Skip to content

Commit 6f574d7

Browse files
authored
changed files by pdets auto publish service, publishid[694f81df-c4e5-43c7-a0f9-8b8d015e04d2] and do [publish].
1 parent d435eee commit 6f574d7

File tree

27 files changed

+22
-22
lines changed

27 files changed

+22
-22
lines changed

learn-pr/wwl-azure/microsoft-defender-cloud-security-posture/includes/2-implement-microsoft-defender-for-cloud.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ Microsoft Defender for Cloud is a cloud-native application protection platform (
22

33
For an interactive overview of how to Manage your cloud security posture with Microsoft Defender for Cloud, **click on the image below**.
44

5-
[:::image type="content" source="../media/manage-cloud-security-posture-microsoft-defender-cloud-landing-page-8605516a.png" alt-text="Screenshot of the interactive guide landing page for Manage your cloud security posture with Microsoft Defender for Cloud.":::
5+
[:::image type="content" source="../media/manage-cloud-security-posture-microsoft-defender-cloud-landing-page-8605516a-ae32fc61.png" alt-text="Screenshot of the interactive guide landing page for Manage your cloud security posture with Microsoft Defender for Cloud.":::
66
](https://mslearn.cloudguides.com/guides/Manage%20your%20cloud%20security%20posture%20with%20Microsoft%20Defender%20for%20Cloud)
77

88
Defender for Cloud combines the capabilities of:

learn-pr/wwl-azure/microsoft-defender-cloud-security-posture/includes/3-secure-score.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -11,26 +11,26 @@ Defender for Cloud continually assesses your cross-cloud resources for security
1111

1212
- In the Azure portal pages, the secure score is shown as a percentage value, and the underlying values are also clearly presented:
1313

14-
:::image type="content" source="../media/single-secure-score-via-ui-1-fb053ea6.png" alt-text="Screenshot showing security poster page.":::
14+
:::image type="content" source="../media/single-secure-score-via-ui-1-fb053ea6-c6539f78.png" alt-text="Screenshot showing security poster page.":::
1515

1616

1717
- In the Azure mobile app, the secure score is shown as a percentage value, and you can tap the secure score to see the details that explain the score:
1818

19-
:::image type="content" source="../media/single-secure-score-via-mobile1a-0a8df228.png" alt-text="Screenshot showing secure score results.":::
19+
:::image type="content" source="../media/single-secure-score-via-mobile1a-0a8df228-4ffb230b.png" alt-text="Screenshot showing secure score results.":::
2020

2121

2222
To increase your security, review Defender for Cloud's recommendations page and remediate the recommendation by implementing the remediation instructions for each issue. Recommendations are grouped into security controls. Each control is a logical group of related security recommendations and reflects your vulnerable attack surfaces. Your score only improves when you *remediate all* of the recommendations for a *single resource within a control*. To see how well your organization is securing each individual attack surface, review the scores for each security control.
2323

2424
## How your secure score is calculated
2525

26-
:::image type="content" source="../media/security-controls-large-2c356a99.png" alt-text="Screenshot showing Microsoft Defender for Cloud recommendations page.":::
26+
:::image type="content" source="../media/security-controls-large-2c356a99-1403136f.png" alt-text="Screenshot showing Microsoft Defender for Cloud recommendations page.":::
2727

2828

2929
To get all the possible points for security control, all of your resources must comply with all of the security recommendations within the security control. For example, Defender for Cloud has multiple recommendations regarding how to secure your management ports. You'll need to remediate them all to make a difference to your secure score.
3030

3131
## Example scores for a control
3232

33-
:::image type="content" source="../media/remediate-vulnerabilities-control-large-354f7019.png" alt-text="Screenshot showing Microsoft Defender for Cloud example scores for a control.":::
33+
:::image type="content" source="../media/remediate-vulnerabilities-control-large-354f7019-55f011bd.png" alt-text="Screenshot showing Microsoft Defender for Cloud example scores for a control.":::
3434

3535

3636
**In this example**:
@@ -42,19 +42,19 @@ To get all the possible points for security control, all of your resources must
4242
- Insights - Gives you extra details for each recommendation, such as:
4343

4444

45-
- :::image type="content" source="../media/preview-icon-d9b46adc.png" alt-text="Screenshot of the preview recommendation icon that provides extra detail.":::
45+
- :::image type="content" source="../media/preview-icon-d9b46adc-1b64ef91.png" alt-text="Screenshot of the preview recommendation icon that provides extra detail.":::
4646

4747

4848
Preview recommendation - This recommendation won't affect your secure score until general availability (GA).
49-
- :::image type="content" source="../media/fix-icon-c7b18e7c.png" alt-text="Screenshot of the fix icon that enables you to resolve issues.":::
49+
- :::image type="content" source="../media/fix-icon-c7b18e7c-8b8c6189.png" alt-text="Screenshot of the fix icon that enables you to resolve issues.":::
5050

5151

5252
Fix - From within the recommendation details page, you can use 'Fix' to resolve this issue.
53-
- :::image type="content" source="../media/enforce-icon-cd64da95.png" alt-text="Screenshot of the enforce icon that enables you to automatically deploy a policy to fix an issue.":::
53+
- :::image type="content" source="../media/enforce-icon-cd64da95-b65e146e.png" alt-text="Screenshot of the enforce icon that enables you to automatically deploy a policy to fix an issue.":::
5454

5555

5656
Enforce - From within the recommendation details page, you can automatically deploy a policy to fix this issue whenever someone creates a non-compliant resource.
57-
- :::image type="content" source="../media/deny-icon-4444b813.png" alt-text="Screenshot of the deny icon that enables you to prevent new resources from being created with identified issues.":::
57+
- :::image type="content" source="../media/deny-icon-4444b813-bcf93499.png" alt-text="Screenshot of the deny icon that enables you to prevent new resources from being created with identified issues.":::
5858

5959

6060
Deny - From within the recommendation details page, you can prevent new resources from being created with this issue.
@@ -65,7 +65,7 @@ To get all the possible points for security control, all of your resources must
6565
- Recommendations flagged as Preview aren't included in the calculations of your secure score. They should still be remediated wherever possible so that when the preview period ends, they'll contribute towards your score.
6666
- Preview recommendations are marked with:
6767

68-
:::image type="content" source="../media/preview-icon-d9b46adc.png" alt-text="Screenshot of the preview recommendations icon for secure score options after General Availability.":::
68+
:::image type="content" source="../media/preview-icon-d9b46adc-1b64ef91.png" alt-text="Screenshot of the preview recommendations icon for secure score options after General Availability.":::
6969

7070

7171
## Improve your secure score

learn-pr/wwl-azure/microsoft-defender-cloud-security-posture/includes/4-regulatory-compliance-dashboard.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ You can use the information in the regulatory compliance dashboard to investigat
3030
4. Select a compliance control to expand it.<br>
3131
5. Select **Control details**.<br>
3232

33-
:::image type="content" source="../media/new-control-details-6b59bc2b.png" alt-text="Screenshot showing the Defender for Cloud Regulatory compliance Control details.":::
33+
:::image type="content" source="../media/new-control-details-6b59bc2b-43f4c38a.png" alt-text="Screenshot showing the Defender for Cloud Regulatory compliance Control details.":::
3434

3535

3636
- Select Overview to see the specific information about the Control you selected.
@@ -39,7 +39,7 @@ You can use the information in the regulatory compliance dashboard to investigat
3939

4040
6. Under **Your Actions**, you can select a down arrow to view more details and resolve the recommendation for that resource.
4141

42-
:::image type="content" source="../media/new-your-actions-45615309.png" alt-text="Screenshot showing how to to view more details and resolve the recommendation for a resource.":::
42+
:::image type="content" source="../media/new-your-actions-45615309-1429d34d.png" alt-text="Screenshot showing how to to view more details and resolve the recommendation for a resource.":::
4343

4444

4545
> [!NOTE]
@@ -58,12 +58,12 @@ The regulatory compliance has both automated and manual assessments that might n
5858
5. Select any of the failing assessments that appear in the dashboard to view the details for that recommendation. Each recommendation includes a set of remediation steps to resolve the issue.<br>
5959
6. Select a particular resource to view more details and resolve the recommendation for that resource.<br>
6060

61-
:::image type="content" source="../media/new-sample-recommendation-example-273b7ee0.png" alt-text="Screenshot showing that disk encryption should be applied on virtual machines.":::
61+
:::image type="content" source="../media/new-sample-recommendation-example-273b7ee0-e45ce999.png" alt-text="Screenshot showing that disk encryption should be applied on virtual machines.":::
6262

6363

6464
7. In this example, when you select **Take action** from the recommendation details page, you arrive in the Azure Virtual Machine pages of the Azure portal, where you can enable encryption from the **Security** tab:
6565

66-
:::image type="content" source="../media/new-encrypting-virtual-machine-disks-4949d026.png" alt-text="Screenshot showing how to enable encryption from the Security tab.":::
66+
:::image type="content" source="../media/new-encrypting-virtual-machine-disks-4949d026-086e2964.png" alt-text="Screenshot showing how to enable encryption from the Security tab.":::
6767

6868

6969
8. After you take action to resolve recommendations, you'll see the result in the compliance dashboard report because your compliance score improves.

learn-pr/wwl-azure/microsoft-defender-cloud-security-posture/includes/5-microsoft-cloud-security-benchmark.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Automated control monitoring for AWS in Microsoft Defender for Cloud: You can us
1717

1818
Example: Microsoft Defender for Cloud - Regulatory compliance dashboard
1919

20-
:::image type="content" source="../media/new-regulatory-dahaboard-network-security-view-722c2d1b.png" alt-text="Screenshot showing how the Microsoft cloud security benchmark provides prescriptive best practices and recommendations.":::
20+
:::image type="content" source="../media/new-regulatory-dahaboard-network-security-view-722c2d1b-c6bddeae.png" alt-text="Screenshot showing how the Microsoft cloud security benchmark provides prescriptive best practices and recommendations.":::
2121

2222

2323
Azure guidance and security principles: Azure security guidance, security principles, features, and capabilities.

learn-pr/wwl-azure/microsoft-defender-cloud-security-posture/includes/6-microsoft-defender-for-cloud-secure-score.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Defender for Cloud offers the following options for working with security initia
2020

2121
Example: Builtin security initiative
2222

23-
:::image type="content" source="../media/center-for-internet-security-benchmark-example-cd4ac1a6.png" alt-text="Screenshot showing an example of the CIS Microsoft Azure Foundations Benchmark.":::
23+
:::image type="content" source="../media/center-for-internet-security-benchmark-example-cd4ac1a6-58c5a26e.png" alt-text="Screenshot showing an example of the CIS Microsoft Azure Foundations Benchmark.":::
2424

2525

2626
## What is a security policy?
@@ -33,7 +33,7 @@ There are different types of policies in Azure Policy. Defender for Cloud mainly
3333

3434
Example: Built-in security policy
3535

36-
:::image type="content" source="../media/assign-policy-basics-policy-definition-compute-90aece43.png" alt-text="Screenshot showing an example of a basic policy definition to audit VMs without managed disks.":::
36+
:::image type="content" source="../media/assign-policy-basics-policy-definition-compute-90aece43-faccd0c0.png" alt-text="Screenshot showing an example of a basic policy definition to audit VMs without managed disks.":::
3737

3838

3939
Defender for Cloud uses Azure role-based access control (Azure RBAC), which provides built-in roles you can assign to Azure users, groups, and services. When users open Defender for Cloud, they see only information related to the resources they can access. Users are assigned the owner, contributor, or reader role to the resource's subscription.
@@ -43,7 +43,7 @@ There are two specific roles for Defender for Cloud:
4343
1. Security Administrator: Has the same view rights as security reader. Can also update the security policy and dismiss alerts.
4444
2. Security reader: Has rights to view Defender for Cloud items such as recommendations, alerts, policy, and health. Can't make changes.
4545

46-
:::image type="content" source="../media/view-edit-security-policies-17d2ecb9.png" alt-text="Diagram showing which security role can view, update, and dismiss alerts.":::
46+
:::image type="content" source="../media/view-edit-security-policies-17d2ecb9-762da64b.png" alt-text="Diagram showing which security role can view, update, and dismiss alerts.":::
4747

4848

4949
You can edit security policies through the Azure Policy portal via Representational State Transfer Application Programming Interface (REST API) or using Windows PowerShell.

learn-pr/wwl-azure/microsoft-defender-cloud-security-posture/includes/8-microsoft-defender-external-attack-surface-management.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Microsoft Defender External Attack Surface Management (Defender EASM) continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate threats, and extend vulnerability and exposure control beyond the firewall. Attack Surface Insights are generated by leveraging vulnerability and infrastructure data to showcase the key areas of concern for your organization.
22

3-
:::image type="content" source="../media/new-microsoft-defender-external-attack-surface-management-36fb2332.png" alt-text="Screenshot showing the Microsoft Defender External Attack Surface Management dashboard.":::
3+
:::image type="content" source="../media/new-microsoft-defender-external-attack-surface-management-36fb2332-8ec6b2ef.png" alt-text="Screenshot showing the Microsoft Defender External Attack Surface Management dashboard.":::
44

55

66
## Discovery and inventory
@@ -18,21 +18,21 @@ Defender EASM includes the discovery of the following kinds of assets:
1818
- SSL Certificates
1919
- WHOIS Contacts
2020

21-
:::image type="content" source="../media/new-discovery-and-inventory-80f902e9.png" alt-text="Screenshot showing the Defender EASM add discovery group page.":::
21+
:::image type="content" source="../media/new-discovery-and-inventory-80f902e9-558bb71c.png" alt-text="Screenshot showing the Defender EASM add discovery group page.":::
2222

2323

2424
## Dashboards
2525

2626
Defender EASM provides a series of dashboards that help users quickly understand their online infrastructure and any key risks to their organization. These dashboards are designed to provide insight on specific areas of risk, including vulnerabilities, compliance, and security hygiene. These insights help customers quickly address the components of their attack surface that pose the greatest risk to their organization.
2727

28-
:::image type="content" source="../media/new-external-attack-surface-management-security-posture-b6e25dbd.png" alt-text="Screenshot showing the Microsoft Defender External Attack Surface Management Security posture page.":::
28+
:::image type="content" source="../media/new-external-attack-surface-management-security-posture-b6e25dbd-24ebab77.png" alt-text="Screenshot showing the Microsoft Defender External Attack Surface Management Security posture page.":::
2929

3030

3131
## Managing assets
3232

3333
Customers can filter their inventory to surface the specific insights they care about most. Filtering offers a level of flexibility and customization that enables users to access a specific subset of assets. This allows you to leverage Defender EASM data according to your specific use case, whether searching for assets that connect to deprecating infrastructure or identifying new cloud resources.
3434

35-
:::image type="content" source="../media/new-assest-management-9f38538e.png" alt-text="Screenshot showing the Microsoft Defender External Attack Surface Management inventory page.":::
35+
:::image type="content" source="../media/new-assest-management-9f38538e-4d4edc1a.png" alt-text="Screenshot showing the Microsoft Defender External Attack Surface Management inventory page.":::
3636

3737

3838
## User permissions

0 commit comments

Comments
 (0)