Skip to content

Commit ffd314c

Browse files
authored
Merge pull request #216452 from ElazarK/dfd-fixes
changes
2 parents eba6825 + 7a1f9ce commit ffd314c

8 files changed

+29
-28
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -734,6 +734,16 @@
734734
"source_path_from_root": "/articles/defender-for-cloud/defender-for-containers-cicd.md",
735735
"redirect_url": "/azure/defender-for-cloud/defender-for-devops-introduction",
736736
"redirect_document_id": true
737+
},
738+
{
739+
"source_path_from_root": "/articles/defender-for-cloud/tutorial-enable-pull-request-annotations.md",
740+
"redirect_url": "/azure/defender-for-cloud/enable-pull-request-annotations",
741+
"redirect_document_id": true
742+
},
743+
{
744+
"source_path_from_root": "/articles/defender-for-cloud/detect-credential-leaks.md",
745+
"redirect_url": "/azure/defender-for-cloud/detect-exposed-secrets",
746+
"redirect_document_id": true
737747
}
738748

739749
]

articles/defender-for-cloud/TOC.yml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -77,8 +77,6 @@
7777
href: tutorial-security-policy.md
7878
- name: Investigate the health of your resources
7979
href: investigate-resource-health.md
80-
- name: Enable pull request annotations in GitHub or in Azure DevOps
81-
href: tutorial-enable-pull-request-annotations.md
8280

8381
- name: Samples
8482
items:
@@ -445,7 +443,10 @@
445443
href: iac-vulnerabilities.md
446444
- name: Detect exposed secrets in code
447445
displayName: DevOps, CredScan, Credentials, leaks,
448-
href: detect-credential-leaks.md
446+
href: detect-exposed-secrets.md
447+
- name: Enable pull request annotations in GitHub or in Azure DevOps
448+
displayName: PR annotations, annotations, DevOps, GitHub, pull request
449+
href: enable-pull-request-annotations.md
449450

450451
- name: Reference
451452
items:

articles/defender-for-cloud/azure-devops-extension.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ The Microsoft Security DevOps uses the following Open Source tools:
1717
| [Bandit](https://github.com/PyCQA/bandit) | Python | [Apache License 2.0](https://github.com/PyCQA/bandit/blob/master/LICENSE) |
1818
| [BinSkim](https://github.com/Microsoft/binskim) | Binary--Windows, ELF | [MIT License](https://github.com/microsoft/binskim/blob/main/LICENSE) |
1919
| [ESlint](https://github.com/eslint/eslint) | JavaScript | [MIT License](https://github.com/eslint/eslint/blob/main/LICENSE) |
20-
| [Credscan](detect-credential-leaks.md) | Credential Scanner (also known as CredScan) is a tool developed and maintained by Microsoft to identify credential leaks such as those in source code and configuration files <br> common types: default passwords, SQL connection strings, Certificates with private keys | Not Open Source |
20+
| [Credscan](detect-exposed-secrets.md) | Credential Scanner (also known as CredScan) is a tool developed and maintained by Microsoft to identify credential leaks such as those in source code and configuration files <br> common types: default passwords, SQL connection strings, Certificates with private keys | Not Open Source |
2121
| [Template Analyzer](https://github.com/Azure/template-analyzer) | ARM template, Bicep file | [MIT License](https://github.com/Azure/template-analyzer/blob/main/LICENSE.txt) |
2222
| [Terrascan](https://github.com/accurics/terrascan) | Terraform (HCL2), Kubernetes (JSON/YAML), Helm v3, Kustomize, Dockerfiles, Cloud Formation | [Apache License 2.0](https://github.com/accurics/terrascan/blob/master/LICENSE) |
2323
| [Trivy](https://github.com/aquasecurity/trivy) | container images, file systems, git repositories | [Apache License 2.0](https://github.com/aquasecurity/trivy/blob/main/LICENSE) |

articles/defender-for-cloud/defender-for-devops-introduction.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Defender for DevOps allows you to manage your connected environments and provide
3737

3838
:::image type="content" source="media/defender-for-devops-introduction/devops-dashboard.png" alt-text="Screenshot of the Defender for DevOps dashboard." lightbox="media/defender-for-devops-introduction/devops-dashboard.png":::
3939

40-
Here, you can [add GitHub](quickstart-onboard-github.md) and [Azure DevOps](quickstart-onboard-devops.md) environments, customize DevOps workbooks to show your desired metrics, view our guides and give feedback, and [configure your pull request annotations](tutorial-enable-pull-request-annotations.md).
40+
Here, you can [add GitHub](quickstart-onboard-github.md) and [Azure DevOps](quickstart-onboard-devops.md) environments, customize DevOps workbooks to show your desired metrics, view our guides and give feedback, and [configure your pull request annotations](enable-pull-request-annotations.md).
4141

4242
### Understanding your DevOps security
4343

@@ -88,6 +88,6 @@ On this part of the screen you see:
8888

8989
## Next steps
9090

91-
[Connect your GitHub repositories to Microsoft Defender for Cloud](quickstart-onboard-github.md).
91+
[Configure the Microsoft Security DevOps GitHub action](github-action.md).
9292

93-
[Connect your Azure DevOps repositories to Microsoft Defender for Cloud](quickstart-onboard-devops.md).
93+
[Configure the Microsoft Security DevOps Azure DevOps extension](azure-devops-extension.md)

articles/defender-for-cloud/detect-credential-leaks.md renamed to articles/defender-for-cloud/detect-exposed-secrets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -148,4 +148,4 @@ The following exit codes are available in CredScan:
148148
| -9000 | Scan failed with unknown error. |
149149

150150
## Next steps
151-
+ Learn how to [configure pull request annotations](tutorial-enable-pull-request-annotations.md) in Defender for Cloud to remediate secrets in code before they are shipped to production.
151+
+ Learn how to [configure pull request annotations](enable-pull-request-annotations.md) in Defender for Cloud to remediate secrets in code before they are shipped to production.

articles/defender-for-cloud/tutorial-enable-pull-request-annotations.md renamed to articles/defender-for-cloud/enable-pull-request-annotations.md

Lines changed: 8 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Tutorial Enable pull request annotations in GitHub or in Azure DevOps
2+
title: Enable pull request annotations in GitHub or in Azure DevOps
33
description: Add pull request annotations in GitHub or in Azure DevOps. By adding pull request annotations, your SecOps and developer teams so that they can be on the same page when it comes to mitigating issues.
44
ms.topic: overview
55
ms.custom: ignite-2022
6-
ms.date: 10/20/2022
6+
ms.date: 10/30/2022
77
---
88

9-
# Tutorial: Enable pull request annotations in GitHub and Azure DevOps
9+
# Enable pull request annotations in GitHub and Azure DevOps
1010

1111
Defender for DevOps exposes security findings as annotations in Pull Requests (PR). Security operators can enable PR annotations in Microsoft Defender for Cloud. Any exposed issues can then be remedied by developers. This process can prevent and fix potential security vulnerabilities and misconfigurations before they enter the production stage. Defender for DevOps annotates the vulnerabilities within the differences in the file rather than all the vulnerabilities detected across the entire file. Developers are able to see annotations in their source code management systems and Security operators can see any unresolved findings in Microsoft Defender for Cloud.
1212

@@ -15,16 +15,8 @@ With Microsoft Defender for Cloud, you can configure PR annotations in Azure Dev
1515
> [!NOTE]
1616
> GitHub Advanced Security for Azure DevOps (GHAzDO) is providing a free trial of PR annotations during the Defender for DevOps preview.
1717
18-
In this tutorial you'll learn how to:
19-
20-
> [!div class="checklist"]
21-
> * [Enable pull request annotations in GitHub](#enable-pull-request-annotations-in-github).
22-
> * [Enable pull request annotations in Azure DevOps](#enable-pull-request-annotations-in-azure-devops).
23-
2418
## Prerequisites
2519

26-
Before you can follow the steps in this tutorial, you must:
27-
2820
**For GitHub**:
2921

3022
- An Azure account. If you don't already have an Azure account, you can [create your Azure free account today](https://azure.microsoft.com/free/).
@@ -37,7 +29,7 @@ Before you can follow the steps in this tutorial, you must:
3729
- An Azure account. If you don't already have an Azure account, you can [create your Azure free account today](https://azure.microsoft.com/free/).
3830
- [Connect your Azure DevOps repositories to Microsoft Defender for Cloud](quickstart-onboard-devops.md).
3931
- [Configure the Microsoft Security DevOps Azure DevOps extension](azure-devops-extension.md).
40-
- [Setup secret scanning in Azure DevOps](detect-credential-leaks.md#setup-secret-scanning-in-azure-devops).
32+
- [Setup secret scanning in Azure DevOps](detect-exposed-secrets.md#setup-secret-scanning-in-azure-devops).
4133

4234
## Enable pull request annotations in GitHub
4335

@@ -85,7 +77,7 @@ Any issues that are discovered by the scanner will be viewable in the Files chan
8577
8678
1. Navigate through the page and locate an affected file with an annotation.
8779
88-
1. Follow the remediation steps in the annotation. If you choose not remediate the annotation, select **Dismiss alert**.
80+
1. Follow the remediation steps in the annotation. If you choose not to remediate the annotation, select **Dismiss alert**.
8981
9082
1. Select a reason to dismiss:
9183
@@ -127,7 +119,7 @@ Before you can enable pull request annotations, your main branch must have enabl
127119
128120
:::image type="content" source="media/tutorial-enable-pr-annotations/validation-policy.png" alt-text="Screenshot that shows the build validation.":::
129121
130-
Once you have completed these steps you can select the build pipeline you created previously and customize it's settings to suit your needs.
122+
Once you have completed these steps you can select the build pipeline you created previously and customize its settings to suit your needs.
131123
132124
### Enable pull request annotations
133125
@@ -141,7 +133,7 @@ Once you have completed these steps you can select the build pipeline you create
141133
142134
1. Select **Configure**.
143135
144-
:::image type="content" source="media/tutorial-enable-pr-annotations/select-configure.png" alt-text="Screenshot that shows you where to select configure, on the screen.":::
136+
:::image type="content" source="media/tutorial-enable-pr-annotations/select-configure.png" alt-text="Screenshot that shows you where to select configure on the screen.":::
145137
146138
1. Toggle Pull request annotations to **On**.
147139
@@ -191,13 +183,11 @@ Defender for DevOps will re-activate an annotation if the security issue is not
191183
192184
## Learn more
193185
194-
In this tutorial, you learned how to enable pull request annotations in GitHub and Azure DevOps.
195-
196186
Learn more about [Defender for DevOps](defender-for-devops-introduction.md).
197187
198188
Learn how to [Discover misconfigurations in Infrastructure as Code](iac-vulnerabilities.md).
199189
200-
Learn how to [detect exposed secrets in code](detect-credential-leaks.md).
190+
Learn how to [detect exposed secrets in code](detect-exposed-secrets.md).
201191
202192
## Next steps
203193

articles/defender-for-cloud/quickstart-onboard-devops.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,4 +95,4 @@ Learn more about [Defender for DevOps](defender-for-devops-introduction.md).
9595

9696
Learn how to [configure the MSDO Azure DevOps extension](azure-devops-extension.md).
9797

98-
Learn how to [configure pull request annotations](tutorial-enable-pull-request-annotations.md) in Defender for Cloud.
98+
Learn how to [configure pull request annotations](enable-pull-request-annotations.md) in Defender for Cloud.

articles/defender-for-cloud/quickstart-onboard-github.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,4 +89,4 @@ Learn more about [Defender for DevOps](defender-for-devops-introduction.md).
8989

9090
Learn how to [configure the MSDO GitHub action](github-action.md).
9191

92-
Learn how to [configure pull request annotations](tutorial-enable-pull-request-annotations.md) in Defender for Cloud.
92+
Learn how to [configure pull request annotations](enable-pull-request-annotations.md) in Defender for Cloud.

0 commit comments

Comments
 (0)