Skip to content

Commit fcbec5e

Browse files
Merge pull request #231014 from memildin/patch-68
Wrong names for our own products
2 parents 21be888 + 313c20b commit fcbec5e

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/defender-for-cloud/upcoming-changes.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ If you're looking for the latest release notes, you'll find them in the [What's
1919
| Planned change | Estimated date for change |
2020
|--|--|
2121
| [Changes in the recommendation "Machines should be configured securely"](#changes-in-the-recommendation-machines-should-be-configured-securely) | March 2023 |
22-
| [Three alerts in Defender for Azure Resource Manager plan will be deprecated](#three-alerts-in-defender-for-azure-resource-manager-plan-will-be-deprecated) | March 2023 |
22+
| [Three alerts in the Defender for Resource Manager plan will be deprecated](#three-alerts-in-the-defender-for-resource-manager-plan-will-be-deprecated) | March 2023 |
2323
| [Alerts automatic export to Log Analytics workspace will be deprecated](#alerts-automatic-export-to-log-analytics-workspace-will-be-deprecated) | March 2023 |
2424
| [Deprecation and improvement of selected alerts for Windows and Linux Servers](#deprecation-and-improvement-of-selected-alerts-for-windows-and-linux-servers) | April 2023 |
2525
| [Deprecation of App Service language monitoring policies](#deprecation-of-app-service-language-monitoring-policies) | April 2023 |
@@ -29,31 +29,31 @@ If you're looking for the latest release notes, you'll find them in the [What's
2929

3030
**Estimated date for change: March 2023**
3131

32-
The recommendation `Machines should be configured securely` is set to be updated. This update will improve the performance and stability of the recommendation and align its experience with the generic behavior of Defender for Cloud's recommendations.
32+
The recommendation `Machines should be configured securely` will be updated. The update will improve the performance and stability of the recommendation and align its experience with the generic behavior of Defender for Cloud's recommendations.
3333

3434
As part of this update, the recommendation's ID will be changed from `181ac480-f7c4-544b-9865-11b8ffe87f47` to `c476dc48-8110-4139-91af-c8d940896b98`.
3535

3636
No action is required on the customer side, and there's no expected downtime nor impact on the secure score.
3737

3838

39-
### Three alerts in Defender for Azure Resource Manager plan will be deprecated
39+
### Three alerts in the Defender for Resource Manager plan will be deprecated
4040

4141
**Estimated date for change: March 2023**
4242

43-
As we continue to improve the quality of our alerts, the following three alerts from the Defender for Azure Resource Manager plan will be deprecated:
43+
As we continue to improve the quality of our alerts, the following three alerts from the Defender for Resource Manager plan will be deprecated:
4444
1. `Activity from a risky IP address (ARM.MCAS_ActivityFromAnonymousIPAddresses)`
4545
1. `Activity from infrequent country (ARM.MCAS_ActivityFromInfrequentCountry)`
4646
1. `Impossible travel activity (ARM.MCAS_ImpossibleTravelActivity)`
4747

4848
You can learn more details about each of these alerts from the [alerts reference list](alerts-reference.md#alerts-resourcemanager).
4949

50-
In the scenario where an activity from a suspicious IP address is detected, one of the following Defenders for Azure Resource Manager plan alerts `Azure Resource Manager operation from suspicious IP address` or `Azure Resource Manager operation from suspicious proxy IP address` will be present.
50+
In the scenario where an activity from a suspicious IP address is detected, one of the following Defenders for Resource Manager plan alerts `Azure Resource Manager operation from suspicious IP address` or `Azure Resource Manager operation from suspicious proxy IP address` will be present.
5151

5252
### Alerts automatic export to Log Analytics workspace will be deprecated
5353

5454
**Estimated date for change: March 2023**
5555

56-
Currently, Defenders for Cloud security alerts are automatically exported to a default Log Analytics workspace on the resource level. This causes an indeterministic behavior and therefore, this feature is set to be deprecated.
56+
Currently, Defender for Cloud security alerts are automatically exported to a default Log Analytics workspace on the resource level. This causes an indeterministic behavior and therefore, this feature is set to be deprecated.
5757

5858
You can export your security alerts to a dedicated Log Analytics workspace with the [Continuous Export](continuous-export.md#set-up-a-continuous-export) feature.
5959
If you have already configured continuous export of your alerts to a Log Analytics workspace, no further action is required.
@@ -68,7 +68,7 @@ If you already have the Defender for Endpoint integration enabled, no further ac
6868

6969
If you don't have the Defender for Endpoint integration enabled in Defender for Servers, you'll need to enable the Defender for Endpoint integration to maintain and improve your alert coverage.
7070

71-
All Defender for Server customers, have full access to the Defender for Endpoint’s integration as a part of the [Defender for Servers plan](plan-defender-for-servers-select-plan.md#plan-features).
71+
All Defender for Servers customers, have full access to the Defender for Endpoint’s integration as a part of the [Defender for Servers plan](plan-defender-for-servers-select-plan.md#plan-features).
7272

7373
You can learn more about [Microsoft Defender for Endpoint onboarding options](integration-defender-for-endpoint.md#enable-the-microsoft-defender-for-endpoint-integration).
7474

@@ -90,7 +90,7 @@ The following App Service language monitoring policies are set to be deprecated
9090

9191
Customers can use alternative built-in policies to monitor any specified language version for their App Services.
9292

93-
Defender for Cloud won't include these recommendations as built-in recommendations. You can add them as custom recommendations to have Defender for Cloud monitor them.
93+
These will no longer be in Defender for Cloud's built-in recommendations. You can add them as custom recommendations to have Defender for Cloud monitor them.
9494

9595
### Multiple changes to identity recommendations
9696

0 commit comments

Comments
 (0)