You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/quickstart-onboard-github.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,13 +8,13 @@ ms.custom: ignite-2023
8
8
9
9
# Quickstart: Connect your GitHub Environment to Microsoft Defender for Cloud
10
10
11
-
In this quickstart, you will connect your GitHub organizations on the **Environment settings** page in Microsoft Defender for Cloud. This page provides a simple onboarding experience to auto-discover your GitHub repositories.
11
+
In this quickstart, you connect your GitHub organizations on the **Environment settings** page in Microsoft Defender for Cloud. This page provides a simple onboarding experience to autodiscover your GitHub repositories.
12
12
13
13
By connecting your GitHub organizations to Defender for Cloud, you extend the security capabilities of Defender for Cloud to your GitHub resources. These features include:
14
14
15
15
-**Foundational Cloud Security Posture Management (CSPM) features**: You can assess your GitHub security posture through GitHub-specific security recommendations. You can also learn about all the [recommendations for GitHub](recommendations-reference.md) resources.
16
16
17
-
-**Defender CSPM features**: Defender CSPM customers receive code to cloud contextualized attack paths, risk assessments, and insights to identify the most critical weaknesses that attackers can use to breach their environment. Connecting your GitHub repositories will allow you to contextualize DevOps security findings with your cloud workloads and identify the origin and developer for timely remediation. For more information, learn how to [identify and analyze risks across your environment](concept-attack-path.md)
17
+
-**Defender CSPM features**: Defender CSPM customers receive code to cloud contextualized attack paths, risk assessments, and insights to identify the most critical weaknesses that attackers can use to breach their environment. Connecting your GitHub repositories allows you to contextualize DevOps security findings with your cloud workloads and identify the origin and developer for timely remediation. For more information, learn how to [identify and analyze risks across your environment](concept-attack-path.md).
18
18
19
19
## Prerequisites
20
20
@@ -29,10 +29,10 @@ To complete this quickstart, you need:
29
29
| Aspect | Details |
30
30
|--|--|
31
31
| Release state: | General Availability. |
32
-
| Pricing: | For pricing, see the Defender for Cloud [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/?v=17.23h#pricing).
32
+
| Pricing: | For pricing, see the Defender for Cloud [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/?v=17.23h#pricing)|
33
33
| Required permissions: |**Account Administrator** with permissions to sign in to the Azure portal. <br> **Contributor** to create the connector on the Azure subscription. <br> **Organization Owner** in GitHub. |
| Regions and availability: | Refer to the [support and prerequisites](devops-support.md) section for region support and feature availability.|
35
+
| Regions and availability: | Refer to the [support and prerequisites](devops-support.md) section for region support and feature availability.|
36
36
| Clouds: | :::image type="icon" source="media/quickstart-onboard-github/check-yes.png" border="false"::: Commercial <br> :::image type="icon" source="media/quickstart-onboard-github/x-no.png" border="false"::: National (Azure Government, Microsoft Azure operated by 21Vianet) |
37
37
38
38
> [!NOTE]
@@ -68,14 +68,14 @@ To connect your GitHub account to Microsoft Defender for Cloud:
68
68
69
69
1. Select **Install**.
70
70
71
-
1. Select the organizations to install the GitHub application. It is recommended to grant access to **all repositories** to ensure Defender for Cloud can secure your entire GitHub environment.
71
+
1. Select the organizations to install the GitHub application. It's recommended to grant access to **all repositories** to ensure Defender for Cloud can secure your entire GitHub environment.
72
72
73
73
This step grants Defender for Cloud access to the selected organizations.
74
-
74
+
75
75
1. For Organizations, select one of the following:
76
76
77
-
- Select **all existing organizations** to auto-discover all repositories in GitHub organizations where the DevOps security GitHub application is installed.
78
-
- Select **all existing and future organizations** to auto-discover all repositories in GitHub organizations where the DevOps security GitHub application is installed and future organizations where the DevOps security GitHub application is installed.
77
+
- Select **all existing organizations** to autodiscover all repositories in GitHub organizations where the DevOps security GitHub application is installed.
78
+
- Select **all existing and future organizations** to autodiscover all repositories in GitHub organizations where the DevOps security GitHub application is installed and future organizations where the DevOps security GitHub application is installed.
79
79
80
80
1. Select **Next: Review and generate**.
81
81
@@ -90,7 +90,7 @@ The Defender for Cloud service automatically discovers the organizations where y
90
90
> [!NOTE]
91
91
> To ensure proper functionality of advanced DevOps posture capabilities in Defender for Cloud, only one instance of a GitHub organization can be onboarded to the Azure Tenant you are creating a connector in.
92
92
93
-
The **DevOps security**blade shows your onboarded repositories grouped by Organization. The **Recommendations**blade shows all security assessments related to GitHub repositories.
93
+
The **DevOps security**pane shows your onboarded repositories grouped by Organization. The **Recommendations**pane shows all security assessments related to GitHub repositories.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/quickstart-onboard-gitlab.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ By connecting your GitLab groups to Defender for Cloud, you extend the security
14
14
15
15
-**Foundational Cloud Security Posture Management (CSPM) features**: You can assess your GitLab security posture through GitLab-specific security recommendations. You can also learn about all the [recommendations for DevOps](recommendations-reference.md) resources.
16
16
17
-
-**Defender CSPM features**: Defender CSPM customers receive code to cloud contextualized attack paths, risk assessments, and insights to identify the most critical weaknesses that attackers can use to breach their environment. Connecting your GitLab projects will allow you to contextualize DevOps security findings with your cloud workloads and identify the origin and developer for timely remediation. For more information, learn how to [identify and analyze risks across your environment](concept-attack-path.md)
17
+
-**Defender CSPM features**: Defender CSPM customers receive code to cloud contextualized attack paths, risk assessments, and insights to identify the most critical weaknesses that attackers can use to breach their environment. Connecting your GitLab projects allows you to contextualize DevOps security findings with your cloud workloads and identify the origin and developer for timely remediation. For more information, learn how to [identify and analyze risks across your environment](concept-attack-path.md).
18
18
19
19
## Prerequisites
20
20
@@ -28,9 +28,9 @@ To complete this quickstart, you need:
28
28
| Aspect | Details |
29
29
|--|--|
30
30
| Release state: | Preview. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include legal terms that apply to Azure features that are in beta, in preview, or otherwise not yet released into general availability. |
31
-
| Pricing: | For pricing, see the Defender for Cloud [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/?v=17.23h#pricing).|
32
-
| Required permissions: | **Account Administrator** with permissions to sign in to the Azure portal. <br> **Contributor** to create a connector on the Azure subscription. <br> **Group Owner** on the GitLab Group.
33
-
| Regions and availability: | Refer to the [support and prerequisites](devops-support.md) section for region support and feature availability.|
31
+
| Pricing: | For pricing, see the Defender for Cloud [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/?v=17.23h#pricing).|
32
+
| Required permissions: |**Account Administrator** with permissions to sign in to the Azure portal. <br> **Contributor** to create a connector on the Azure subscription. <br> **Group Owner** on the GitLab Group.|
33
+
| Regions and availability: | Refer to the [support and prerequisites](devops-support.md) section for region support and feature availability.|
34
34
| Clouds: | :::image type="icon" source="media/quickstart-onboard-github/check-yes.png" border="false"::: Commercial <br> :::image type="icon" source="media/quickstart-onboard-github/x-no.png" border="false"::: National (Azure Government, Microsoft Azure operated by 21Vianet) |
35
35
36
36
> [!NOTE]
@@ -60,14 +60,14 @@ To connect your GitLab Group to Defender for Cloud by using a native connector:
60
60
61
61
1. Select **Next: Configure access**.
62
62
63
-
1. Select **Authorize**.
63
+
1. Select **Authorize**.
64
64
65
65
1. In the popup dialog, read the list of permission requests, and then select **Accept**.
66
66
67
67
1. For Groups, select one of the following:
68
68
69
-
- Select **all existing groups** to autodiscover all subgroups and projects in groups you are currently an Owner in.
70
-
- Select **all existing and future groups** to autodiscover all subgroups and projects in all current and future groups you are an Owner in.
69
+
- Select **all existing groups** to autodiscover all subgroups and projects in groups you're currently an Owner in.
70
+
- Select **all existing and future groups** to autodiscover all subgroups and projects in all current and future groups you're an Owner in.
71
71
72
72
Since GitLab projects are onboarded at no additional cost, autodiscover is applied across the group to ensure Defender for Cloud can comprehensively assess the security posture and respond to security threats across your entire DevOps ecosystem. Groups can later be manually added and removed through **Microsoft Defender for Cloud** > **Environment settings**.
73
73
@@ -78,7 +78,7 @@ Since GitLab projects are onboarded at no additional cost, autodiscover is appli
78
78
> [!NOTE]
79
79
> To ensure proper functionality of advanced DevOps posture capabilities in Defender for Cloud, only one instance of a GitLab group can be onboarded to the Azure Tenant you are creating a connector in.
80
80
81
-
The **DevOps security**blade shows your onboarded repositories by GitLab group. The **Recommendations**blade shows all security assessments related to GitLab projects.
81
+
The **DevOps security**pane shows your onboarded repositories by GitLab group. The **Recommendations**pane shows all security assessments related to GitLab projects.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/quickstart-onboard-machines.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,7 +64,7 @@ After you connect Defender for Cloud to your Azure subscription, you can start c
64
64
65
65
A list of your Log Analytics workspaces appears.
66
66
67
-
1. (Optional) If you don't already have a Log Analytics workspace in which to store the data, select **Create new workspace** and follow the on-screen guidance.
67
+
1. (Optional) If you don't already have a Log Analytics workspace in which to store the data, select **Create new workspace**, and follow the on-screen guidance.
68
68
69
69
1. From the list of workspaces, select **Upgrade** for the relevant workspace to turn on Defender for Cloud paid plans for 30 free days.
70
70
@@ -151,7 +151,7 @@ To verify that your machines are connected:
151
151
152
152
When you enable Defender for Cloud, Defender for Cloud's alerts are automatically integrated into the Microsoft Defender Portal. No further steps are needed.
153
153
154
-
The integration between Microsoft Defender for Cloud and Microsoft Defender XDR brings your cloud environments into Microsoft Defender XDR. With Defender for Cloud's alerts and cloud correlations integrated into Microsoft Defender XDR, SOC teams can now access all security information from a single interface.
154
+
The integration between Microsoft Defender for Cloud and Microsoft Defender XDR brings your cloud environments into Microsoft Defender XDR. With Defender for Cloud's alerts and cloud correlations integrated into Microsoft Defender XDR, SOC teams can now access all security information from a single interface.
155
155
156
156
Learn more about Defender for Cloud's [alerts in Microsoft Defender XDR](concept-integration-365.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/regulatory-compliance-dashboard.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ Compliance Manager thus provides improvement actions and status across your clou
21
21
22
22
## Before you start
23
23
24
-
- By default, when you enable Defender for Cloud on an Azure subscription, AWS account, or GCP plan, the MCSB plan is enabled
24
+
- By default, when you enable Defender for Cloud on an Azure subscription, AWS account, or GCP plan, the MCSB plan is enabled.
25
25
- You can add more non-default compliance standards when at least one paid plan is enabled in Defender for Cloud.
26
26
- You must be signed in with an account that has reader access to the policy compliance data. The **Reader** role for the subscription has access to the policy compliance data, but the **Security Reader** role doesn't. At a minimum, you need to have **Resource Policy Contributor** and **Security Admin** roles assigned.
27
27
@@ -130,13 +130,13 @@ The regulatory compliance has automated and manual assessments that might need t
130
130
131
131
For example, from the PCI tab you can download a ZIP file containing a digitally signed certificate demonstrating Microsoft Azure, Dynamics 365, and Other Online Services' compliance with ISO22301 framework, together with the necessary collateral to interpret and present the certificate.
132
132
133
-
When you download one of these certification reports, you'll be shown the following privacy notice:
133
+
When you download one of these certification reports, you're shown the following privacy notice:
134
134
135
135
_By downloading this file, you are giving consent to Microsoft to store the current user and the selected subscriptions at the time of download. This data is used in order to notify you in case of changes or updates to the downloaded audit report. This data is used by Microsoft and the audit firms that produce the certification/reports only when notification is required._
136
136
137
137
### Check compliance offerings status
138
138
139
-
Transparency provided by the compliance offerings (currently in preview), allows you to view the certification status for each of the services provided by Microsoft prior to adding your product to the Azure platform.
139
+
Transparency provided by the compliance offerings (currently in preview), allows you to view the certification status for each of the services provided by Microsoft before adding your product to the Azure platform.
140
140
141
141
1. In the Defender for Cloud portal, open **Regulatory compliance**.
142
142
@@ -148,7 +148,7 @@ Transparency provided by the compliance offerings (currently in preview), allows
148
148
149
149
:::image type="content" source="media/regulatory-compliance-dashboard/search-service.png" alt-text="Screenshot of the compliance offering screen with the search bar highlighted." lightbox="media/regulatory-compliance-dashboard/search-service.png":::
150
150
151
-
## Continuously export compliance status
151
+
## Continuously export compliance status
152
152
153
153
If you want to track your compliance status with other monitoring tools in your environment, Defender for Cloud includes an export mechanism to make this straightforward. Configure **continuous export** to send select data to an Azure Event Hubs or a Log Analytics workspace. Learn more in [continuously export Defender for Cloud data](continuous-export.md).
154
154
@@ -169,7 +169,7 @@ Use continuous export data to an Azure Event Hubs or a Log Analytics workspace:
169
169
170
170
Defender for Cloud's workflow automation feature can trigger Logic Apps whenever one of your regulatory compliance assessments changes state.
171
171
172
-
For example, you might want Defender for Cloud to email a specific user when a compliance assessment fails. You'll need to first create the logic app (using [Azure Logic Apps](../logic-apps/logic-apps-overview.md)) and then set up the trigger in a new workflow automation as explained in [Automate responses to Defender for Cloud triggers](workflow-automation.md).
172
+
For example, you might want Defender for Cloud to email a specific user when a compliance assessment fails. You need to first create the logic app (using [Azure Logic Apps](../logic-apps/logic-apps-overview.md)) and then set up the trigger in a new workflow automation as explained in [Automate responses to Defender for Cloud triggers](workflow-automation.md).
173
173
174
174
:::image type="content" source="media/release-notes/regulatory-compliance-triggers-workflow-automation.png" alt-text="Screenshot that shows how to use changes to regulatory compliance assessments to trigger a workflow automation." lightbox="media/release-notes/regulatory-compliance-triggers-workflow-automation.png":::
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/review-exemptions.md
+7-9Lines changed: 7 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: dcurwin
7
7
ms.date: 11/22/2023
8
8
---
9
9
10
-
# Review resources exempted from recommendations
10
+
# Review resources exempted from recommendations
11
11
12
12
In Microsoft Defender for Cloud, you can [exempt protected resources from Defender for Cloud security recommendations](exempt-resource.md). This article describes how to review and work with exempted resources.
13
13
@@ -24,7 +24,7 @@ In Microsoft Defender for Cloud, you can [exempt protected resources from Defend
24
24
25
25
1. Select **Add filter** > **Is exempt**.
26
26
27
-
1. Select **All**, **Yes** or **No**.
27
+
1. Select **All**, **Yes** or **No**.
28
28
29
29
1. Select **Apply**.
30
30
@@ -34,9 +34,9 @@ In Microsoft Defender for Cloud, you can [exempt protected resources from Defend
34
34
35
35
1. For each resource, the **Reason** column shows why the resource is exempted. To modify the exemption settings for a resource, select the ellipsis in the resource > **Manage exemption**.
36
36
37
-
You can also find all resources that have been exempted from one or more recommendations on the Inventory page.
37
+
You can also find all resources that are exempted from one or more recommendations on the Inventory page.
38
38
39
-
**To review exempted resources on the Defender for Cloud's Inventory page**:
39
+
**To review exempted resources on the Defender for Cloud's Inventory page**:
40
40
41
41
1. Sign in to the [Azure portal](https://portal.azure.com/).
42
42
@@ -85,16 +85,14 @@ To view all recommendations that have exemption rules:
85
85
| where StatusDescription contains "Exempt"
86
86
```
87
87
88
-
89
88
## Get notified when exemptions are created
90
89
91
-
To keep track of how users are exempting resources from recommendations, we've created an Azure Resource Manager (ARM) template that deploys a Logic App Playbook, and all necessary API connections to notify you when an exemption has been created.
90
+
To keep track of how users are exempting resources from recommendations, we created an Azure Resource Manager (ARM) template that deploys a Logic App Playbook, and all necessary API connections to notify you when an exemption was created.
92
91
93
92
- Learn more about the playbook in TechCommunity blog [How to keep track of Resource Exemptions in Microsoft Defender for Cloud](https://techcommunity.microsoft.com/t5/azure-security-center/how-to-keep-track-of-resource-exemptions-in-azure-security/ba-p/1770580).
94
-
- Locate the ARM template in [Microsoft Defender for Cloud GitHub repository](https://github.com/Azure/Azure-Security-Center/tree/master/Workflow%20automation/Notify-ResourceExemption)
93
+
- Locate the ARM template in [Microsoft Defender for Cloud GitHub repository](https://github.com/Azure/Azure-Security-Center/tree/master/Workflow%20automation/Notify-ResourceExemption).
95
94
- [Use this automated process](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Security-Center%2Fmaster%2FWorkflow%2520automation%2FNotify-ResourceExemption%2Fazuredeploy.json) to deploy all components.
0 commit comments