Skip to content

Commit fe66ebb

Browse files
authored
Merge pull request #270775 from dcurwin/fix-formatting-april1-2024
fix formatting
2 parents 9dd689c + 3810d18 commit fe66ebb

8 files changed

+16
-17
lines changed

articles/defender-for-cloud/alerts-schemas.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@ ms.date: 03/25/2024
1010

1111
# Alerts schemas
1212

13-
1413
Defender for Cloud provides alerts that help you identify, understand, and respond to security threats. Alerts are generated when Defender for Cloud detects suspicious activity or a security-related issue in your environment. You can view these alerts in the Defender for Cloud portal, or you can export them to external tools for further analysis and response.
1514

1615
You can review security alerts from the [overview dashboard](overview-page.md), [alerts](managing-and-responding-alerts.md) page, [resource health pages](investigate-resource-health.md), or [workload protections dashboard](workload-protections-dashboard.md).

articles/defender-for-cloud/concept-easm.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,16 +13,15 @@ An external attack surface is the entire area of an organization or system that
1313

1414
Defender EASM continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate threats, and extend vulnerability and exposure control beyond the firewall.
1515

16-
Defender EASM applies Microsoft’s crawling technology to discover assets that are related to your known online infrastructure, and actively scans these assets to discover new connections over time. Attack Surface Insights are generated by applying vulnerability and infrastructure data to showcase the key areas of concern for your organization, such as:
16+
Defender EASM applies Microsoft’s crawling technology to discover assets that are related to your known online infrastructure, and actively scans these assets to discover new connections over time. Attack Surface Insights are generated by applying vulnerability and infrastructure data to showcase the key areas of concern for your organization, such as:
1717

1818
- Discover digital assets, always-on inventory
19-
- Analyze and prioritize risks and threats
20-
- Pinpoint attacker-exposed weaknesses, anywhere and on-demand
19+
- Analyze and prioritize risks and threats
20+
- Pinpoint attacker-exposed weaknesses, anywhere and on-demand
2121
- Gain visibility into third-party attack surfaces
2222

2323
EASM collects data for publicly exposed assets (“outside-in”). Defender for Cloud CSPM (“inside-out”) can use that data to assist with internet-exposure validation and discovery capabilities, to provide better visibility to customers.
2424

25-
2625
## Next steps
2726

2827
- Learn about [cloud security explorer and attack paths](concept-attack-path.md) in Defender for Cloud.

articles/defender-for-cloud/continuous-export.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,14 +24,15 @@ This article describes how to set up continuous export to a Log Analytics worksp
2424
- You must [enable Microsoft Defender for Cloud](get-started.md#enable-defender-for-cloud-on-your-azure-subscription) on your Azure subscription.
2525

2626
Required roles and permissions:
27+
2728
- Security Admin or Owner for the resource group
2829
- Write permissions for the target resource.
2930
- If you use the [Azure Policy DeployIfNotExist policies](continuous-export-azure-policy.md), you must have permissions that let you assign policies.
3031
- To export data to Event Hubs, you must have Write permissions on the Event Hubs policy.
31-
- To export to a Log Analytics workspace:
32-
- If it *has the SecurityCenterFree solution*, you must have a minimum of Read permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/read`.
33-
- If it *doesn't have the SecurityCenterFree solution*, you must have write permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/action`.
34-
32+
- To export to a Log Analytics workspace:
33+
- If it *has the SecurityCenterFree solution*, you must have a minimum of Read permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/read`.
34+
- If it *doesn't have the SecurityCenterFree solution*, you must have write permissions for the workspace solution: `Microsoft.OperationsManagement/solutions/action`.
35+
3536
Learn more about [Azure Monitor and Log Analytics workspace solutions](/previous-versions/azure/azure-monitor/insights/solutions).
3637

3738
## Set up continuous export in the Azure portal

articles/defender-for-cloud/data-aware-security-dashboard-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ The **Closer look** section provides a more detailed view into the sensitive dat
8181

8282
- **Sensitive data discovery** - summarizes the results of the sensitive resources discovered, allowing customers to explore a specific sensitive information type and label.
8383
- **Internet-exposed data resources** - summarizes the discovery of sensitive data resources that are internet-exposed for storage and managed databases.
84-
84+
8585
:::image type="content" source="media/data-aware-security-dashboard/closer-look.png" alt-text="Screenshot that shows the closer look section of the data security dashboard." lightbox="media/data-aware-security-dashboard/closer-look.png":::
8686

8787
You can select the **Manage data sensitivity settings** to get to the **Data sensitivity** page. The **Data sensitivity** page allows you to manage the data sensitivity settings of cloud resources at the tenant level, based on selective info types and labels originating from the Purview compliance portal, and [customize sensitivity settings](data-sensitivity-settings.md) such as creating your own customized info types and labels, and setting sensitivity label thresholds.

articles/defender-for-cloud/iac-template-mapping.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ To set Microsoft Defender for Cloud to map IaC templates to cloud resources, you
2222
- Supported cloud platforms: Microsoft Azure, Amazon Web Services, Google Cloud Platform
2323
- Supported source code management systems: Azure DevOps
2424
- Supported template languages: Azure Resource Manager, Bicep, CloudFormation, Terraform
25-
25+
2626
> [!NOTE]
2727
> Microsoft Defender for Cloud uses only the following tags from IaC templates for mapping:
2828
>

articles/defender-for-cloud/quickstart-onboard-gcp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -204,7 +204,7 @@ The respective Azure Arc servers for GCP virtual machines that no longer exist (
204204
Ensure that you fulfill the [network requirements for Azure Arc](../azure-arc/servers/network-requirements.md?tabs=azure-cloud).
205205

206206
Enable these other extensions on the Azure Arc-connected machines:
207-
207+
208208
- Microsoft Defender for Endpoint
209209
- A vulnerability assessment solution (Microsoft Defender Vulnerability Management or Qualys)
210210

articles/defender-for-cloud/release-notes.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@ Learn more about [continuous export](benefits-of-continuous-export.md).
4949
March 21, 2024
5050

5151
Until now agentless scanning covered CMK encrypted VMs in AWS and GCP. With this release we are completing support for Azure as well. The capability employs a unique scanning approach for CMK in Azure:
52+
5253
- Defender for Cloud does not handle the key or decryption process. Key handling and decryption is seamlessly handled by Azure Compute and is transparent to Defender for Cloud's agentless scanning service.
5354
- The unencrypted VM disk data is never copied or re-encrypted with another key.
5455
- The original key is not replicated during the process. Purging it eradicates the data on both your production VM and Defender for Cloud’s temporary snapshot.
@@ -58,14 +59,13 @@ During public preview this capability is not automatically enabled. If you are u
5859
- [Learn more on agentless scanning for VMs](concept-agentless-data-collection.md)
5960
- [Learn more on agentless scanning permissions](faq-permissions.yml#which-permissions-are-used-by-agentless-scanning-)
6061

61-
6262
### New endpoint detection and response recommendations
6363

6464
March 18, 2024
6565

66-
We are announcing new endpoint detection and response recommendations that discover and assesses the configuration of supported endpoint detection and response solutions. If issues are found, these recommendations offer remediation steps.
66+
We are announcing new endpoint detection and response recommendations that discover and assesses the configuration of supported endpoint detection and response solutions. If issues are found, these recommendations offer remediation steps.
6767

68-
The following new agentless endpoint protection recommendations are now available if you have Defender for Servers Plan 2 or the Defender CSPM plan enabled on your subscription with the agentless machine scanning feature enabled. The recommendations support Azure and multicloud machines. On-premises machines are not supported.
68+
The following new agentless endpoint protection recommendations are now available if you have Defender for Servers Plan 2 or the Defender CSPM plan enabled on your subscription with the agentless machine scanning feature enabled. The recommendations support Azure and multicloud machines. On-premises machines are not supported.
6969

7070
| Recommendation name | Description | Severity |
7171
|--|

articles/defender-for-cloud/view-and-remediate-vulnerabilities-for-images.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,8 +39,8 @@ If you are using Defender CSPM, first review and remediate vulnerabilities expos
3939

4040
:::image type="content" source="media/view-and-remediate-vulnerabilities-for-images-running-on-aks/running-select-container.png" alt-text="Screenshot showing where to select a specific container." lightbox="media/view-and-remediate-vulnerabilities-for-images-running-on-aks/running-select-container.png":::
4141

42-
1. This pane includes a list of the container vulnerabilities. Select each vulnerability to [resolve the vulnerability](#remediate-vulnerabilities).
43-
42+
1. This pane includes a list of the container vulnerabilities. Select each vulnerability to [resolve the vulnerability](#remediate-vulnerabilities).
43+
4444
:::image type="content" source="media/view-and-remediate-vulnerabilities-for-images-running-on-aks/running-list-vulnerabilities.png" alt-text="Screenshot showing the list of container vulnerabilities." lightbox="media/view-and-remediate-vulnerabilities-for-images-running-on-aks/running-list-vulnerabilities.png":::
4545

4646
## View container images affected by a specific vulnerability

0 commit comments

Comments
 (0)