Skip to content

Commit 30728ee

Browse files
authored
Merge pull request #1921 from MicrosoftDocs/main
publishing Ignite updates and items
2 parents bb00008 + edb9458 commit 30728ee

File tree

59 files changed

+883
-53
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

59 files changed

+883
-53
lines changed

defender-endpoint/machines-view-overview.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -136,6 +136,7 @@ The available device properties to use as filters vary based on the device inven
136136
|**Device subtype**|<ul><li>**All devices**</li><li>**IoT/OT**</li></ul>|The subtype value assigned to the device. Enter a value or select an available value (for example, **Video conference**).|
137137
|**Device type**|<ul><li>**All devices**</li><li>**IoT/OT**</li></ul>|The type value assigned to the device. Enter a value or select an available value (for example, **Audio and Video**).|
138138
|**Device value**|All|The assigned value of the device. The available values are **High** and **Low**.|
139+
|**Discovery sources**|All|The source reporting on the device.|
139140
|**Exclusion state**|All|The available values are **Not excluded** and **Excluded**. For more information, see [Exclude devices](exclude-devices.md).|
140141
|**Exposure level**|All|The exposure level of the device based on pending security recommendations. The available values are: <ul><li>**High**</li><li>**Medium**</li><li>**Low**: Devices are less vulnerable to exploitation.</li><li>**No data available**: Possible causes for this value include: <ul><li>The device is inactive (stopped reporting for more than 30 days).</li><li>The OS on the device isn't supported. For more information, see [minimum requirements for Microsoft Defender for Endpoint](minimum-requirements.md).</li><li>The agent software on the device is stale (unlikely).</li></ul></li></ul>|
141142
|**First seen**|All tabs except **Network devices**|How long ago the device was first seen on the network or when it was first reported by the Microsoft Defender for Endpoint sensor. The available values are **Last 7 days** or **Over 7 days ago**.|
@@ -178,6 +179,7 @@ You can sort the entries by clicking on an available column header. Select :::im
178179
- **OS version**<sup\*</sup>
179180
- **Sensor health state**<sup\*</sup>
180181
- **Onboarding status**<sup\*</sup>
182+
- **Discovery sources**
181183
- **First seen**
182184
- **Last device update**<sup\*</sup>
183185
- **Tags**<sup\*</sup>
@@ -204,6 +206,7 @@ You can sort the entries by clicking on an available column header. Select :::im
204206
- **Criticality level**<sup\*</sup>
205207
- **Sensor health state**<sup\*</sup>
206208
- **Onboarding status**<sup\*</sup>
209+
- **Discovery sources**
207210
- **Last device update**<sup\*</sup>
208211
- **First seen**
209212
- **Tags**<sup\*</sup>
@@ -219,6 +222,7 @@ You can sort the entries by clicking on an available column header. Select :::im
219222
- **Vendor**<sup>\*</sup>
220223
- **Model**<sup>\*</sup>
221224
- **Name**<sup>\*</sup>
225+
- **Discovery sources**
222226
- **Domain**
223227
- **Device type**
224228
- **Device subtype**
@@ -241,6 +245,7 @@ You can sort the entries by clicking on an available column header. Select :::im
241245
- **Model**<sup>\*</sup>
242246
- **Risk level**<sup>\*</sup>
243247
- **Exposure level**<sup>\*</sup>
248+
- **Discovery sources**
244249
- **OS distribution**<sup>\*</sup>
245250
- **OS version**<sup>\*</sup>
246251
- **First seen**
@@ -253,6 +258,7 @@ You can sort the entries by clicking on an available column header. Select :::im
253258
- **Name**<sup>\*</sup>
254259
- **Vendor**<sup>\*</sup>
255260
- **IP**<sup>\*</sup>
261+
- **Discovery sources**
256262
- **MAC address**
257263
- **Risk level**
258264
- **Exposure level**

defender-xdr/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -154,6 +154,8 @@
154154
href: dlp-investigate-alerts-defender.md
155155
- name: Investigate data loss prevention alerts with Microsoft Sentinel
156156
href: dlp-investigate-alerts-sentinel.md
157+
- name: Investigate and respond to container threats
158+
href: investigate-respond-container-threats.md
157159
- name: Alerts
158160
href: investigate-alerts.md
159161
- name: Alert classification playbooks

defender-xdr/activate-defender-rbac.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier3
1313
ms.custom:
1414
ms.topic: how-to
15-
ms.date: 09/30/2024
15+
ms.date: 11/17/2024
1616
ms.reviewer:
1717
search.appverid: met150
1818
---
@@ -29,6 +29,7 @@ search.appverid: met150
2929
- [Microsoft Defender for Office 365 P2](https://go.microsoft.com/fwlink/?LinkID=2158212)
3030
- [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management)
3131
- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
32+
- [Microsoft Security Exposure Management](/security-exposure-management/)
3233

3334
For the Microsoft Defender XDR security portal to start enforcing the permissions and assignments configured in your new [custom roles](create-custom-rbac-roles.md) or [imported roles](import-rbac-roles.md), you must activate the Microsoft Defender XDR Unified RBAC model for some or all of your workloads.
3435

@@ -54,20 +55,19 @@ You can activate your workloads in two ways from the Permissions and roles page:
5455
:::image type="content" source="/defender/media/defender/m365-defender-rbac-activate-workloads1.png" alt-text="Screenshot of the activate workloads page" lightbox="/defender/media/defender/m365-defender-rbac-activate-workloads1.png":::
5556

5657
1. **Activate workloads**
57-
- Select **Activate workloads** on the banner above the list of roles to go directly to the **Activate workloads** screen.
58-
- You must activate each workload one by one. Once you select the individual toggle, you activate (or deactivate) that workload.
5958

60-
:::image type="content" source="/defender/media/defender/defender-rbac-select-workload.png" alt-text="Screenshot of the choose workloads to activate screen":::
59+
- Select **Activate workloads** on the banner above the list of roles to go directly to the **Activate workloads** screen.
60+
- You must activate each workload one by one. Once you select the individual toggle, you activate (or deactivate) that workload.
61+
62+
:::image type="content" source="/defender/media/defender/urbac-activate-workloads.png" alt-text="Screenshot of the choose workloads to activate screen":::
6163

6264
> [!NOTE]
6365
> The **Activate workloads** button is only available when there is it at least one workload that's not active for Microsoft Defender XDR Unified RBAC.
64-
>
6566
> Microsoft Defender for Cloud is active by default with Microsoft Defender XDR Unified RBAC.
66-
>
67-
> Defender XDR Unified RBAC is automatically active for Secure Score access. Once a custom role with one of the permissions is created, it has an immediate impact on assigned users. There is no need to activate it.
67+
> Defender XDR Unified RBAC is automatically active for Exposure Management access. Once a custom role with one of the Exposure Management permissions is created, it has an immediate impact on assigned users. There is no need to activate it.
6868
>
6969
> To activate Exchange Online permissions in Microsoft Defender XDR Unified RBAC, Defender for Office 365 permissions must be active.
70-
70+
7171
2. **Workload settings**
7272
- Select **Workload settings**.
7373
- This brings you to the Microsoft Defender XDR **Permission and roles** page.

defender-xdr/create-custom-rbac-roles.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ search.appverid: met150
2929
- [Microsoft Defender for Office 365 P2](https://go.microsoft.com/fwlink/?LinkID=2158212)
3030
- [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management)
3131
- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
32+
- [Microsoft Security Exposure Management](/security-exposure-management/)
3233

3334
## Create a custom role
3435

defender-xdr/custom-permissions-details.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ In Microsoft Defender XDR Unified role-based access control (RBAC) you can selec
3131
- [Microsoft Defender for Office 365 P2](https://go.microsoft.com/fwlink/?LinkID=2158212)
3232
- [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management)
3333
- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
34+
- [Microsoft Security Exposure Management](/security-exposure-management/)
3435

3536
<a name='microsoft-365-defender-unified-rbac-permission-details'></a>
3637

@@ -74,7 +75,7 @@ Permissions for managing the organization's security posture and performing vuln
7475
|Remediation handling|Manage|Create remediation tickets, submit new requests, and manage remediation activities in Defender Vulnerability Management.|
7576
|Application handling|Manage|Manage vulnerable applications and software, including blocking and unblocking them in Defender Vulnerability Management.|
7677
|Security baseline assessment|Manage|Create and manage profiles so you can assess if your devices comply to security industry baselines.|
77-
|Exposure Management|Read / Manage|View or manage Secure Score recommendations from all products included in Secure Score.|
78+
|Exposure Management|Read / Manage|View or manage Exposure Management insights, including Microsoft Secure Score recommendations from all products that are covered by Secure Score.|
7879

7980
### Authorization and settings
8081

defender-xdr/edit-delete-rbac-roles.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ search.appverid: met150
2929
- [Microsoft Defender for Office 365 P2](https://go.microsoft.com/fwlink/?LinkID=2158212)
3030
- [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management)
3131
- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
32+
- [Microsoft Security Exposure Management](/security-exposure-management/)
3233

3334
In Microsoft Defender XDR Unified role-based access control (RBAC), you can edit and delete custom roles or roles that were imported from Defender for Endpoint, Defender for Identity, or Defender for Office 365.
3435

Lines changed: 111 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,111 @@
1+
---
2+
title: Investigate and respond to container threats in the Microsoft Defender portal
3+
description: Investigate and respond to container attacks and threats with cloud investigation and response actions in the Microsoft Defender portal.
4+
ms.service: defender-xdr
5+
f1.keywords:
6+
- NOCSH
7+
ms.author: diannegali
8+
author: diannegali
9+
ms.localizationpriority: medium
10+
manager: deniseb
11+
audience: ITPro
12+
ms.collection:
13+
- m365-security
14+
- tier1
15+
ms.topic: conceptual
16+
search.appverid:
17+
- MOE150
18+
- MET150
19+
ms.date: 11/18/2024
20+
appliesto:
21+
- Microsoft Defender XDR
22+
---
23+
# Investigate and respond to container threats in the Microsoft Defender portal
24+
25+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
26+
27+
> [!IMPORTANT]
28+
> Some information in this article relates to a prereleased product, which may be substantially modified before it’s commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here
29+
30+
Security operations can now investigate and respond to container-related alerts in near real-time in the Microsoft Defender portal with the integration of cloud-native response actions and investigation logs to hunt for related activities. The availability of attack paths can also help analysts immediately investigate and address critical security issues to prevent a potential breach.
31+
32+
As organizations use containers and Kubernetes on platforms like Azure Kubernetes Service (AKS), Google Kubernetes Engine (GKE), ad Amazon Elastic Kubernetes Service (EKS), the attack surface expands, increasing security challenges. Containers can also be targeted by threat actors and used for malicious purposes.
33+
34+
Security operations center (SOC) analysts can now easily track container threats with near real-time alerts and immediately respond to these threats by isolating or terminating container pods. This integration allows analysts to instantly mitigate a container attack from their environment in a click.
35+
36+
Analysts can then investigate the full scope of the attack with the ability to hunt for related activities within the incident graph. They can also further apply preventive actions with the availability of potential attack paths in the incident graph. Using the information from the attack paths allows security teams to inspect the paths and prevent possible breaches. In addition, Threat analytics reports specific to container threats and attacks are available for analysts to gain more information and apply recommendations for container attack response and prevention.
37+
38+
## Prerequisites
39+
40+
The following licenses are required to view and resolve container-related alerts in the Microsoft Defender portal:
41+
42+
- [Microsoft Defender for Containers](/azure/defender-for-cloud/defender-for-containers-introduction)
43+
- [Microsoft Defender XDR](prerequisites.md#licensing-requirements)
44+
45+
> [!NOTE]
46+
> The **isolate pod** response action requires a network policy enforcer. Check whether your Kubernetes cluster has a network policy installed.
47+
48+
Users on the [Microsoft Defender for Cloud Security Posture Management](/azure/defender-for-cloud/concept-cloud-security-posture-management) plan can view attack paths in the incident graph.
49+
50+
Users with provisioned access to [Microsoft Security Copilot](/copilot/security/microsoft-security-copilot) can also take advantage of the [guided responses](security-copilot-m365d-guided-response.md) to investigate and remediate container threats.
51+
52+
## Permissions
53+
54+
To perform any of the response actions, users must have the following permissions for Microsoft Defender for Cloud in the Microsoft Defender XDR unified role-based access control:
55+
56+
|Permission name|Level|
57+
|:---|:---|
58+
|Alerts|Manage|
59+
|Response|Manage|
60+
61+
For more information on these permissions, see [Permissions in Microsoft Defender XDR Unified role-based access control (RBAC)](custom-permissions-details.md).
62+
63+
## Investigate container threats
64+
65+
To investigate container threats in the Microsoft Defender portal:
66+
67+
1. Select **Investigation & response > Incidents and alerts** in the left-hand navigation menu to open the incident or alert queues.
68+
2. In the queue, select **Filter** and choose **Microsoft Defender for Cloud > Microsoft Defender for Containers** under Service source.
69+
:::image type="content" source="/defender/media/defender-containers/incident-queue-small.png" alt-text="Incident queue filtered to show container-related incidents." lightbox="/defender/media/defender-containers/incident-queue.png":::
70+
3. In the incident graph, select the pod/service/cluster entity you need to investigate. Select **Kubernetes service details**, **Kubernetes pod details**, **Kubernetes cluster details**, or **Container registry details** to view relevant information about the service, pod, or registry.
71+
72+
Using [Threat analytics](threat-analytics.md) reports, analysts can utilize threat intelligence from expert Microsoft security researchers to learn about active threat actors and campaigns exploiting containers, new attack techniques that might affect containers, and prevalent threats that affect containers.
73+
74+
Access threat analytics reports from **Threat intelligence > Threat analytics**. You can also open a specific report from the incident page by selecting **View threat analytics report** under **Related threats** on the incident side pane.
75+
76+
:::image type="content" source="/defender/media/defender-containers/view-threat-analytics-small.png" alt-text="Highlighting how to view threat analytics reports from the incident page." lightbox="/defender/media/defender-containers/view-threat-analytics.png":::
77+
78+
Threat analytics reports also contain relevant mitigation, recovery, and prevention methods that analysts can assess and apply to their environment. Using the information in threat analytics reports helps SOC teams defend and protect their environment from container attacks. Here’s an example of an analyst report about a container attack.
79+
80+
:::image type="content" source="/defender/media/defender-containers/threat-analytics-sample-small.png" alt-text="Sample page of a container attack threat analytics report." lightbox="/defender/media/defender-containers/threat-analytics-sample.png":::
81+
82+
## Respond to container threats
83+
84+
You can **isolate** or **terminate** a pod once you determine that a pod is compromised or malicious. In the incident graph, select the pod then go to **Actions** to view the available response actions. You can also find these response actions on the entity side pane.
85+
86+
:::image type="content" source="/defender/media/defender-containers/container-actions-small.png" alt-text="Highlighting the cloud response actions in an incident." lightbox="/defender/media/defender-containers/container-actions.png":::
87+
88+
You can release a pod from isolation with the **release from isolation** action once your investigation is complete. This option appears on the side pane for isolated pods.
89+
90+
Details of all response actions can be viewed in the [Action center](m365d-action-center.md). In the Action center page, select the response action you want to inspect to view more information about the action like which entity was acted on, when the action was done, and view the comments on the action. For isolated pods, the **release from isolation** action is also available in the Action center details pane.
91+
92+
:::image type="content" source="/defender/media/defender-containers/action-center-sample-small.png" alt-text="Sample of cloud response actions listed in the Action center." lightbox="/defender/media/defender-containers/action-center-sample.png":::
93+
94+
## Hunt for container-related activities
95+
96+
To determine the full scope of a container attack, you can deepen your investigation with the **Go hunt** action available in the incident graph. You can immediately view all process events and activities related to container-related incidents from the incident graph.
97+
98+
:::image type="content" source="/defender/media/defender-containers/azure-go-hunt-small.png" alt-text="Highlighting the go hunt action in the incident graph." lightbox="/defender/media/defender-containers/azure-go-hunt.png":::
99+
100+
In the [Advanced hunting](advanced-hunting-overview.md) page, you can extend your search for container-related activities using the **CloudProcessEvents** and **CloudAuditEvents** tables.
101+
102+
:::image type="content" source="/defender/media/defender-containers/adv-hunting-cloud-small.png" alt-text="Highlighting the advanced hunting tables related to cloud events." lightbox="/defender/media/defender-containers/adv-hunting-cloud.png":::
103+
104+
The **CloudProcessEvents** table contains information about process events in multi-cloud hosted environments such as Azure Kubernetes Service, Amazon Elastic Kubernetes Service, and Google Kubernetes Engine.
105+
106+
The **CloudAuditEvents table** contains cloud audit events from cloud platforms protected by Microsoft Defender for Cloud. It also contains Kubeaudit logs, which holds information about Kubernetes-related events.
107+
108+
## See also
109+
110+
- [Microsoft Defender for Containers architecture](/azure/defender-for-cloud/defender-for-containers-architecture?tabs=defender-for-container-arch-aks)
111+
- [Kubeaudit events in advanced hunting](/azure/defender-for-cloud/kubeaudit-events-advanced-hunting)

0 commit comments

Comments
 (0)