Forum Widgets
Latest Discussions
Microsoft Defender for Cloud compute recommendations
Is there a current offline copy inExcel format of all compute recommendations in Microsoft Defender for Cloud such asMCSB? Reference table for all compute security recommendations in Microsoft Defender for Cloud - Microsoft Defender for Cloud | Microsoft LearnBlogMIOct 25, 2024Copper Contributor215Views0likes3CommentsPossible to Disable Defender on individual Storage Accounts?
Hi folks, The gist is that we have Azure Defender enabled at a Subscription level. With that comes Advanced Threat Protection for Storage Accounts which is chargedper transaction within those Storage Accounts. We have four storage accounts out of 176 that are very highly transactional and the monthly billing for Advanced Threat Protection is close to $1,000. They are internal storage accounts with very limited public exposure so we are not worried about threatswithin those transactions. Our ideal scenario would be to keep Defender enabled at the subscription level for all of our Storage accounts and all future storage accounts but not be billed for (or use) Advanced Threat Protection. It seems like this cmdlet: https://docs.microsoft.com/en-us/powershell/module/az.security/disable-azsecurityadvancedthreatprotection?view=azps-6.3.0 Should do the job, but it does not. Either it does not disable ATP or it does not disable the billing. In either of those cases it does not do what we need. After 2.5 months or trying to work through it the only option I have been given is to disable Defender at the Subscription level for all of our Storage Accounts, and then re-enable the 172 storage accounts that we do want Defender for individually via PS. That will and does work, but it will require overhead on our part to ensure they all stay enabled and that any future accounts are enabled by the creator and none get missed. Do we have any other avenues to suppress Advanced Threat Protection on a subset of accounts within a Subscription?SolvedCSP_MOOct 24, 2024Copper Contributor14KViews0likes11CommentsNew Blog | Enhancing Server and Container Risk Score Analysis in Power BI
Byiulio Astori Microsoft Defender for Cloud provides vulnerability assessments for both virtual machines (servers) and container images, identifying vulnerabilities as Common Vulnerabilities and Exposures (CVEs). The risk posed by each CVE is assessed using the Common Vulnerability Scoring System (CVSS), providing a standardized numerical score that ranges from 0.0 to 10.0, translated into severity ratings like Low, Medium, High, or Critical. While Microsoft Defender for Cloud provides a robust risk level assessment for each resource, there is an opportunity to enhance this by integrating additional factors such as the exploitability of each CVE, the age since it was made public, and whether the CVE is a zero-day vulnerability. Additionally, resources themselves have contextual elements such as the number of attack paths, which can significantly impact their overall risk. The Power BI solution builds Defender for Cloud's capabilities by integrating these multiple factors, providing a more comprehensive risk score for each resource and enhancing the prioritization of vulnerabilities requiring urgent remediation. This combined approach allows users to generate a more accurate top-down list of resources needing attention. Read the full post here:Enhancing Server and Container Risk Score Analysis in Power BI154Views1like0CommentsNew Blog | New E-book: Building a Comprehensive API Security Strategy
ByLoren Goduti APIs are everywhere – they are proliferating at a rapid pace, therefore, making them a prime target for attackers. Thus, having a plan to secure protect your APIs as part of your overall cybersecurity strategy is critical for protecting your business, as well as sensitive user data. We are excited to share our newest e-book:Building a Comprehensive API Security Strategy Read the full post here:New E-book: Building a Comprehensive API Security Strategy215Views0likes2CommentsUnable to View Audit Logs
Hi all! I am once again coming to you, asking for assistance. We had a security alert in Azure and I was able to go all the way through to see what the issue was, BUT when I try to go into the "View Suspicious Activity" page I get the below. Now multiple users in my team get the same as me, but one user can see everything in here. He's not even in the resource with any permissions yet he can see these logs. Am I missing something really obvious? Or is this another fun little bug? Thanks in advance393Views0likes1CommentHow often is the underlying condition scanned for this recommendation? (perms of inactive identities
Permissions of inactive identities in your Azure subscription should be revoked It seems to be quite a long interval. Is there any way to accelerate it?golive35Oct 17, 2024Microsoft164Views0likes0CommentsDisable Defender for Servers at resource level
See snippet from MS article below - cant seem to find any guidance on how to disable at resource level and what the caveats are. If i have it enabled at the subscription for P1 then now do i go about with the following: * Disable on certain machines * understand if im still being billed even with it disabled * how do i do this at scale Disable Defender for Servers on the resource level To disable The Defender for Servers plan or any of the features of the plan, navigate to the subscription or workspace and toggle the plan toOff. On the resource level, you can enable or disable Defender for Servers plan 1. Plan 2 can only be disabled at the resource level For example, it’s possible to enable Defender for Servers plan 2 at the subscription level and disable specific resources within the subscription. You can't enable plan 2 only on specific resources.SolvedikazimirsOct 14, 2024Copper Contributor534Views0likes3CommentsSQL servers on machines AMA Not Reflected In Resource Count
I have enabledSQL servers on machines at a subscription level: I can see that the protection has been enabled on the SQL virtual machine resources within the subscription: I can also see the ATP and Scan status data being ingested into the configured Log Analytics workspace as well as vulnerability assessment results on the SQL virtual machine underMicrosoft Defender for Cloud so all seems to be working. The issue is that Defender is not reflecting Resource quantity: Is anyone able to advise why this would be the case and how I can go about getting this to update? I am using the custom Log Analytics workspace option which is situated in a different subscription. I have also noted that a subscription with the legacy Log Analytics agent solution for the SQL servers on machines seems to reflect the Resource quantity correctly, could this be the difference?TyranVanDerMerweOct 11, 2024Copper Contributor206Views0likes0Comments
Tags
- cloud security90 Topics
- cloud security posture management31 Topics
- security31 Topics
- Azure Defender for Servers20 Topics
- azure19 Topics
- threat protection19 Topics
- Microsoft Defender for Endpoint18 Topics
- Vulnerabilities15 Topics
- Best Practices12 Topics
- Security Controls12 Topics