Skip to content

Commit fd335a2

Browse files
Merge pull request #298384 from msmbaldwin/content-review
Content review
2 parents 6b01962 + 7dd54c7 commit fd335a2

10 files changed

+25
-24
lines changed

articles/security/fundamentals/customer-lockbox-alternative-email.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: msmbaldwin
55
ms.service: information-protection
66
ms.topic: article
77
ms.author: mbaldwin
8-
ms.date: 03/15/2024
8+
ms.date: 04/16/2025
99
---
1010

1111
# Customer Lockbox for Microsoft Azure alternate email notifications
@@ -18,7 +18,7 @@ Alternate email notification feature enables customers to use alternate email ID
1818
> [!IMPORTANT]
1919
> This feature only enables Customer Lockbox notifications to be sent to alternate email IDs. It does not enable alternate users to act as approvers for Customer Lockbox requests.
2020
>
21-
> For example, Alice has the subscription owner role for subscription X and she adds Bob's email address as alternate email/other email in her user profile who has a reader role. When a Customer Lockbox request is created for a resource scoped to subscription 'X', Bob will receive the email notification, but he'll not be able to approve/reject the Customer Lockbox request as he does not have the required privileges for it (subscription owner role).
21+
> For example, Alice has the subscription owner role for subscription X and she adds Bob's email address as alternate email/other email in her user profile who has a reader role. When a Customer Lockbox request is created for a resource scoped to subscription 'X', Bob receives the email notification, but he is unable to approve/reject the Customer Lockbox request because he does not have the required privileges for it (subscription owner role).
2222
2323
## Prerequisites
2424

@@ -52,11 +52,12 @@ Here are the steps to set up the Customer Lockbox for Microsoft Azure alternate
5252
:::image type="content" source="./media/customer-lockbox-overview/customer-lockbox-alternative-email-add-email.png" lightbox="./media/customer-lockbox-overview/customer-lockbox-alternative-email-add-email.png" alt-text="A screenshot of the Other emails add interface.":::
5353
1. Add alternate email address in the text field and select save.
5454
:::image type="content" source="./media/customer-lockbox-overview/customer-lockbox-alternative-email-other-email.png" lightbox="./media/customer-lockbox-overview/customer-lockbox-alternative-email-other-email.png" alt-text="A screenshot of the alternative email input interface.":::
55-
1. Select the save button in the Contact Information tab to save the updates.
56-
:::image type="content" source="./media/customer-lockbox-overview/customer-lockbox-alternative-email-save.png" lightbox="./media/customer-lockbox-overview/customer-lockbox-alternative-email-save.png" alt-text="A screenshot of the Contact Information table, emphasizing the save interface.":::
55+
1. Select the "Save" button in the Contact Information tab to save the updates.
56+
:::image type="content" source="./media/customer-lockbox-overview/customer-lockbox-alternative-email-save.png" lightbox="./media/customer-lockbox-overview/customer-lockbox-alternative-email-save.png" alt-text="A screenshot of the Contact Information table, emphasizing the 'Save' interface.":::
5757
1. The contact information tab for this user should now show updated information with alternate email:
5858
:::image type="content" source="./media/customer-lockbox-overview/customer-lockbox-alternative-email-contact-information-updated.png" lightbox="./media/customer-lockbox-overview/customer-lockbox-alternative-email-contact-information-updated.png" alt-text="A screenshot of the updated information.":::
59-
1. Anytime a lockbox request is triggered and if the above user is identified as a Lockbox approver, the Lockbox email notification is sent to both primary and other email addresses, notifying that the Microsoft Support is trying to access a resource within their tenant, and they should take an action by logging into Azure portal to approve/reject the request. Here is an example screenshot:
59+
2. When a Customer Lockbox request is initiated, notifications are automatically sent to both the primary and alternate email addresses of users configured as Lockbox approvers. These emails inform the approver that Microsoft Support requires access to a resource within their Azure tenant and that action is needed. Approvers must sign in to the Azure portal to approve or reject the request. Here is an example of the notification email:
60+
6061
:::image type="content" source="./media/customer-lockbox-overview/customer-lockbox-alternative-email-notification.png" lightbox="./media/customer-lockbox-overview/customer-lockbox-alternative-email-notification.png" alt-text="A screenshot of the email notification.":::
6162

6263
## Known Issues

articles/security/fundamentals/customer-lockbox-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: msmbaldwin
55
ms.service: information-protection
66
ms.topic: article
77
ms.author: mbaldwin
8-
ms.date: 03/15/2024
8+
ms.date: 04/16/2025
99
---
1010

1111
# Customer Lockbox for Microsoft Azure

articles/security/fundamentals/encryption-atrest.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: 9dcb190e-e534-4787-bf82-8ce73bf47dba
99
ms.service: security
1010
ms.subservice: security-fundamentals
1111
ms.topic: article
12-
ms.date: 11/14/2022
12+
ms.date: 04/16/2025
1313
ms.author: mbaldwin
1414

1515
---

articles/security/fundamentals/key-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: msmbaldwin
66

77
ms.service: security
88
ms.topic: article
9-
ms.date: 06/27/2023
9+
ms.date: 04/16/2025
1010
ms.author: mbaldwin
1111
ms.collection:
1212
- zerotrust-extra

articles/security/fundamentals/paas-applications-using-sql.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: rkarlin
77
ms.service: security
88
ms.subservice: security-fundamentals
99
ms.topic: article
10-
ms.date: 09/29/2023
10+
ms.date: 04/16/2025
1111
ms.author: mbaldwin
1212

1313
---

articles/security/fundamentals/physical-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: 61e95a87-39c5-48f5-aee6-6f90ddcd336e
99
ms.service: security
1010
ms.subservice: security-fundamentals
1111
ms.topic: article
12-
ms.date: 03/27/2024
12+
ms.date: 04/16/2025
1313
ms.author: mbaldwin
1414

1515
---

articles/security/fundamentals/ransomware-detect-respond.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,15 @@ ms.service: security
66
ms.subservice: security-fundamentals
77
ms.topic: article
88
ms.author: mbaldwin
9-
ms.date: 01/10/2022
9+
ms.date: 04/16/2025
1010

1111
---
1212

1313
# Detect and respond to ransomware attacks
1414

15-
There are several potential triggers that might indicate a ransomware incident. Unlike many other types of malware, most will be higher-confidence triggers (where little additional investigation or analysis should be required prior to the declaration of an incident) rather than lower-confidence triggers (where more investigation or analysis would likely be required before an incident should be declared).
15+
Ransomware incidents typically present with distinct warning signs that security teams can identify. Unlike other malware types, ransomware usually produces highly evident indicators that require minimal investigation before declaring an incident. These high-confidence triggers stand in contrast to more subtle threats that would demand extensive analysis before escalation. When ransomware strikes, the evidence is often unmistakable.
1616

17-
In general, such infections obvious from basic system behavior, the absence of key system or user files and the demand for ransom. In this case, the analyst should consider whether to immediately declare and escalate the incident, including taking any automated actions to mitigate the attack.
17+
In general, such infections are obvious from basic system behavior, the absence of key system or user files, and the demand for ransom. In such cases, the analyst should consider whether to immediately declare and escalate the incident, including taking any automated actions to mitigate the attack.
1818

1919
## Detecting ransomware attacks
2020

@@ -25,7 +25,7 @@ Ensure rapid detection and remediation of common attacks on VMs, SQL Servers, We
2525
- **Prioritize Common Entry Points** – Ransomware (and other) operators favor Endpoint/Email/Identity + Remote Desktop Protocol (RDP)
2626
- **Integrated XDR** - Use integrated Extended Detection and Response (XDR) tools like Microsoft [Defender for Cloud](https://azure.microsoft.com/services/azure-defender/) to provide high quality alerts and minimize friction and manual steps during response
2727
- **Brute Force** - Monitor for brute-force attempts like [password spray](/defender-for-identity/compromised-credentials-alerts)
28-
- **Monitor for Adversary Disabling Security**as this is often part of Human-Operated Ransomware (HumOR) attack chain
28+
- **Monitor for Adversary Disabling Security**Often part of Human-Operated Ransomware (HumOR) attack chain
2929

3030
- **Event Logs Clearing** – especially the Security Event log and PowerShell Operational logs
3131
- **Disabling of security tools/controls** (associated with some groups)
@@ -37,19 +37,19 @@ Ensure rapid detection and remediation of common attacks on VMs, SQL Servers, We
3737

3838
### Incident declaration
3939

40-
Once a successful ransomware infection has been confirmed, the analyst should verify this represents a new incident or whether it might be related to an existing incident. Look for currently open tickets that indicate similar incidents. If so, update the current incident ticket with new information in the ticketing system. If this is a new incident, an incident should be declared in the relevant ticketing system and escalated to the appropriate teams or providers to contain and mitigate the incident. Be mindful that managing ransomware incidents might require actions taken by multiple IT and security teams. Where possible, ensure that the ticket is clearly identified as a ransomware incident to guide workflow.
40+
Once a successful ransomware infection is confirmed, the analyst should verify whether it represents a new incident or if it might be related to an existing incident. Look for currently open tickets that indicate similar incidents. If so, update the current incident ticket with new information in the ticketing system. If it is a new incident, an incident should be declared in the relevant ticketing system and escalated to the appropriate teams or providers to contain and mitigate the incident. Be mindful that managing ransomware incidents might require actions taken by multiple IT and security teams. Where possible, ensure that the ticket is clearly identified as a ransomware incident to guide workflow.
4141

4242
### Containment/Mitigation
4343

44-
In general, various server/endpoint antimalware, email antimalware and network protection solutions should be configured to automatically contain and mitigate known ransomware. There might be cases, however, where the specific ransomware variant has been able to bypass such protections and successfully infect target systems.
44+
In general, various server/endpoint anti-malware, email anti-malware, and network protection solutions should be configured to automatically contain and mitigate known ransomware. There might be cases, however, where the specific ransomware variant is able to bypass such protections and successfully infect target systems.
4545

4646
Microsoft provides extensive resources to help update your incident response processes on the [Top Azure Security Best Practices](/azure/cloud-adoption-framework/secure/security-top-10#4-process-update-incident-response-processes-for-cloud).
4747

48-
The following are recommended actions to contain or mitigate a declared incident involving ransomware where automated actions taken by antimalware systems have been unsuccessful:
48+
The following are recommended actions to contain or mitigate a declared incident involving ransomware where automated actions taken by anti-malware systems are unsuccessful:
4949

50-
1. Engage antimalware vendors through standard support processes
51-
1. Manually add hashes and other information associated with malware to antimalware systems
52-
1. Apply antimalware vendor updates
50+
1. Engage anti-malware vendors through standard support processes
51+
1. Manually add hashes and other information associated with malware to anti-malware systems
52+
1. Apply anti-malware vendor updates
5353
1. Contain affected systems until they can be remediated
5454
1. Disable compromised accounts
5555
1. Perform root cause analysis
@@ -59,7 +59,7 @@ The following are recommended actions to contain or mitigate a declared incident
5959

6060
## Road to recovery
6161

62-
The Microsoft Detection and Response Team will help protect you from attacks
62+
The Microsoft Detection and Response Team help protect you from attacks
6363

6464
Understanding and fixing the fundamental security issues that led to the compromise in the first place should be a priority for ransomware targets.
6565

articles/security/fundamentals/ransomware-features-resources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: security
66
ms.subservice: security-fundamentals
77
ms.topic: article
88
ms.author: mbaldwin
9-
ms.date: 01/10/2022
9+
ms.date: 04/16/2025
1010
---
1111

1212
# Azure features & resources that help you protect, detect, and respond to ransomware attacks

articles/security/fundamentals/subdomain-takeover.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: rkarlin
99
ms.service: security
1010
ms.subservice: security-fundamentals
1111
ms.topic: article
12-
ms.date: 03/27/2024
12+
ms.date: 04/16/2025
1313
ms.author: mbaldwin
1414

1515
---

articles/security/fundamentals/trusted-hardware-identity-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: security
66
ms.subservice: security-fundamentals
77
ms.topic: article
88
ms.author: mbaldwin
9-
ms.date: 10/24/2022
9+
ms.date: 04/16/2025
1010
---
1111

1212
# Trusted Hardware Identity Management

0 commit comments

Comments
 (0)