Skip to content

Commit d6893f9

Browse files
committed
updates for recommendations
1 parent 7e3c522 commit d6893f9

File tree

2 files changed

+60
-54
lines changed

2 files changed

+60
-54
lines changed

exposure-management/exposure-insights-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ Grayed out metrics aren't considered for score calculation.
9696
9797
## Working with recommendations
9898

99-
Security Exposure Management ingests security recommendations from multiple source, including Expsosure Management, [Microsoft Secure Score](/defender-xdr/microsoft-secure-score), and Microsoft Defender for Cloud. With the integration of Defender for Cloud in the Defender portal, Microsoft Security Exposure Management consolidates all of these recommendations into a unified Recommendations Catalog accessible in the Defender portal.
99+
Security Exposure Management ingests security recommendations from multiple sources, including Exposure Management, [Microsoft Secure Score](/defender-xdr/microsoft-secure-score), and Microsoft Defender for Cloud. With the integration of Defender for Cloud in the Defender portal, Microsoft Security Exposure Management consolidates all of these recommendations into a unified Recommendations Catalog accessible in the Defender portal.
100100

101101
### Unified Recommendations Experience
102102

exposure-management/security-recommendations.md

Lines changed: 59 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.date: 07/30/2025
1313

1414
This article describes how to work with security recommendations in the new unified recommendations experience in [Microsoft Security Exposure Management](microsoft-security-exposure-management.md).
1515

16-
## Prerequisites
16+
## Before you start
1717

1818
- Learn about the [unified recommendations catalog](exposure-insights-overview.md#working-with-recommendations) before you start.
1919
- [Review permissions and prerequisites needed](prerequisites.md) for working with Security Exposure Management.
@@ -34,40 +34,70 @@ You can explore the full breadth of Microsoft's security recommendations without
3434

3535
## Review recommendations
3636

37-
1. In the [Microsoft Defender portal](https://security.microsoft.com), select **Exposure management > Exposure insights > Recommendations** to open the unified [Recommendations](https://security.microsoft.com/exposure-recommendations) page.
37+
1. In the [Microsoft Defender portal](https://security.microsoft.com), select **Exposure management > Recommendations** to open the unified [Recommendations](https://security.microsoft.com/exposure-recommendations) page.
3838

3939
:::image type="content" source="./media/recommendations-navigation.png" alt-text="Screenshot of the recommendations window." lightbox="./media/recommendations-navigation.png":::
4040

4141
### Navigate the new unified recommendations interface
4242

43-
1. **Use the attack surface tabs**: The recommendations are now organized by tabs for different domains:
44-
- **Devices** - Device-related recommendations including misconfigurations and vulnerabilities
45-
- **Cloud** - Multicloud (Azure, AWS, and GCP), hybrid environments and code recommendations with risk-based prioritization.
46-
- **Identity** - Identity-related security recommendations
47-
- **SaaS** - Software-as-a-Service application recommendations
48-
- **Data** - Data protection recommendations
43+
Use the recommendations tabs that are organized by asset type to explore specific recommendation categories:
4944

50-
1. **Separate views for issue types**: On the Devices tab, you'll find separate views for:
51-
- **Misconfigurations** - Configuration-related security issues from MDVM, Microsoft Secure Score, and Security Exposure Management, contributing to the Devices Secure Score
52-
- **Vulnerabilities** - Software vulnerabilities from MDVM requiring patches, preserving the familiar structure, fields, filters, and prioritization logic with the same exposure score
53-
54-
This separation recognizes that misconfigurations and vulnerabilities often represent distinct workflows handled by different personas, allowing for clearer prioritization and ownership.
45+
- **Devices** - Device-related recommendations including misconfigurations and vulnerabilities
46+
- **Cloud assets** - Multicloud (Azure, AWS, and GCP), hybrid environments and code recommendations with risk-based prioritization.
47+
- **SaaS apps** - Software-as-a-Service application recommendations
48+
- **Identities** - Identity-related security recommendations
49+
- **Data** - Data protection recommendations
5550

56-
## Cloud recommendations with risk-based prioritization
51+
#### Filter and sort recommendations
5752

58-
In the Defender portal, cloud recommendations are prioritized by risk, helping you focus on what matters most. The Cloud assets tab presents security recommendations related to cloud assets across your environment with enhanced context. It has separate views for misconfigurations, vulnerabilities, and exposed secrets.
53+
There are several ways to filter and sort recommendations in each category to help you prioritize your security efforts effectively.
5954

60-
:::image type="content" source="media/security-recommendations/cloud-assets-security-recommendations.png" alt-text="Screenshots of cloud assets recommendations tab" lightbox="media/security-recommendations/cloud-assets-security-recommendations.png":::
55+
Sort the recommendations by any of the headings or filter them based on your task needs.
6156

62-
With the integration of Defender for Cloud in the Defender portal, you can also access enhanced cloud recommendations through the unified interface:
57+
Apply advanced filtering using the **Add filter** option to narrow down recommendations by various criteria depending on the recommendation type.
6358

64-
:::image type="content" source="./media/defender-for-cloud-defender-portal/recommendations.png" alt-text="Screenshot of unified cloud recommendations in the Defender portal." lightbox="./media/defender-for-cloud-defender-portal/recommendations.png":::
59+
#### Devices
60+
61+
The Devices tab provides a unified view of device-related security recommendations, combining misconfigurations and vulnerabilities into a single location for easier management.
62+
63+
There are separate views for issue types:
64+
65+
- **Misconfigurations** - Configuration-related security issues from Vulnerability Management, Microsoft Secure Score, and Security Exposure Management, contributing to the Devices Secure Score
66+
- **Vulnerabilities** - Software vulnerabilities from Vulnerability Management requiring patches, preserving the familiar structure, fields, filters, and prioritization logic with the same exposure score
6567

66-
### Cloud Secure Score integration
68+
This separation recognizes that misconfigurations and vulnerabilities often represent distinct workflows handled by different personas, allowing for clearer prioritization and ownership.
6769

68-
The Cloud Secure Score provides comprehensive scoring alongside traditional Secure Score:
70+
## Cloud assets
6971

70-
:::image type="content" source="./media/defender-for-cloud-defender-portal/cloud-secure-score.png" alt-text="Screenshot of Cloud Secure Score in the Defender portal." lightbox="./media/defender-for-cloud-defender-portal/cloud-secure-score.png":::
72+
This tab provides a prioritized list of security actions designed to improve your cloud security posture by addressing vulnerabilities and misconfigurations. These recommendations are ranked by effective risk, helping security teams focus on the most critical threats first.
73+
74+
Apply filters and filter sets such as **Exposed asset**, **Asset risk factors**, **Environment**, **Workload**, **Recommendation maturity** and others.
75+
76+
On the left navigation pane, you can choose to either view all recommendations or view by a specific category.
77+
78+
There are separate views for issue types:
79+
80+
- **Misconfigurations**
81+
- **Vulnerabilities**
82+
- **Exposed Secrets**.
83+
84+
For each view you will view the **Cloud secure score**, **Score history**, **Recommendation by risk level** and how the risk is calculated.
85+
86+
:::image type="content" source="media/security-recommendations/cloud-assets-security-recommendations.png" alt-text="Screenshots of cloud assets recommendations tab" lightbox="media/security-recommendations/cloud-assets-security-recommendations.png":::
87+
88+
> [!NOTE]
89+
> In the Defender portal, some recommendations that previously appeared as a single aggregated item now display as multiple individual recommendations. This change reflects a shift from grouping related findings under one recommendation to listing each recommendation separately.
90+
91+
> - You may notice a longer list of recommendations compared to before. Combined findings (such as vulnerabilities, exposed secrets, or misconfigurations) are now shown individually rather than nested under a parent recommendation.
92+
> - The old grouped recommendations still appear side by side with the new format for now, but they will eventually be deprecated.
93+
> - These recommendations are marked as Preview. This tag indicates that the recommendation is in an early state and does not affect Secure Score yet.
94+
> - Secure Score currently applies to the parent recommendation only, not to each individual item.
95+
>
96+
**Tip**: If you see both formats or recommendations with a Preview tag, this is expected during the transition. The goal is to improve clarity and allow customers to act on specific recommendations more easily.
97+
98+
With the integration of Defender for Cloud in the Defender portal, you can also access enhanced cloud recommendations through the unified interface:
99+
100+
:::image type="content" source="./media/defender-for-cloud-defender-portal/recommendations.png" alt-text="Screenshot of unified cloud recommendations in the Defender portal." lightbox="./media/defender-for-cloud-defender-portal/recommendations.png":::
71101

72102
Key improvements in the cloud recommendations experience include:
73103

@@ -76,40 +106,16 @@ Key improvements in the cloud recommendations experience include:
76106
- **Enhanced data**: Core recommendation data from Azure Recommendations enriched with additional fields and capabilities from Exposure Management
77107
- **Prioritized by criticality**: Greater emphasis on critical issues that pose the highest risk to your organization
78108

79-
## Device vulnerabilities and misconfigurations
80-
81-
The Devices tab maintains familiar functionality while benefiting from the unified catalog structure:
82-
83-
### Device vulnerabilities
84-
85-
- **Preserved experience**: The same table structure, fields, filters, and prioritization logic from MDVM
86-
- **Familiar exposure scoring**: Uses the established exposure score methodology for assessing device vulnerability
87-
- **Integrated workflow**: Part of the unified experience while maintaining specialized vulnerability management workflows
88-
89-
### Device misconfigurations
109+
#### SaaS apps, Identities, and Data tabs
90110

91-
- **Unified data sources**: Combines device-related misconfiguration recommendations from MDVM, Microsoft Secure Score, and Security Exposure Management
92-
- **Secure Score contribution**: Recommendations contribute to the Devices Secure Score following Microsoft's established calculation methodology
93-
- **Enhanced baseline logic**: Based on MDVM's device recommendations enhanced with additional context from other sources
111+
These tabs provide recommendations specific to SaaS applications, identity security, and data protection, respectively. Each tab allows you to filter and sort recommendations to focus on the most relevant security actions for your organization.
94112

95-
1. **Use enhanced filtering and sorting**: Sort the recommendations by any of the headings or filter them based on your task needs. Sorting includes all of the headers:
96-
- **Name** - Recommendation name
97-
- **State** - Compliant or not compliant
98-
- **Impact** - High, low, or medium impact
99-
- **Workload** - Which workload the recommendations relate to
100-
- **Domain** - Device, apps, data, or identity
101-
- **Risk Score** - For cloud recommendations, shows calculated risk score based on asset value and other factors
102-
- **Last calculated** - Last time the recommendation was calculated
103-
- **Last state change** - Last time the recommendation state changed
104-
- **Related initiatives** - The number of related initiatives
105-
- **Related metrics** - The number of related metrics
113+
The recommendations summary on these tabs includes:
106114

107-
1. **Apply advanced filtering**: Filter recommendations by:
108-
- State (compliant, not compliant, etc.)
109-
- Impact level
110-
- Workload source
111-
- Domain/attack surface
112-
- Risk score (for cloud recommendations)
115+
- Their unique secure score
116+
- Score history
117+
- Recommendation by status
118+
- Score comparison
113119

114120
1. Select a recommendation to view and review details.
115121

@@ -125,7 +131,7 @@ You can also review recommendations on the **Recommendations** tab in a specific
125131
- Microsoft Secure Score for Microsoft 365 recommendations
126132
- Other Microsoft workloads as appropriate
127133

128-
1. **Note on unified workflow**: All recommendations, including those from Azure security center, are now visible in MSEM, so you can manage your entire security posture from the unified portal without needing to navigate to separate Azure portals for cloud recommendations.
134+
1. **Note on unified workflow**: All recommendations, including those from Azure security center, are now visible in Exposure Management, so you can manage your entire security posture from the unified portal without needing to navigate to separate Azure portals for cloud recommendations.
129135

130136
## Next steps
131137

0 commit comments

Comments
 (0)