Skip to content

Commit fb4dd4d

Browse files
authored
Merge pull request #241148 from MicrosoftDocs/main
Publish to live, Sunday 4:00PM PDT, 6/11
2 parents 5ec15ce + 9e4db2f commit fb4dd4d

File tree

17 files changed

+505
-327
lines changed

17 files changed

+505
-327
lines changed

articles/active-directory/authentication/how-to-mfa-registration-campaign.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: ignite-2022
99
ms.topic: conceptual
10-
ms.date: 01/05/2023
10+
ms.date: 06/10/2023
1111

1212
ms.author: justinha
1313
author: mjsantani
@@ -23,6 +23,9 @@ You can nudge users to set up Microsoft Authenticator during sign-in. Users will
2323

2424
In addition to choosing who can be nudged, you can define how many days a user can postpone, or "snooze", the nudge. If a user taps **Not now** to snooze the app setup, they'll be nudged again on the next MFA attempt after the snooze duration has elapsed.
2525

26+
>[!NOTE]
27+
>As users go through their regular sign-in, Conditional Access policies that govern security info registration apply before the user is prompted to set up Authenticator. For example, if a Conditional Access policy requires security info updates can only occur on an internal network, then users won't be prompted to set up Authenticator unless they are on the internal network.
28+
2629
## Prerequisites
2730

2831
- Your organization must have enabled Azure AD Multi-Factor Authentication. Every edition of Azure AD includes Azure AD Multi-Factor Authentication. No additional license is needed for a registration campaign.

articles/azure-monitor/logs/customer-managed-keys.md

Lines changed: 28 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ title: Azure Monitor customer-managed key
33
description: Information and steps to configure Customer-managed key to encrypt data in your Log Analytics workspaces using an Azure Key Vault key.
44
ms.topic: conceptual
55
ms.reviewer: yossiy
6-
ms.date: 05/01/2022
6+
ms.date: 06/01/2023
77
ms.custom: devx-track-azurepowershell, devx-track-azurecli
88

99
---
1010

1111
# Azure Monitor customer-managed key
1212

13-
Data in Azure Monitor is encrypted with Microsoft-managed keys. You can use your own encryption key to protect the data and saved queries in your workspaces. Customer-managed keys in Azure Monitor gives you greater flexibility to manage access controls to logs. Once configure, new data for linked workspaces is encrypted with your key stored in [Azure Key Vault](../../key-vault/general/overview.md), or [Azure Key Vault Managed "HSM"](../../key-vault/managed-hsm/overview.md).
13+
Data in Azure Monitor is encrypted with Microsoft-managed keys. You can use your own encryption key to protect the data and saved queries in your workspaces. Customer-managed keys in Azure Monitor give you greater flexibility to manage access controls to logs. Once configure, new data for linked workspaces is encrypted with your key stored in [Azure Key Vault](../../key-vault/general/overview.md), or [Azure Key Vault Managed "HSM"](../../key-vault/managed-hsm/overview.md).
1414

1515
We recommend you review [Limitations and constraints](#limitationsandconstraints) below before configuration.
1616

@@ -77,7 +77,7 @@ Customer-managed key configuration isn't supported in Azure portal currently and
7777

7878
A [portfolio of Azure Key Management products](../../key-vault/managed-hsm/mhsm-control-data.md#portfolio-of-azure-key-management-products) lists the vaults and managed HSMs that can be used.
7979

80-
Create or use an existing Azure Key Vault in the region that the cluster is planed, and generate or import a key to be used for logs encryption. The Azure Key Vault must be configured as recoverable, to protect your key and the access to your data in Azure Monitor. You can verify this configuration under properties in your Key Vault, both *Soft delete* and *Purge protection* should be enabled.
80+
Create or use an existing Azure Key Vault in the region that the cluster is planed, and generate or import a key to be used for logs encryption. The Azure Key Vault must be configured as recoverable, to protect your key and the access to your data in Azure Monitor. You can verify this configuration under properties in your Key Vault, both **Soft delete** and **Purge protection** should be enabled.
8181

8282
[![Soft delete and purge protection settings](media/customer-managed-keys/soft-purge-protection.png "Screenshot of Key Vault soft delete and purge protection properties")](media/customer-managed-keys/soft-purge-protection.png#lightbox)
8383

@@ -88,7 +88,7 @@ These settings can be updated in Key Vault via CLI and PowerShell:
8888

8989
## Create cluster
9090

91-
Clusters uses managed identity for data encryption with your Key Vault. Configure identity `type` property to `SystemAssigned` when creating your cluster to allow access to your Key Vault for "wrap" and "unwrap" operations.
91+
Clusters use managed identity for data encryption with your Key Vault. Configure identity `type` property to `SystemAssigned` when creating your cluster to allow access to your Key Vault for "wrap" and "unwrap" operations.
9292

9393
Identity settings in cluster for System-assigned managed identity
9494
```json
@@ -103,23 +103,28 @@ Follow the procedure illustrated in [Dedicated Clusters article](./logs-dedicate
103103

104104
## Grant Key Vault permissions
105105

106-
There are two permission models in Key Vault to grant permissions to your cluster and underlay storage——Vault access policy, and Azure role-based access control.
106+
There are two permission models in Key Vault to grant access to your cluster and underlay storage—Azure role-based access control (Azure RBAC), and Vault access policies (legacy).
107107

108-
1. Vault access policy
108+
1. Assign Azure RBAC you control (recommended)
109+
110+
To add role assignments, you must have Microsoft.Authorization/roleAssignments/write and Microsoft.Authorization/roleAssignments/delete permissions, such as [User Access Administrator](../../role-based-access-control/built-in-roles.md#user-access-administrator) or [Owner](../../role-based-access-control/built-in-roles.md#owner).
109111

110-
Open your Key Vault in Azure portal and click *Access Policies*, select *Vault access policy*, then click *+ Add Access Policy* to create a policy with these settings:
112+
Open your Key Vault in Azure portal, **click Access configuration** in **Settings**, and select **Azure role-based access control** option. Then enter **Access control (IAM)** and add **Key Vault Crypto Service Encryption User** role assignment.
111113

112-
- Key permissions—select *Get*, *Wrap Key* and *Unwrap Key*.
114+
[<img src="media/customer-managed-keys/grant-key-vault-permissions-rbac-8bit.png" alt="Screenshot of Grant Key Vault RBAC permissions." title="Grant Key Vault RBAC permissions" width="80%"/>](media/customer-managed-keys/grant-key-vault-permissions-rbac-8bit.png#lightbox)
115+
116+
1. Assign vault access policy (legacy)
117+
118+
Open your Key Vault in Azure portal and click **Access Policies**, select **Vault access policy**, then click **+ Add Access Policy** to create a policy with these settings:
119+
120+
- Key permissions—select **Get**, **Wrap Key** and **Unwrap Key**.
113121
- Select principal—depending on the identity type used in the cluster (system or user assigned managed identity)
114122
- System assigned managed identity - enter the cluster name or cluster principal ID
115123
- User assigned managed identity - enter the identity name
116124

117-
[![grant Key Vault permissions](media/customer-managed-keys/grant-key-vault-permissions-8bit.png "Screenshot of Key Vault access policy permissions")](media/customer-managed-keys/grant-key-vault-permissions-8bit.png#lightbox)
118-
119-
The *Get* permission is required to verify that your Key Vault is configured as recoverable to protect your key and the access to your Azure Monitor data.
125+
[<img src="media/customer-managed-keys/grant-key-vault-permissions-8bit.png" alt="Screenshot of Grant Key Vault access policy permissions." title="Grant Key Vault access policy permissions" width="80%"/>](media/customer-managed-keys/grant-key-vault-permissions-8bit.png#lightbox)
120126

121-
2. Azure role-based access control
122-
Open your Key Vault in Azure portal and click *Access Policies*, select *Azure role-based access control*, then enter *Access control (IAM)* and add *Key Vault Crypto Service Encryption User* role assignment.
127+
The **Get** permission is required to verify that your Key Vault is configured as recoverable to protect your key and the access to your Azure Monitor data.
123128

124129
## Update cluster with key identifier details
125130

@@ -187,7 +192,7 @@ Content-type: application/json
187192

188193
**Response**
189194

190-
It takes the propagation of the key a while to complete. You can check the update state by sending GET request on the cluster and look at the *KeyVaultProperties* properties. Your recently updated key should return in the response.
195+
It takes the propagation of the key a while to complete. You can check the update state by sending GET request on the cluster and look at the **KeyVaultProperties** properties. Your recently updated key should return in the response.
191196

192197
Response to GET request when key update is completed:
193198
202 (Accepted) and header
@@ -256,25 +261,25 @@ All your data remains accessible after the key rotation operation. Data always e
256261

257262
## Customer-managed key for saved queries and log alerts
258263

259-
The query language used in Log Analytics is expressive and can contain sensitive information in comments, or in the query syntax. Some organizations require that such information is kept protected under Customer-managed key policy and you need save your queries encrypted with your key. Azure Monitor enables you to store *saved-searches* and *log alerts* queries encrypted with your key in your own Storage Account when connected to your workspace.
264+
The query language used in Log Analytics is expressive and can contain sensitive information in comments, or in the query syntax. Some organizations require that such information is kept protected under Customer-managed key policy and you need save your queries encrypted with your key. Azure Monitor enables you to store saved queries and log alerts encrypted with your key in your own Storage Account when linked to your workspace.
260265

261266
> [!NOTE]
262-
> Log Analytics queries can be saved in various stores depending on the scenario used. Queries remain encrypted with Microsoft key ("MMK") in the following scenarios regardless Customer-managed key configuration: Workbooks in Azure Monitor, Azure dashboards, Azure Logic App, Azure Notebooks and Automation Runbooks.
267+
> Queries remain encrypted with Microsoft key ("MMK") in the following scenarios regardless Customer-managed key configuration: Workbooks in Azure Monitor, Azure dashboards, Azure Logic App, Azure Notebooks and Automation Runbooks.
263268
264-
When linking your own storage (BYOS) to workspace, the service stores *saved-searches* and *log alerts* queries to your Storage Account. With the control on Storage Account and the [encryption-at-rest policy](../../storage/common/customer-managed-keys-overview.md), you can protect *saved-searches* and *log alerts* with Customer-managed key. You will, however, be responsible for the costs associated with that Storage Account.
269+
When linking your Storage Account for saved queries, the service stores saved-queries and log alerts queries in your Storage Account. Having control on your Storage Account [encryption-at-rest policy](../../storage/common/customer-managed-keys-overview.md), you can protect saved queries and log alerts with Customer-managed key. You will, however, be responsible for the costs associated with that Storage Account.
265270

266271
**Considerations before setting Customer-managed key for queries**
267272
* You need to have "write" permissions on your workspace and Storage Account.
268273
* Make sure to create your Storage Account in the same region as your Log Analytics workspace is located.
269-
* The *saves searches* in storage is considered as service artifacts and their format may change.
270-
* Existing *saves searches* are removed from your workspace. Copy any *saves searches* that you need before this configuration. You can view your *saved-searches* using [PowerShell](/powershell/module/az.operationalinsights/get-azoperationalinsightssavedsearch).
274+
* The saves queries in storage is considered as service artifacts and their format may change.
275+
* Linking a Storage Account for queries removed existing saves queries from your workspace. Copy saves queries that you need before this configuration. You can view your saved queries using [PowerShell](/powershell/module/az.operationalinsights/get-azoperationalinsightssavedsearch).
271276
* Query 'history' and 'pin to dashboard' aren't supported when linking Storage Account for queries.
272-
* You can link a single Storage Account to a workspace, which can be used for both *saved-searches* and *log alerts* queries.
277+
* You can link a single Storage Account to a workspace, which can be used for both saved queries and log alerts queries.
273278
* Fired log alerts will not contain search results or alert query. You can use [alert dimensions](../alerts/alerts-unified-log.md#split-by-alert-dimensions) to get context in the fired alerts.
274279

275-
**Configure BYOS for saved-searches queries**
280+
**Configure BYOS for saved queries**
276281

277-
Link a Storage Account for *Query* to keep *saved-searches* queries in your Storage Account.
282+
Link a Storage Account for queries to keep saved queries in your Storage Account.
278283

279284
# [Azure portal](#tab/portal)
280285

@@ -416,7 +421,7 @@ Customer-Managed key is provided on dedicated cluster and these operations are r
416421

417422
- [Double encryption](../../storage/common/storage-service-encryption.md#doubly-encrypt-data-with-infrastructure-encryption) is configured automatically for clusters created from October 2020 in supported regions. You can verify if your cluster is configured for double encryption by sending a GET request on the cluster and observing that the `isDoubleEncryptionEnabled` value is `true` for clusters with Double encryption enabled.
418423
- If you create a cluster and get an error—"region-name doesn’t support Double Encryption for clusters", you can still create the cluster without Double encryption, by adding `"properties": {"isDoubleEncryptionEnabled": false}` in the REST request body.
419-
- Double encryption settings can not be changed after the cluster has been created.
424+
- Double encryption settings cannot be changed after the cluster has been created.
420425

421426
Deleting a linked workspace is permitted while linked to cluster. If you decide to [recover](./delete-workspace.md#recover-a-workspace) the workspace during the [soft-delete](./delete-workspace.md#soft-delete-behavior) period, it returns to previous state and remains linked to cluster.
422427

articles/azure-monitor/logs/logs-data-export.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ A data export rule defines the destination and tables for which data is exported
172172

173173
1. Follow the steps, and then select **Create**.
174174

175-
<img src="media/logs-data-export/export-create-2.png" alt="Screenshot of data export rule configuration." title="Export rule configuration" width="80%"/>
175+
[<img src="media/logs-data-export/export-create-2.png" alt="Screenshot of export rule configuration." title="Export rule configuration" width="80%"/>](media/logs-data-export/export-create-2.png#lightbox)
176176

177177
# [PowerShell](#tab/powershell)
178178

@@ -791,7 +791,7 @@ If the data export rule includes an unsupported table, the configuration will su
791791
| ASCDeviceEvents | |
792792
| ASimDnsActivityLogs | |
793793
| ASimNetworkSessionLogs | |
794-
| ASimNetworkSessionLogs,ASimWebSessionLogs | |
794+
| ASimNetworkSessionLogs, ASimWebSessionLogs | |
795795
| ASimWebSessionLogs | |
796796
| ATCExpressRouteCircuitIpfix | |
797797
| AuditLogs | |
538 KB
Loading

articles/defender-for-cloud/multi-factor-authentication-enforcement.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Microsoft Defender for Cloud's security recommendations for MFA
33
description: Learn how to enforce multi-factor authentication for your Azure subscriptions using Microsoft Defender for Cloud
44
ms.topic: conceptual
5-
ms.date: 01/24/2023
5+
ms.date: 06/11/2023
66
---
77

88
# Manage multi-factor authentication (MFA) enforcement on your subscriptions
@@ -18,8 +18,9 @@ Defender for Cloud places a high value on MFA. The security control that contrib
1818

1919
The recommendations in the Enable MFA control ensure you're meeting the recommended practices for users of your subscriptions:
2020

21-
- MFA should be enabled on accounts with owner permissions on your subscription
22-
- MFA should be enabled on accounts with write permissions on your subscription
21+
- Accounts with owner permissions on Azure resources should be MFA enabled
22+
- Accounts with write permissions on Azure resources should be MFA enabled
23+
- Accounts with read permissions on Azure resources should be MFA enabled
2324

2425
There are three ways to enable MFA and be compliant with the two recommendations in Defender for Cloud: security defaults, per-user assignment, conditional access (CA) policy.
2526

articles/defender-for-cloud/release-notes.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Release notes for Microsoft Defender for Cloud
33
description: This page is updated frequently with the latest updates in Defender for Cloud.
44
ms.topic: overview
5-
ms.date: 06/07/2023
5+
ms.date: 06/11/2023
66
---
77

88
# What's new in Microsoft Defender for Cloud?
@@ -26,11 +26,18 @@ Updates in June include:
2626

2727
|Date |Update |
2828
|---------|---------|
29-
| June 7 | [Express configuration for vulnerability assessments in Defender for SQL is now Generally Available](#express-configuration-for-vulnerability-assessments-in-defender-for-sql-is-now-generally-available) |
29+
|June 11 | [Planning of cloud migration with an Azure Migrate business case now includes Defender for Cloud](#planning-of-cloud-migration-with-an-azure-migrate-business-case-now-includes-defender-for-cloud) |
30+
|June 7 | [Express configuration for vulnerability assessments in Defender for SQL is now Generally Available](#express-configuration-for-vulnerability-assessments-in-defender-for-sql-is-now-generally-available) |
3031
|June 6 | [More scopes added to existing Azure DevOps Connectors](#more-scopes-added-to-existing-azure-devops-connectors) |
3132
|June 5 | [Onboarding directly (without Azure Arc) to Defender for Servers is now Generally Available](#onboarding-directly-without-azure-arc-to-defender-for-servers-is-now-generally-available) |
3233
|June 4 | [Replacing agent-based discovery with agentless discovery for containers capabilities in Defender CSPM](#replacing-agent-based-discovery-with-agentless-discovery-for-containers-capabilities-in-defender-cspm) |
3334

35+
### Planning of cloud migration with an Azure Migrate business case now includes Defender for Cloud
36+
37+
June 11, 2023
38+
39+
Now you can discover potential cost savings in security by leveraging Defender for Cloud within the context of an [Azure Migrate business case](/azure/migrate/how-to-build-a-business-case).
40+
3441
### Express configuration for vulnerability assessments in Defender for SQL is now Generally Available
3542

3643
June 7, 2023

0 commit comments

Comments
 (0)