You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> You will continue to receive the same standard of protection without disruption to your existing security coverage. No action is required from your side.
42
41
@@ -92,10 +91,6 @@ This detection identifies that users were active from an IP address that has bee
92
91
93
92
### Ransomware activity
94
93
95
-
> [!NOTE]
96
-
> As part of ongoing improvements to Defender for Cloud Apps alert threat protection capabilities, this policy has been disabled, migrated to the new dynamic model and renamed to **Ransomware payment instruction file uploaded to {Application}**.
97
-
> If you previously configured governance actions or email notifications for this policy, you can re-enable it at any time in the Microsoft Defender portal > Cloud Apps > Policy management page.
98
-
99
94
Defender for Cloud Apps extended its ransomware detection capabilities with anomaly detection to ensure a more comprehensive coverage against sophisticated Ransomware attacks. Using our security research expertise to identify behavioral patterns that reflect ransomware activity, Defender for Cloud Apps ensures holistic and robust protection. If Defender for Cloud Apps identifies, for example, a high rate of file uploads or file deletion activities it may represent an adverse encryption process. This data is collected in the logs received from connected APIs and is then combined with learned behavioral patterns and threat intelligence, for example, known ransomware extensions. For more information about how Defender for Cloud Apps detects ransomware, see [Protecting your organization against ransomware](best-practices.md#detect-cloud-threats-compromised-accounts-malicious-insiders-and-ransomware).
-**New unified Recommendations page**: All recommendations from various sources (Secure Score, Defender for Cloud, Defender for Endpoint, etc.) are now consolidated into one catalog view in the Defender portal
104
104
-**Organized by attack surface**: Recommendations are organized by tabs for different domains - Devices, Cloud, Identity, SaaS, and Data
105
105
-**Categorized by issue type**: Recommendations are separated by type - misconfigurations vs vulnerabilities vs secrets. For example, on the Devices tab, you'll find separate views for Misconfigurations and Vulnerabilities, aligning with different remediation workflows
106
-
-**Risk-based prioritization**: Combines vulnerability data from endpoints and cloud environments into a unified, actionable view, including contextual risk-based Secure Score.
107
-
-**Unified remediation flow**: Side-by-side visibility into device and cloud weaknesses enabling security teams to efficiently track posture improvements, remediate vulnerabilities, and understand attack paths in real time through a streamlined interface.
Copy file name to clipboardExpand all lines: exposure-management/security-recommendations.md
+4-16Lines changed: 4 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,6 @@ This article describes how to work with security recommendations in the new unif
17
17
18
18
- Learn about the [unified recommendations catalog](exposure-insights-overview.md#working-with-recommendations) before you start.
19
19
-[Review permissions and prerequisites needed](prerequisites.md) for working with Security Exposure Management.
20
-
- Understand that all recommendations from various sources (Secure Score, Defender for Cloud, Defender for Endpoint, etc.) are now consolidated into one unified view in the Defender portal.
21
20
22
21
## Overview of the unified recommendations catalog
23
22
@@ -58,7 +57,7 @@ Apply advanced filtering using the **Add filter** option to narrow down recommen
58
57
59
58
#### Devices
60
59
61
-
The Devices tab provides a unified view of device-related security recommendations, combining misconfigurations and vulnerabilities into a single location for easier management.
60
+
The Devices tab provides a unified view of device-related security recommendations.
62
61
63
62
There are separate views for issue types:
64
63
@@ -69,7 +68,7 @@ This separation recognizes that misconfigurations and vulnerabilities often repr
69
68
70
69
## Cloud assets
71
70
72
-
This tab provides a prioritized list of security actions designed to improve your cloud security posture by addressing vulnerabilitiesand misconfigurations. These recommendations are ranked by effective risk, helping security teams focus on the most critical threats first.
71
+
This tab provides a prioritized list of security actions designed to improve your cloud security posture by addressing vulnerabilities, misconfigurations, and exposed secrets. These recommendations are ranked by effective risk, helping security teams focus on the most critical threats first.
73
72
74
73
Apply filters and filter sets such as **Exposed asset**, **Asset risk factors**, **Environment**, **Workload**, **Recommendation maturity** and others.
75
74
@@ -111,29 +110,18 @@ These tabs provide recommendations specific to SaaS applications, identity secur
111
110
112
111
The recommendations summary on these tabs includes:
113
112
114
-
- Their unique secure score
113
+
- Their unique Microsoft Secure Score
115
114
- Score history
116
115
- Recommendation by status
117
116
- Score comparison
118
117
119
-
1. Select a recommendation to view and review details.
120
-
121
-
You can also review recommendations on the **Recommendations** tab in a specific security initiative page in **Initiatives** to access [Microsoft Exposure Recommendations](https://security.microsoft.com/exposure-recommendations) in the [Microsoft Defender portal](https://security.microsoft.com/).
122
-
123
118
## Remediate recommendations
124
119
125
120
1. To remediate a recommendation, select a specific recommendation and browse to the **Remediation steps** tab.
126
121
127
122
1. Review the remediation steps and select **Manage** to follow the steps in the originating workload. The unified experience directs you to the appropriate service:
128
-
- Microsoft Defender for Cloud for cloud recommendations
129
-
- Microsoft Defender Vulnerability Management for device vulnerabilities
130
-
- Microsoft Secure Score for Microsoft 365 recommendations
131
-
- Other Microsoft workloads as appropriate
132
-
133
-
1.**Note on unified workflow**: All recommendations, including those from Azure security center, are now visible in Exposure Management, so you can manage your entire security posture from the unified portal without needing to navigate to separate Azure portals for cloud recommendations.
134
123
135
124
## Next steps
136
125
137
126
- Review other ways to [improve security insights with exposure insights](exposure-insights-overview.md)
138
-
- Learn how to [Explore security events](security-events.md)
0 commit comments