Skip to content

Commit fdde14f

Browse files
committed
added links and acrolinx
1 parent c9d788f commit fdde14f

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

articles/defender-for-cloud/release-notes.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,10 @@ If you're looking for items older than six months, you can find them in the [Arc
2424

2525
| Date | Update |
2626
| ------- | ---------------------------------------------------------------- |
27-
| April 1 | Update recommendations to align with Azure AI Services resources |
28-
| April 1 | Deprecation of Cognitive Services recommendation |
27+
| April 1 | [Update to recommendations to align with Azure AI Services resources](#update-to-recommendations-to-align-with-azure-ai-services-resources) |
28+
| April 1 | [Deprecation of Cognitive Services recommendation](#deprecation-of-cognitive-services-recommendation) |
2929

30-
### Update recommendations to align with Azure AI Services resources
30+
### Update to recommendations to align with Azure AI Services resources
3131

3232
April 1, 2024
3333

@@ -44,7 +44,7 @@ See the [list of security recommendations](recommendations-reference.md).
4444

4545
April 1, 2024
4646

47-
The recommendation [`Public network access should be disabled for Cognitive Services accounts`](https://ms.portal.azure.com/?feature.msaljs=true#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/684a5b6d-a270-61ce-306e-5cea400dc3a7) is deprecated. The related policy definition [`Cognitive Services accounts should disable public network access`](https://ms.portal.azure.com/?feature.msaljs=true#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F0725b4dd-7e76-479c-a735-68e7ee23d5ca) has also been removed from the regulatory compliance dashboard.
47+
The recommendation [`Public network access should be disabled for Cognitive Services accounts`](https://ms.portal.azure.com/?feature.msaljs=true#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/684a5b6d-a270-61ce-306e-5cea400dc3a7) is deprecated. The related policy definition [`Cognitive Services accounts should disable public network access`](https://ms.portal.azure.com/?feature.msaljs=true#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F0725b4dd-7e76-479c-a735-68e7ee23d5ca) has been removed from the regulatory compliance dashboard.
4848

4949
This recommendation is already being covered by another networking recommendation for Azure AI Services, [`Cognitive Services accounts should restrict network access`](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/GenericRecommendationDetailsBlade/assessmentKey/f738efb8-005f-680d-3d43-b3db762d6243/showSecurityCenterCommandBar~/false).
5050

@@ -72,27 +72,27 @@ See the [list of security recommendations](recommendations-reference.md).
7272

7373
March 31, 2024
7474

75-
We are announcing the general availability (GA) of the Windows container images support for scanning by Defender for Containers.
75+
We're announcing the general availability (GA) of the Windows container images support for scanning by Defender for Containers.
7676

7777
### Continuous export now includes attack path data
7878

7979
March 25, 2024
8080

81-
We are announcing that continuous export now includes attack path data. This feature allows you to stream security data to Log Analytics in Azure Monitor, to Azure Event Hubs, or to another Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), or IT classic deployment model solution.
81+
We're announcing that continuous export now includes attack path data. This feature allows you to stream security data to Log Analytics in Azure Monitor, to Azure Event Hubs, or to another Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), or IT classic deployment model solution.
8282

8383
Learn more about [continuous export](benefits-of-continuous-export.md).
8484

8585
### Agentless scanning supports CMK encrypted VMs in Azure
8686

8787
March 21, 2024
8888

89-
Until now agentless scanning covered CMK encrypted VMs in AWS and GCP. With this release we are completing support for Azure as well. The capability employs a unique scanning approach for CMK in Azure:
89+
Until now agentless scanning covered CMK encrypted VMs in AWS and GCP. With this release we're completing support for Azure as well. The capability employs a unique scanning approach for CMK in Azure:
9090

91-
- Defender for Cloud does not handle the key or decryption process. Key handling and decryption is seamlessly handled by Azure Compute and is transparent to Defender for Cloud's agentless scanning service.
91+
- Defender for Cloud doesn't handle the key or decryption process. Key handling and decryption are seamlessly handled by Azure Compute and is transparent to Defender for Cloud's agentless scanning service.
9292
- The unencrypted VM disk data is never copied or re-encrypted with another key.
93-
- The original key is not replicated during the process. Purging it eradicates the data on both your production VM and Defender for Cloud’s temporary snapshot.
93+
- The original key isn't replicated during the process. Purging it eradicates the data on both your production VM and Defender for Cloud’s temporary snapshot.
9494

95-
During public preview this capability is not automatically enabled. If you are using Defender for Servers P2 or Defender CSPM and your environment has VMs with CMK encrypted disks, you can now have them scanned for vulnerabilities, secrets and malware following these [enablement steps](enable-agentless-scanning-vms.md#agentless-vulnerability-assessment-on-azure).
95+
During public preview this capability isn't automatically enabled. If you're using Defender for Servers P2 or Defender CSPM and your environment has VMs with CMK encrypted disks, you can now have them scanned for vulnerabilities, secrets and malware following these [enablement steps](enable-agentless-scanning-vms.md#agentless-vulnerability-assessment-on-azure).
9696

9797
- [Learn more on agentless scanning for VMs](concept-agentless-data-collection.md)
9898
- [Learn more on agentless scanning permissions](faq-permissions.yml#which-permissions-are-used-by-agentless-scanning-)
@@ -101,9 +101,9 @@ During public preview this capability is not automatically enabled. If you are u
101101

102102
March 18, 2024
103103

104-
We are announcing new endpoint detection and response recommendations that discover and assesses the configuration of supported endpoint detection and response solutions. If issues are found, these recommendations offer remediation steps.
104+
We're announcing new endpoint detection and response recommendations that discover and assesses the configuration of supported endpoint detection and response solutions. If issues are found, these recommendations offer remediation steps.
105105

106-
The following new agentless endpoint protection recommendations are now available if you have Defender for Servers Plan 2 or the Defender CSPM plan enabled on your subscription with the agentless machine scanning feature enabled. The recommendations support Azure and multicloud machines. On-premises machines are not supported.
106+
The following new agentless endpoint protection recommendations are now available if you have Defender for Servers Plan 2 or the Defender CSPM plan enabled on your subscription with the agentless machine scanning feature enabled. The recommendations support Azure and multicloud machines. On-premises machines aren't supported.
107107

108108
| Recommendation name | Description | Severity |
109109
|--|

0 commit comments

Comments
 (0)