Skip to content

Commit f6f960f

Browse files
authored
Merge pull request #134568 from memildin/asc-melvyn-test
Resolved the build suggestion regarding linking to specific versions &preserve-view=true
2 parents e629b7e + 83d462c commit f6f960f

File tree

4 files changed

+46
-75
lines changed

4 files changed

+46
-75
lines changed

articles/security-center/alerts-schemas.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,6 @@
22
title: Schemas for the Azure Security Center alerts
33
description: This article describes the different schemas used by Azure Security Center for security alerts.
44
services: security-center
5-
documentationcenter: na
65
author: memildin
76
manager: rkarlin
87
ms.service: security-center
@@ -169,7 +168,7 @@ You can view the security alerts events in Activity Log by searching for the Act
169168

170169
Microsoft Graph is the gateway to data and intelligence in Microsoft 365. It provides a unified programmability model that you can use to access the tremendous amount of data in Microsoft 365, Windows 10, and Enterprise Mobility + Security. Use the wealth of data in Microsoft Graph to build apps for organizations and consumers that interact with millions of users.
171170

172-
The schema and a JSON representation for security alerts sent to MS Graph, are available in [the Microsoft Graph documentation](https://docs.microsoft.com/graph/api/resources/alert?view=graph-rest-1.0).
171+
The schema and a JSON representation for security alerts sent to MS Graph, are available in [the Microsoft Graph documentation](https://docs.microsoft.com/graph/api/resources/alert?view=graph-rest-1.0&preserve-view=true).
173172

174173
---
175174

articles/security-center/defender-for-sql-usage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ Azure Defender alerts are available in Security Center's alerts page, the resour
114114

115115
1. Alerts are designed to be self-contained, with detailed remediation steps and investigation information in each one. You can investigate further by using other Azure Security Center and Azure Sentinel capabilities for a broader view:
116116

117-
* Enable SQL Server's auditing feature for further investigations. If you're an Azure Sentinel user, you can upload the SQL auditing logs from the Windows Security Log events to Sentinel and enjoy a rich investigation experience. [Learn more about SQL Server Auditing](https://docs.microsoft.com/sql/relational-databases/security/auditing/create-a-server-audit-and-server-audit-specification?view=sql-server-ver15).
117+
* Enable SQL Server's auditing feature for further investigations. If you're an Azure Sentinel user, you can upload the SQL auditing logs from the Windows Security Log events to Sentinel and enjoy a rich investigation experience. [Learn more about SQL Server Auditing](https://docs.microsoft.com/sql/relational-databases/security/auditing/create-a-server-audit-and-server-audit-specification?view=sql-server-ver15&preserve-view=true).
118118
* To improve your security posture, use Security Center's recommendations for the host machine indicated in each alert. This will reduce the risks of future attacks.
119119

120120
[Learn more about managing and responding to alerts](security-center-managing-and-responding-alerts.md).

articles/security-center/security-center-endpoint-protection.md

Lines changed: 42 additions & 70 deletions
Original file line numberDiff line numberDiff line change
@@ -25,142 +25,114 @@ Azure Security Center provides health assessments of [supported](security-center
2525

2626
## Windows Defender
2727

28-
* Security Center recommends you **"Install endpoint protection solutions on virtual machine"** when [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps) runs and the result is **AMServiceEnabled: False**
28+
* Security Center recommends you **"Install endpoint protection solutions on virtual machine"** when [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps&preserve-view=true) runs and the result is **AMServiceEnabled: False**
2929

30-
* Security Center recommends you **"Resolve endpoint protection health issues on your machines"** when [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps) runs and any of the following occurs:
30+
* Security Center recommends you **"Resolve endpoint protection health issues on your machines"** when [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps&preserve-view=true) runs and any of the following occurs:
3131

3232
* Any of the following properties are false:
3333

34-
**AMServiceEnabled**
34+
- **AMServiceEnabled**
35+
- **AntispywareEnabled**
36+
- **RealTimeProtectionEnabled**
37+
- **BehaviorMonitorEnabled**
38+
- **IoavProtectionEnabled**
39+
- **OnAccessProtectionEnabled**
3540

36-
**AntispywareEnabled**
41+
* If one or both of the following properties are 7 or more:
3742

38-
**RealTimeProtectionEnabled**
39-
40-
**BehaviorMonitorEnabled**
41-
42-
**IoavProtectionEnabled**
43-
44-
**OnAccessProtectionEnabled**
45-
46-
* If one or both of the following properties are 7 or more.
47-
48-
**AntispywareSignatureAge**
49-
50-
**AntivirusSignatureAge**
43+
- **AntispywareSignatureAge**
44+
- **AntivirusSignatureAge**
5145

5246
## Microsoft System Center endpoint protection
5347

54-
* Security Center recommends you **"Install endpoint protection solutions on virtual machine"** when importing **SCEPMpModule ("$env:ProgramFiles\Microsoft Security Client\MpProvider\MpProvider.psd1")** and running **Get-MProtComputerStatus** results with **AMServiceEnabled = false**
48+
* Security Center recommends you **"Install endpoint protection solutions on virtual machine"** when importing **SCEPMpModule ("$env:ProgramFiles\Microsoft Security Client\MpProvider\MpProvider.psd1")** and running **Get-MProtComputerStatus** results in **AMServiceEnabled = false**.
5549

5650
* Security Center recommends you **"Resolve endpoint protection health issues on your machines"** when **Get-MprotComputerStatus** runs and any of the following occurs:
5751

5852
* At least one of the following properties is false:
5953

60-
* **AMServiceEnabled**
61-
* **AntispywareEnabled**
62-
* **RealTimeProtectionEnabled**
63-
* **BehaviorMonitorEnabled**
64-
* **IoavProtectionEnabled**
65-
* **OnAccessProtectionEnabled**
54+
- **AMServiceEnabled**
55+
- **AntispywareEnabled**
56+
- **RealTimeProtectionEnabled**
57+
- **BehaviorMonitorEnabled**
58+
- **IoavProtectionEnabled**
59+
- **OnAccessProtectionEnabled**
6660

67-
* If one or both of the following Signature Updates is greater or equal to 7.
61+
* If one or both of the following Signature Updates are greater or equal to 7:
6862

6963
* **AntispywareSignatureAge**
7064
* **AntivirusSignatureAge**
7165

7266
## Trend Micro
7367

7468
* Security Center recommends you **"Install endpoint protection solutions on virtual machine"** when any of the following checks aren't met:
75-
* **HKLM:\SOFTWARE\TrendMicro\Deep Security Agent** exists
76-
* **HKLM:\SOFTWARE\TrendMicro\Deep Security Agent\InstallationFolder** exists
77-
* The **dsa_query.cmd** file is found in the Installation Folder
78-
* Running **dsa_query.cmd** results with **Component.AM.mode: on - Trend Micro Deep Security Agent detected**
69+
- **HKLM:\SOFTWARE\TrendMicro\Deep Security Agent** exists
70+
- **HKLM:\SOFTWARE\TrendMicro\Deep Security Agent\InstallationFolder** exists
71+
- The **dsa_query.cmd** file is found in the Installation Folder
72+
- Running **dsa_query.cmd** results with **Component.AM.mode: on - Trend Micro Deep Security Agent detected**
7973

8074
## Symantec endpoint protection
8175
Security Center recommends you **"Install endpoint protection solutions on virtual machine"** when any of the following checks aren't met:
8276

83-
* **HKLM:\Software\Symantec\Symantec Endpoint Protection\CurrentVersion\PRODUCTNAME = "Symantec Endpoint Protection"**
84-
85-
* **HKLM:\Software\Symantec\Symantec Endpoint Protection\CurrentVersion\public-opstate\ASRunningStatus = 1**
77+
- **HKLM:\Software\Symantec\Symantec Endpoint Protection\CurrentVersion\PRODUCTNAME = "Symantec Endpoint Protection"**
78+
- **HKLM:\Software\Symantec\Symantec Endpoint Protection\CurrentVersion\public-opstate\ASRunningStatus = 1**
8679

8780
Or
8881

89-
* **HKLM:\Software\Wow6432Node\Symantec\Symantec Endpoint Protection\CurrentVersion\PRODUCTNAME = "Symantec Endpoint Protection"**
90-
91-
* **HKLM:\Software\Wow6432Node\Symantec\Symantec Endpoint Protection\CurrentVersion\public-opstate\ASRunningStatus = 1**
82+
- **HKLM:\Software\Wow6432Node\Symantec\Symantec Endpoint Protection\CurrentVersion\PRODUCTNAME = "Symantec Endpoint Protection"**
83+
- **HKLM:\Software\Wow6432Node\Symantec\Symantec Endpoint Protection\CurrentVersion\public-opstate\ASRunningStatus = 1**
9284

9385
Security Center recommends you **"Resolve endpoint protection health issues on your machines"** when any of the following checks aren't met:
9486

95-
* Check Symantec Version >= 12: Registry location: **HKLM:\Software\Symantec\Symantec Endpoint Protection\CurrentVersion" -Value "PRODUCTVERSION"**
96-
97-
* Check Real Time Protection status: **HKLM:\Software\Wow6432Node\Symantec\Symantec Endpoint Protection\AV\Storages\Filesystem\RealTimeScan\OnOff == 1**
98-
99-
* Check Signature Update status: **HKLM\Software\Symantec\Symantec Endpoint Protection\CurrentVersion\public-opstate\LatestVirusDefsDate <= 7 days**
100-
101-
* Check Full Scan status: **HKLM:\Software\Symantec\Symantec Endpoint Protection\CurrentVersion\public-opstate\LastSuccessfulScanDateTime <= 7 days**
102-
103-
* Find signature version number Path to signature version for Symantec 12: **Registry Paths+ "CurrentVersion\SharedDefs" -Value "SRTSP"**
104-
105-
* Path to signature version for Symantec 14: **Registry Paths+ "CurrentVersion\SharedDefs\SDSDefs" -Value "SRTSP"**
87+
- Check Symantec Version >= 12: Registry location: **HKLM:\Software\Symantec\Symantec Endpoint Protection\CurrentVersion" -Value "PRODUCTVERSION"**
88+
- Check Real-Time Protection status: **HKLM:\Software\Wow6432Node\Symantec\Symantec Endpoint Protection\AV\Storages\Filesystem\RealTimeScan\OnOff == 1**
89+
- Check Signature Update status: **HKLM\Software\Symantec\Symantec Endpoint Protection\CurrentVersion\public-opstate\LatestVirusDefsDate <= 7 days**
90+
- Check Full Scan status: **HKLM:\Software\Symantec\Symantec Endpoint Protection\CurrentVersion\public-opstate\LastSuccessfulScanDateTime <= 7 days**
91+
- Find signature version number Path to signature version for Symantec 12: **Registry Paths+ "CurrentVersion\SharedDefs" -Value "SRTSP"**
92+
- Path to signature version for Symantec 14: **Registry Paths+ "CurrentVersion\SharedDefs\SDSDefs" -Value "SRTSP"**
10693

10794
Registry Paths:
108-
109-
* **"HKLM:\Software\Symantec\Symantec Endpoint Protection" + $Path;**
110-
* **"HKLM:\Software\Wow6432Node\Symantec\Symantec Endpoint Protection" + $Path**
95+
- **"HKLM:\Software\Symantec\Symantec Endpoint Protection" + $Path;**
96+
- **"HKLM:\Software\Wow6432Node\Symantec\Symantec Endpoint Protection" + $Path**
11197

11298
## McAfee endpoint protection for Windows
11399

114100
Security Center recommends you **"Install endpoint protection solutions on virtual machine"** when any of the following checks aren't met:
115101

116-
* **HKLM:\SOFTWARE\McAfee\Endpoint\AV\ProductVersion** exists
117-
118-
* **HKLM:\SOFTWARE\McAfee\AVSolution\MCSHIELDGLOBAL\GLOBAL\enableoas = 1**
102+
- **HKLM:\SOFTWARE\McAfee\Endpoint\AV\ProductVersion** exists
103+
- **HKLM:\SOFTWARE\McAfee\AVSolution\MCSHIELDGLOBAL\GLOBAL\enableoas = 1**
119104

120105
Security Center recommends you **"Resolve endpoint protection health issues on your machines"** when any of the following checks aren't met:
121106

122-
* McAfee Version: **HKLM:\SOFTWARE\McAfee\Endpoint\AV\ProductVersion >= 10**
123-
124-
* Find Signature Version: **HKLM:\Software\McAfee\AVSolution\DS\DS -Value "dwContentMajorVersion"**
125-
126-
* Find Signature date: **HKLM:\Software\McAfee\AVSolution\DS\DS -Value "szContentCreationDate" >= 7 days**
127-
128-
* Find Scan date: **HKLM:\Software\McAfee\Endpoint\AV\ODS -Value "LastFullScanOdsRunTime" >= 7 days**
107+
- McAfee Version: **HKLM:\SOFTWARE\McAfee\Endpoint\AV\ProductVersion >= 10**
108+
- Find Signature Version: **HKLM:\Software\McAfee\AVSolution\DS\DS -Value "dwContentMajorVersion"**
109+
- Find Signature date: **HKLM:\Software\McAfee\AVSolution\DS\DS -Value "szContentCreationDate" >= 7 days**
110+
- Find Scan date: **HKLM:\Software\McAfee\Endpoint\AV\ODS -Value "LastFullScanOdsRunTime" >= 7 days**
129111

130112
## McAfee Endpoint Security for Linux Threat Prevention
131113

132114
Security Center recommends you **"Install endpoint protection solutions on virtual machine"** when any of the following checks aren't met:
133115

134-
- File **/opt/isec/ens/threatprevention/bin/isecav** exits
135-
116+
- File **/opt/isec/ens/threatprevention/bin/isecav** exists
136117
- **"/opt/isec/ens/threatprevention/bin/isecav --version"** output is: **McAfee name = McAfee Endpoint Security for Linux Threat Prevention and McAfee version >= 10**
137118

138119
Security Center recommends you **"Resolve endpoint protection health issues on your machines"** when any of the following checks aren't met:
139120

140121
- **"/opt/isec/ens/threatprevention/bin/isecav --listtask"** returns **Quick scan, Full scan** and both of the scans <= 7 days
141-
142122
- **"/opt/isec/ens/threatprevention/bin/isecav --listtask"** returns **DAT and engine Update time** and both of them <= 7 days
143-
144123
- **"/opt/isec/ens/threatprevention/bin/isecav --getoasconfig --summary"** returns **On Access Scan** status
145124

146125
## Sophos Antivirus for Linux
147126

148127
Security Center recommends you **"Install endpoint protection solutions on virtual machine"** when any of the following checks aren't met:
149-
150128
- File **/opt/sophos-av/bin/savdstatus** exits or search for customized location **"readlink $(which savscan)"**
151-
152129
- **"/opt/sophos-av/bin/savdstatus --version"** returns Sophos name = **Sophos Anti-Virus and Sophos version >= 9**
153130

154131
Security Center recommends you **"Resolve endpoint protection health issues on your machines"** when any of the following checks aren't met:
155-
156132
- **"/opt/sophos-av/bin/savlog --maxage=7 | grep -i "Scheduled scan .\* completed" | tail -1"**, returns a value
157-
158133
- **"/opt/sophos-av/bin/savlog --maxage=7 | grep "scan finished"** | tail -1", returns a value
159-
160134
- **"/opt/sophos-av/bin/savdstatus --lastupdate"** returns lastUpdate, which should be <= 7 days
161-
162135
- **"/opt/sophos-av/bin/savdstatus -v"** is equal to **"On-access scanning is running"**
163-
164136
- **"/opt/sophos-av/bin/savconfig get LiveProtection"** returns enabled
165137

166138
## Troubleshoot and support

articles/security/benchmarks/security-control-identity-access-control.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,9 @@ Identity and access management recommendations focus on addressing issues relate
2222

2323
Azure AD has built-in roles that must be explicitly assigned and are queryable. Use the Azure AD PowerShell module to perform ad hoc queries to discover accounts that are members of administrative groups.
2424

25-
- [How to get a directory role in Azure AD with PowerShell](https://docs.microsoft.com/powershell/module/azuread/get-azureaddirectoryrole?view=azureadps-2.0)
25+
- [How to get a directory role in Azure AD with PowerShell](https://docs.microsoft.com/powershell/module/azuread/get-azureaddirectoryrole?view=azureadps-2.0&preserve-view=true)
2626

27-
- [How to get members of a directory role in Azure AD with PowerShell](https://docs.microsoft.com/powershell/module/azuread/get-azureaddirectoryrolemember?view=azureadps-2.0)
27+
- [How to get members of a directory role in Azure AD with PowerShell](https://docs.microsoft.com/powershell/module/azuread/get-azureaddirectoryrolemember?view=azureadps-2.0&preserve-view=true)
2828

2929
## 3.2: Change default passwords where applicable
3030

0 commit comments

Comments
 (0)