptive Network Hardening recommendations should be applied on internet facing virtual machines.":::
5252

articles/defender-for-cloud/asset-inventory.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -125,12 +125,12 @@ Using the [Kusto Query Language (KQL)](/azure/data-explorer/kusto/query/), asset
125125

126126
## Access a software inventory
127127

128-
If you've enabled the integration with Microsoft Defender for Endpoint and enabled Microsoft Defender for servers, you'll have access to the software inventory.
128+
If you've enabled the integration with Microsoft Defender for Endpoint and enabled Microsoft Defender for Servers, you'll have access to the software inventory.
129129

130130
:::image type="content" source="media/asset-inventory/software-inventory-filters.gif" alt-text="If you've enabled the threat and vulnerability solution, Defender for Cloud's asset inventory offers a filter to select resources by their installed software.":::
131131

132132
> [!NOTE]
133-
> The "Blank" option shows machines without Microsoft Defender for Endpoint (or without Microsoft Defender for servers).
133+
> The "Blank" option shows machines without Microsoft Defender for Endpoint (or without Microsoft Defender for Servers).
134134
135135
As well as the filters in the asset inventory page, you can explore the software inventory data from Azure Resource Graph Explorer.
136136

articles/defender-for-cloud/auto-deploy-vulnerability-assessment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ Defender for Cloud collects data from your machines using agents and extensions.
1515

1616
To assess your machines for vulnerabilities, you can use one of the following solutions:
1717

18-
- Microsoft's threat and vulnerability management module of Microsoft Defender for Endpoint (included with Microsoft Defender for servers)
19-
- An integrated Qualys agent (included with Microsoft Defender for servers)
18+
- Microsoft's threat and vulnerability management module of Microsoft Defender for Endpoint (included with Microsoft Defender for Servers)
19+
- An integrated Qualys agent (included with Microsoft Defender for Servers)
2020
- A Qualys or Rapid7 scanner which you have licensed separately and configured within Defender for Cloud (this is called the Bring Your Own License, or BYOL, scenario)
2121

2222
> [!NOTE]

articles/defender-for-cloud/defender-for-cloud-introduction.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ For example, if you've [connected an Amazon Web Services (AWS) account](quicksta
8080

8181
- **Defender for Cloud's CSPM features** extend to your AWS resources. This agentless plan assesses your AWS resources according to AWS-specific security recommendations and these are included in your secure score. The resources will also be assessed for compliance with built-in standards specific to AWS (AWS CIS, AWS PCI DSS, and AWS Foundational Security Best Practices). Defender for Cloud's [asset inventory page](asset-inventory.md) is a multi-cloud enabled feature helping you manage your AWS resources alongside your Azure resources.
8282
- **Microsoft Defender for Kubernetes** extends its container threat detection and advanced defenses to your **Amazon EKS Linux clusters**.
83-
- **Microsoft Defender for servers** brings threat detection and advanced defenses to your Windows and Linux EC2 instances. This plan includes the integrated license for Microsoft Defender for Endpoint, security baselines and OS level assessments, vulnerability assessment scanning, adaptive application controls (AAC), file integrity monitoring (FIM), and more.
83+
- **Microsoft Defender for Servers** brings threat detection and advanced defenses to your Windows and Linux EC2 instances. This plan includes the integrated license for Microsoft Defender for Endpoint, security baselines and OS level assessments, vulnerability assessment scanning, adaptive application controls (AAC), file integrity monitoring (FIM), and more.
8484

8585
Learn more about connecting your [AWS](quickstart-onboard-aws.md) and [GCP](quickstart-onboard-gcp.md) accounts to Microsoft Defender for Cloud.
8686

@@ -90,7 +90,7 @@ Learn more about connecting your [AWS](quickstart-onboard-aws.md) and [GCP](quic
9090

9191
Defender for Cloud includes vulnerability assessment solutions for your virtual machines, container registries, and SQL servers as part of the enhanced security features. Some of the scanners are powered by Qualys. But you don't need a Qualys license, or even a Qualys account - everything's handled seamlessly inside Defender for Cloud.
9292

93-
Microsoft Defender for servers includes automatic, native integration with Microsoft Defender for Endpoint. Learn more, [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](integration-defender-for-endpoint.md). With this integration enabled, you'll have access to the vulnerability findings from **Microsoft threat and vulnerability management**. Learn more in [Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-tvm.md).
93+
Microsoft Defender for Servers includes automatic, native integration with Microsoft Defender for Endpoint. Learn more, [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](integration-defender-for-endpoint.md). With this integration enabled, you'll have access to the vulnerability findings from **Microsoft threat and vulnerability management**. Learn more in [Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-tvm.md).
9494

9595
Review the findings from these vulnerability scanners and respond to them all from within Defender for Cloud. This broad approach brings Defender for Cloud closer to being the single pane of glass for all of your cloud security efforts.
9696

@@ -129,7 +129,7 @@ Defender for Cloud provides:
129129

130130
The **Defender plans** page of Microsoft Defender for Cloud offers the following plans for comprehensive defenses for the compute, data, and service layers of your environment:
131131

132-
- [Microsoft Defender for servers](defender-for-servers-introduction.md)
132+
- [Microsoft Defender for Servers](defender-for-servers-introduction.md)
133133
- [Microsoft Defender for Storage](defender-for-storage-introduction.md)
134134
- [Microsoft Defender for SQL](defender-for-sql-introduction.md)
135135
- [Microsoft Defender for Containers](defender-for-containers-introduction.md)

articles/defender-for-cloud/defender-for-kubernetes-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ author: bmansheim
1414
Defender for Cloud provides real-time threat protection for your Azure Kubernetes Service (AKS) containerized environments and generates alerts for suspicious activities. You can use this information to quickly remediate security issues and improve the security of your containers.
1515

1616
Threat protection at the cluster level is provided by the analysis of the Kubernetes audit logs.
17-
Host-level threat detection for your Linux AKS nodes is available if you enable [Microsoft Defender for servers](defender-for-servers-introduction.md) and its Log Analytics agent. However, if your cluster is deployed on an Azure Kubernetes Service virtual machine scale set, the Log Analytics agent is not currently supported.
17+
Host-level threat detection for your Linux AKS nodes is available if you enable [Microsoft Defender for Servers](defender-for-servers-introduction.md) and its Log Analytics agent. However, if your cluster is deployed on an Azure Kubernetes Service virtual machine scale set, the Log Analytics agent is not currently supported.
1818

1919
## Availability
2020

0 commit comments

Comments
 (0)