You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-mfa-registration-campaign.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.custom: ignite-2022
9
9
ms.topic: conceptual
10
-
ms.date: 01/05/2023
10
+
ms.date: 06/10/2023
11
11
12
12
ms.author: justinha
13
13
author: mjsantani
@@ -23,6 +23,9 @@ You can nudge users to set up Microsoft Authenticator during sign-in. Users will
23
23
24
24
In addition to choosing who can be nudged, you can define how many days a user can postpone, or "snooze", the nudge. If a user taps **Not now** to snooze the app setup, they'll be nudged again on the next MFA attempt after the snooze duration has elapsed.
25
25
26
+
>[!NOTE]
27
+
>As users go through their regular sign-in, Conditional Access policies that govern security info registration apply before the user is prompted to set up Authenticator. For example, if a Conditional Access policy requires security info updates can only occur on an internal network, then users won't be prompted to set up Authenticator unless they are on the internal network.
28
+
26
29
## Prerequisites
27
30
28
31
- Your organization must have enabled Azure AD Multi-Factor Authentication. Every edition of Azure AD includes Azure AD Multi-Factor Authentication. No additional license is needed for a registration campaign.
Data in Azure Monitor is encrypted with Microsoft-managed keys. You can use your own encryption key to protect the data and saved queries in your workspaces. Customer-managed keys in Azure Monitor gives you greater flexibility to manage access controls to logs. Once configure, new data for linked workspaces is encrypted with your key stored in [Azure Key Vault](../../key-vault/general/overview.md), or [Azure Key Vault Managed "HSM"](../../key-vault/managed-hsm/overview.md).
13
+
Data in Azure Monitor is encrypted with Microsoft-managed keys. You can use your own encryption key to protect the data and saved queries in your workspaces. Customer-managed keys in Azure Monitor give you greater flexibility to manage access controls to logs. Once configure, new data for linked workspaces is encrypted with your key stored in [Azure Key Vault](../../key-vault/general/overview.md), or [Azure Key Vault Managed "HSM"](../../key-vault/managed-hsm/overview.md).
14
14
15
15
We recommend you review [Limitations and constraints](#limitationsandconstraints) below before configuration.
16
16
@@ -77,7 +77,7 @@ Customer-managed key configuration isn't supported in Azure portal currently and
77
77
78
78
A [portfolio of Azure Key Management products](../../key-vault/managed-hsm/mhsm-control-data.md#portfolio-of-azure-key-management-products) lists the vaults and managed HSMs that can be used.
79
79
80
-
Create or use an existing Azure Key Vault in the region that the cluster is planed, and generate or import a key to be used for logs encryption. The Azure Key Vault must be configured as recoverable, to protect your key and the access to your data in Azure Monitor. You can verify this configuration under properties in your Key Vault, both *Soft delete* and *Purge protection* should be enabled.
80
+
Create or use an existing Azure Key Vault in the region that the cluster is planed, and generate or import a key to be used for logs encryption. The Azure Key Vault must be configured as recoverable, to protect your key and the access to your data in Azure Monitor. You can verify this configuration under properties in your Key Vault, both **Soft delete** and **Purge protection** should be enabled.
81
81
82
82
[](media/customer-managed-keys/soft-purge-protection.png#lightbox)
83
83
@@ -88,7 +88,7 @@ These settings can be updated in Key Vault via CLI and PowerShell:
88
88
89
89
## Create cluster
90
90
91
-
Clusters uses managed identity for data encryption with your Key Vault. Configure identity `type` property to `SystemAssigned` when creating your cluster to allow access to your Key Vault for "wrap" and "unwrap" operations.
91
+
Clusters use managed identity for data encryption with your Key Vault. Configure identity `type` property to `SystemAssigned` when creating your cluster to allow access to your Key Vault for "wrap" and "unwrap" operations.
92
92
93
93
Identity settings in cluster for System-assigned managed identity
94
94
```json
@@ -103,23 +103,28 @@ Follow the procedure illustrated in [Dedicated Clusters article](./logs-dedicate
103
103
104
104
## Grant Key Vault permissions
105
105
106
-
There are two permission models in Key Vault to grant permissions to your cluster and underlay storage——Vault access policy, and Azure role-based access control.
106
+
There are two permission models in Key Vault to grant access to your cluster and underlay storage—Azure role-based access control (Azure RBAC), and Vault access policies (legacy).
107
107
108
-
1. Vault access policy
108
+
1. Assign Azure RBAC you control (recommended)
109
+
110
+
To add role assignments, you must have Microsoft.Authorization/roleAssignments/write and Microsoft.Authorization/roleAssignments/delete permissions, such as [User Access Administrator](../../role-based-access-control/built-in-roles.md#user-access-administrator) or [Owner](../../role-based-access-control/built-in-roles.md#owner).
109
111
110
-
Open your Key Vault in Azure portal and click *Access Policies*, select *Vault access policy*, then click *+ Add Access Policy* to create a policy with these settings:
112
+
Open your Key Vault in Azure portal, **click Access configuration** in **Settings**, and select **Azure role-based access control** option. Then enter **Access control (IAM)** and add **Key Vault Crypto Service Encryption User** role assignment.
111
113
112
-
- Key permissions—select *Get*, *Wrap Key* and *Unwrap Key*.
114
+
[<imgsrc="media/customer-managed-keys/grant-key-vault-permissions-rbac-8bit.png"alt="Screenshot of Grant Key Vault RBAC permissions."title="Grant Key Vault RBAC permissions"width="80%"/>](media/customer-managed-keys/grant-key-vault-permissions-rbac-8bit.png#lightbox)
115
+
116
+
1. Assign vault access policy (legacy)
117
+
118
+
Open your Key Vault in Azure portal and click **Access Policies**, select **Vault access policy**, then click **+ Add Access Policy** to create a policy with these settings:
119
+
120
+
- Key permissions—select **Get**, **Wrap Key** and **Unwrap Key**.
113
121
- Select principal—depending on the identity type used in the cluster (system or user assigned managed identity)
114
122
- System assigned managed identity - enter the cluster name or cluster principal ID
115
123
- User assigned managed identity - enter the identity name
116
124
117
-
[](media/customer-managed-keys/grant-key-vault-permissions-8bit.png#lightbox)
118
-
119
-
The *Get* permission is required to verify that your Key Vault is configured as recoverable to protect your key and the access to your Azure Monitor data.
125
+
[<imgsrc="media/customer-managed-keys/grant-key-vault-permissions-8bit.png"alt="Screenshot of Grant Key Vault access policy permissions."title="Grant Key Vault access policy permissions"width="80%"/>](media/customer-managed-keys/grant-key-vault-permissions-8bit.png#lightbox)
120
126
121
-
2. Azure role-based access control
122
-
Open your Key Vault in Azure portal and click *Access Policies*, select *Azure role-based access control*, then enter *Access control (IAM)* and add *Key Vault Crypto Service Encryption User* role assignment.
127
+
The **Get** permission is required to verify that your Key Vault is configured as recoverable to protect your key and the access to your Azure Monitor data.
It takes the propagation of the key a while to complete. You can check the update state by sending GET request on the cluster and look at the *KeyVaultProperties* properties. Your recently updated key should return in the response.
195
+
It takes the propagation of the key a while to complete. You can check the update state by sending GET request on the cluster and look at the **KeyVaultProperties** properties. Your recently updated key should return in the response.
191
196
192
197
Response to GET request when key update is completed:
193
198
202 (Accepted) and header
@@ -256,25 +261,25 @@ All your data remains accessible after the key rotation operation. Data always e
256
261
257
262
## Customer-managed key for saved queries and log alerts
258
263
259
-
The query language used in Log Analytics is expressive and can contain sensitive information in comments, or in the query syntax. Some organizations require that such information is kept protected under Customer-managed key policy and you need save your queries encrypted with your key. Azure Monitor enables you to store *saved-searches*and *log alerts* queries encrypted with your key in your own Storage Account when connected to your workspace.
264
+
The query language used in Log Analytics is expressive and can contain sensitive information in comments, or in the query syntax. Some organizations require that such information is kept protected under Customer-managed key policy and you need save your queries encrypted with your key. Azure Monitor enables you to store saved queries and log alertsencrypted with your key in your own Storage Account when linked to your workspace.
260
265
261
266
> [!NOTE]
262
-
> Log Analytics queries can be saved in various stores depending on the scenario used. Queries remain encrypted with Microsoft key ("MMK") in the following scenarios regardless Customer-managed key configuration: Workbooks in Azure Monitor, Azure dashboards, Azure Logic App, Azure Notebooks and Automation Runbooks.
267
+
> Queries remain encrypted with Microsoft key ("MMK") in the following scenarios regardless Customer-managed key configuration: Workbooks in Azure Monitor, Azure dashboards, Azure Logic App, Azure Notebooks and Automation Runbooks.
263
268
264
-
When linking your own storage (BYOS) to workspace, the service stores *saved-searches* and *log alerts* queries to your Storage Account. With the control on Storage Account and the [encryption-at-rest policy](../../storage/common/customer-managed-keys-overview.md), you can protect *saved-searches*and *log alerts* with Customer-managed key. You will, however, be responsible for the costs associated with that Storage Account.
269
+
When linking your Storage Account for saved queries, the service stores saved-queries and log alerts queries in your Storage Account. Having control on your Storage Account [encryption-at-rest policy](../../storage/common/customer-managed-keys-overview.md), you can protect saved queries and log alerts with Customer-managed key. You will, however, be responsible for the costs associated with that Storage Account.
265
270
266
271
**Considerations before setting Customer-managed key for queries**
267
272
* You need to have "write" permissions on your workspace and Storage Account.
268
273
* Make sure to create your Storage Account in the same region as your Log Analytics workspace is located.
269
-
* The *saves searches* in storage is considered as service artifacts and their format may change.
270
-
*Existing *saves searches* are removed from your workspace. Copy any *saves searches* that you need before this configuration. You can view your *saved-searches* using [PowerShell](/powershell/module/az.operationalinsights/get-azoperationalinsightssavedsearch).
274
+
* The saves queries in storage is considered as service artifacts and their format may change.
275
+
*Linking a Storage Account for queries removed existing saves queries from your workspace. Copy saves queries that you need before this configuration. You can view your saved queries using [PowerShell](/powershell/module/az.operationalinsights/get-azoperationalinsightssavedsearch).
271
276
* Query 'history' and 'pin to dashboard' aren't supported when linking Storage Account for queries.
272
-
* You can link a single Storage Account to a workspace, which can be used for both *saved-searches*and *log alerts* queries.
277
+
* You can link a single Storage Account to a workspace, which can be used for both saved queries and log alerts queries.
273
278
* Fired log alerts will not contain search results or alert query. You can use [alert dimensions](../alerts/alerts-unified-log.md#split-by-alert-dimensions) to get context in the fired alerts.
274
279
275
-
**Configure BYOS for saved-searches queries**
280
+
**Configure BYOS for saved queries**
276
281
277
-
Link a Storage Account for *Query* to keep *saved-searches* queries in your Storage Account.
282
+
Link a Storage Account for queries to keep saved queries in your Storage Account.
278
283
279
284
# [Azure portal](#tab/portal)
280
285
@@ -416,7 +421,7 @@ Customer-Managed key is provided on dedicated cluster and these operations are r
416
421
417
422
-[Double encryption](../../storage/common/storage-service-encryption.md#doubly-encrypt-data-with-infrastructure-encryption) is configured automatically for clusters created from October 2020 in supported regions. You can verify if your cluster is configured for double encryption by sending a GET request on the cluster and observing that the `isDoubleEncryptionEnabled` value is `true` for clusters with Double encryption enabled.
418
423
- If you create a cluster and get an error—"region-name doesn’t support Double Encryption for clusters", you can still create the cluster without Double encryption, by adding `"properties": {"isDoubleEncryptionEnabled": false}` in the REST request body.
419
-
- Double encryption settings can not be changed after the cluster has been created.
424
+
- Double encryption settings cannot be changed after the cluster has been created.
420
425
421
426
Deleting a linked workspace is permitted while linked to cluster. If you decide to [recover](./delete-workspace.md#recover-a-workspace) the workspace during the [soft-delete](./delete-workspace.md#soft-delete-behavior) period, it returns to previous state and remains linked to cluster.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/multi-factor-authentication-enforcement.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Microsoft Defender for Cloud's security recommendations for MFA
3
3
description: Learn how to enforce multi-factor authentication for your Azure subscriptions using Microsoft Defender for Cloud
4
4
ms.topic: conceptual
5
-
ms.date: 01/24/2023
5
+
ms.date: 06/11/2023
6
6
---
7
7
8
8
# Manage multi-factor authentication (MFA) enforcement on your subscriptions
@@ -18,8 +18,9 @@ Defender for Cloud places a high value on MFA. The security control that contrib
18
18
19
19
The recommendations in the Enable MFA control ensure you're meeting the recommended practices for users of your subscriptions:
20
20
21
-
- MFA should be enabled on accounts with owner permissions on your subscription
22
-
- MFA should be enabled on accounts with write permissions on your subscription
21
+
- Accounts with owner permissions on Azure resources should be MFA enabled
22
+
- Accounts with write permissions on Azure resources should be MFA enabled
23
+
- Accounts with read permissions on Azure resources should be MFA enabled
23
24
24
25
There are three ways to enable MFA and be compliant with the two recommendations in Defender for Cloud: security defaults, per-user assignment, conditional access (CA) policy.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/release-notes.md
+9-2Lines changed: 9 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Release notes for Microsoft Defender for Cloud
3
3
description: This page is updated frequently with the latest updates in Defender for Cloud.
4
4
ms.topic: overview
5
-
ms.date: 06/07/2023
5
+
ms.date: 06/11/2023
6
6
---
7
7
8
8
# What's new in Microsoft Defender for Cloud?
@@ -26,11 +26,18 @@ Updates in June include:
26
26
27
27
|Date |Update |
28
28
|---------|---------|
29
-
| June 7 |[Express configuration for vulnerability assessments in Defender for SQL is now Generally Available](#express-configuration-for-vulnerability-assessments-in-defender-for-sql-is-now-generally-available)|
29
+
|June 11 |[Planning of cloud migration with an Azure Migrate business case now includes Defender for Cloud](#planning-of-cloud-migration-with-an-azure-migrate-business-case-now-includes-defender-for-cloud)|
30
+
|June 7 |[Express configuration for vulnerability assessments in Defender for SQL is now Generally Available](#express-configuration-for-vulnerability-assessments-in-defender-for-sql-is-now-generally-available)|
30
31
|June 6 |[More scopes added to existing Azure DevOps Connectors](#more-scopes-added-to-existing-azure-devops-connectors)|
31
32
|June 5 |[Onboarding directly (without Azure Arc) to Defender for Servers is now Generally Available](#onboarding-directly-without-azure-arc-to-defender-for-servers-is-now-generally-available)|
32
33
|June 4 |[Replacing agent-based discovery with agentless discovery for containers capabilities in Defender CSPM](#replacing-agent-based-discovery-with-agentless-discovery-for-containers-capabilities-in-defender-cspm)|
33
34
35
+
### Planning of cloud migration with an Azure Migrate business case now includes Defender for Cloud
36
+
37
+
June 11, 2023
38
+
39
+
Now you can discover potential cost savings in security by leveraging Defender for Cloud within the context of an [Azure Migrate business case](/azure/migrate/how-to-build-a-business-case).
40
+
34
41
### Express configuration for vulnerability assessments in Defender for SQL is now Generally Available
0 commit comments