Skip to content

Commit 001ad5e

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-security-docs-pr into wi564984-update-to-SQL-plan
2 parents b01cc86 + b8294b9 commit 001ad5e

10 files changed

Lines changed: 921 additions & 30 deletions

articles/defender-for-cloud/azure-portal-vs-defender-portal-comparison.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Azure portal vs Defender portal feature comparison
33
description: Compare Microsoft Defender for Cloud features and capabilities between the Azure portal and Defender portal experiences to understand the enhanced functionality available in each platform.
44
author: dlanger
55
ms.author: dlanger
6-
ms.topic: product-comparison
7-
ms.date: 10/16/2025
6+
ms.topic: article
7+
ms.date: 03/29/2026
88
ms.service: defender-for-cloud
99
---
1010

@@ -31,7 +31,7 @@ This article provides a comprehensive comparison of Microsoft Defender for Cloud
3131
| Feature name | Azure portal | Defender portal |
3232
|-------------|--------------|-----------------|
3333
| **Security recommendations** | Yes | Yes - Integrated into Exposure Management<br><br>**Note**: In the Defender portal, some recommendations that previously appeared as a single aggregated item now display as multiple individual recommendations. |
34-
| **Asset inventory** | Yes | Yes |
34+
| **Asset inventory** | Yes<br><br>**Note**: Only assets that have security issues detected on them are reflected. | Yes<br><br>**Note**: All discovered resources in customers' environments are reflected, even if there are no security issues detected on them. |
3535
| **Secure score** | Yes | Yes - New risk-based secure score |
3636
| **Data visualization and reporting with Azure Workbooks** | Yes | No |
3737
| **Data exporting** | Yes | No |

articles/defender-for-cloud/defender-for-containers-introduction.md

Lines changed: 28 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,9 @@ Defender for Containers provides real-time threat protection for [supported cont
7676

7777
Threat protection is provided for Kubernetes at the cluster, node, and workload levels. Both sensor-based coverage that requires the [Defender sensor](defender-for-cloud-glossary.md#defender-sensor) and agentless coverage based on analysis of the Kubernetes audit logs are used to detect threats. Security alerts are only triggered for actions and deployments that occur after you enable Defender for Containers on your subscription.
7878

79-
Examples of security events that Microsoft Defenders for Containers monitors include:
79+
### Runtime detection examples
80+
81+
Examples of security events that Microsoft Defender for Containers monitors include:
8082

8183
- Exposed Kubernetes dashboards
8284
- Creation of high privileged roles
@@ -90,6 +92,31 @@ Defender for Cloud monitors the attack surface of multicloud Kubernetes deployme
9092

9193
Defender for Cloud is [integrated with Microsoft Defender XDR](concept-integration-365.md). When Defender for Containers is enabled, security operators can use [Defender XDR to investigate and respond](/defender-xdr/investigate-respond-container-threats) to security issues in supported Kubernetes services.
9294

95+
### Microsoft-maintained container images
96+
97+
Defender for Containers deploys container images that are maintained and updated by Microsoft as part of the runtime protection components. These images are published to Microsoft Container Registry (MCR).
98+
99+
Customers don't modify or patch these images directly. Microsoft maintains and updates them as part of the Defender for Containers release process.
100+
101+
The following images are used by Defender for Containers runtime protection components:
102+
103+
| Image | Purpose | MCR path |
104+
|---|---|---|
105+
| `security-publisher` | Publishes security findings collected from Kubernetes environments | `mcr.microsoft.com/azuredefender/stable/security-publisher` |
106+
| `low-level-collector` | Collects low-level runtime telemetry from Kubernetes nodes | `mcr.microsoft.com/azuredefender/stable/low-level-collector` |
107+
| `pod-collector` | Collects Kubernetes pod runtime data used for threat detection | `mcr.microsoft.com/azuredefender/stable/pod-collector` |
108+
| `anti-malware-collector` | Collects malware detection signals for container workloads | `mcr.microsoft.com/azuredefender/stable/anti-malware-collector` |
109+
| `old-file-cleaner` | Cleans up temporary and stale files as part of initialization workflows | `mcr.microsoft.com/azuredefender/stable/old-file-cleaner` |
110+
| `audit-logs-enabler` | Enables audit log collection for supported environments (for example, on-premises clusters) | `mcr.microsoft.com/azuredefender/stable/audit-logs-enabler` |
111+
| `defender-admission-controller` | Enforces runtime gating policies for Kubernetes workloads | `mcr.microsoft.com/mdc/prd/defender-admission-controller` |
112+
113+
Updates are delivered through the deployment mechanism used by your environment. For example:
114+
115+
- When deployed using the **AKS add-on**, updates are delivered through the AKS release lifecycle.
116+
- When deployed using **Helm**, updates are released within 30 days through updated chart versions.
117+
118+
If you detect a vulnerability in a Microsoft-maintained Defender image, open an Azure support request and include the image name, tag, and CVE identifier.
119+
93120
## Learn more
94121

95122
Learn more about Defender for Containers in the following blogs:

articles/defender-for-cloud/recommendations-reference-app-services.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,12 @@ To learn about actions that you can take in response to these recommendations, s
5454

5555
**Severity**: Low
5656

57+
### Custom service accounts should be configured for App Engine applications
58+
59+
**Description**: Defender for Cloud identified the use of the default App Engine service account for your applications. This poses a risk because default accounts are often granted broad permissions, such as the Editor role, at the project level, which can be exploited if compromised. Custom service accounts restrict permissions to only those needed for operations, minimizing potential exposure and following the principle of least privilege.
60+
61+
**Severity**: Medium
62+
5763
### Diagnostic logs in App Service should be enabled
5864

5965
**Description**: Audit enabling of diagnostic logs on the app.
@@ -69,6 +75,12 @@ This enables you to recreate activity trails for investigation purposes if a sec
6975

7076
**Severity**: Medium
7177

78+
### Identity-Aware Proxy protection should be enabled on App Engine applications
79+
80+
**Description**: Defender for Cloud identified that Identity-Aware Proxy (IAP) is disabled in App Engine applications. IAP is a centralized authorization layer for HTTPS that verifies user identities and enforces contextual access controls before requests reach your application. Without IAP, your App Engine may be exposed to unauthorized access, increasing the risk of exploitation. Enabling IAP is recommended to strengthen your application's security.
81+
82+
**Severity**: Medium
83+
7284
### FTPS should be required in API apps
7385

7486
**Description**: Enable FTPS enforcement for enhanced security

articles/defender-for-cloud/recommendations-reference-compute.md

Lines changed: 82 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article lists all Microsoft Defender for Cloud compute securit
44
author: Elazark
55
ms.service: defender-for-cloud
66
ms.topic: reference
7-
ms.date: 05/18/2025
7+
ms.date: 03/30/2026
88
ms.author: elkrieger
99
ms.custom: generated
1010
ai-usage: ai-assisted
@@ -45,10 +45,10 @@ To learn about actions that you can take in response to these recommendations, s
4545

4646
**Severity**: High
4747

48-
### Allowlist rules in your adaptive application control policy should be updated
48+
### Allow list rules in your adaptive application control policy should be updated
4949

5050
**Description**: Monitor for changes in behavior on groups of machines configured for auditing by Defender for Cloud's adaptive application controls. Defender for Cloud uses machine learning to analyze the running processes on your machines and suggest a list of known-safe applications. These are presented as recommended apps to allow in adaptive application control policies.
51-
(Related policy: [Allowlist rules in your adaptive application control policy should be updated](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f123a3936-f020-408a-ba0c-47873faf1534)).
51+
(Related policy: [Allow list rules in your adaptive application control policy should be updated](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f123a3936-f020-408a-ba0c-47873faf1534)).
5252

5353
**Severity**: High
5454

@@ -279,7 +279,7 @@ Replaces the older recommendation *Virtual machines should encrypt temp disks, c
279279

280280
### Linux virtual machines should use only signed and trusted boot components
281281

282-
**Description**: With Secure Boot enabled, all OS boot components (boot loader, kernel, kernel drivers) must be signed by trusted publishers. Defender for Cloud has identified untrusted OS boot components on one or more of your Linux machines. To protect your machines from potentially malicious components, add them to your allowlist or remove the identified components.
282+
**Description**: With Secure Boot enabled, all OS boot components (boot loader, kernel, kernel drivers) must be signed by trusted publishers. Defender for Cloud has identified untrusted OS boot components on one or more of your Linux machines. To protect your machines from potentially malicious components, add them to your allow list or remove the identified components.
283283
(No related policy)
284284

285285
**Severity**: Low
@@ -711,7 +711,7 @@ To learn more about the supported runtimes that this control checks for the supp
711711

712712
**Severity**: Low
713713

714-
## GCP Compute recommendations
714+
## Additional GCP Compute recommendations
715715

716716
### Compute Engine VMs should use the Container-Optimized OS
717717

@@ -771,7 +771,7 @@ If you enable the interactive serial console on an instance, clients can attempt
771771
A virtual machine instance has four virtual serial ports. Interacting with a serial port is similar to using a terminal window, in that input and output is entirely in text mode and there's no graphical interface or mouse support.
772772
The instance's operating system, BIOS, and other system-level entities often write output to the serial ports, and can accept input such as commands or answers to prompts.
773773
Typically, these system-level entities use the first serial port (port 1) and serial port 1 is often referred to as the serial console.
774-
The interactive serial console doesn't support IP-based access restrictions such as IP allowlists. If you enable the interactive serial console on an instance, clients can attempt to connect to that instance from any IP address.
774+
The interactive serial console doesn't support IP-based access restrictions such as IP allow lists. If you enable the interactive serial console on an instance, clients can attempt to connect to that instance from any IP address.
775775
This allows anybody to connect to that instance if they know the correct SSH key, username, project ID, zone, and instance name.
776776
Therefore interactive serial console support should be disabled.
777777

@@ -995,6 +995,82 @@ At least business critical VMs should have VM disks encrypted with CSEK.
995995

996996
**Severity**: Medium
997997

998+
## AWS Compute recommendations for LightSail and additional services
999+
1000+
### Administrative ports should not be publicly accessible on LightSail instances
1001+
1002+
**Description**: Defender for Cloud identified publicly accessible administrative ports in your LightSail instance. Administrative ports, such as SSH on port 22 and RDP on port 3389, provide remote management access. Without IP restrictions, these ports are vulnerable to brute force and unauthorized access attacks that could compromise your system.
1003+
1004+
**Severity**: Medium
1005+
1006+
### Drift detections should be reviewed on AWS CloudFormation stacks
1007+
1008+
**Description**: Defender for Cloud identified configuration drift in AWS CloudFormation stacks, where deployed resources no longer match the declared template configuration due to changes made directly to resources outside the CloudFormation deployment process. This introduces security and compliance risk by bypassing infrastructure-as-code controls and allowing configurations to deviate from approved security policies.
1009+
1010+
**Severity**: Medium
1011+
1012+
### Explicit capacity provider strategy should be configured on ECS services
1013+
1014+
**Description**: Defender for Cloud identified an ECS service configuration issue where an explicit capacity provider strategy is missing. Without explicitly defining the capacity provider, ECS services default to the cluster's settings for task placement, which may inadvertently assign workloads to unmanaged or less-secure EC2 capacity providers instead of Fargate. This increases the attack surface and weakens isolation safeguards for your applications.
1015+
1016+
**Severity**: Low
1017+
1018+
### IMDSv2 enforcement should be enabled on LightSail instances
1019+
1020+
**Description**: Defender for Cloud identified that your LightSail instance does not enforce IMDSv2, a security enhancement of the Instance Metadata Service that requires additional authentication. Without enforcement, the metadata endpoint remains vulnerable to unauthorized HTTP requests, potentially exposing sensitive instance details and increasing the risk of exploitation.
1021+
1022+
**Severity**: Medium
1023+
1024+
### LifecycleConfigArn should be configured on AWS SageMaker app
1025+
1026+
**Description**: Defender for Cloud identified a missing LifecycleConfigArn configuration in your AWS SageMaker app. LifecycleConfigArn refers to the lifecycle configuration scripts responsible for initializing dependencies and setting up the runtime environment for training jobs, endpoints, or notebooks. Without this configuration, your app may experience inconsistent behavior, operational issues, and potential vulnerabilities due to incomplete environment setups.
1027+
1028+
**Severity**: Low
1029+
1030+
### Public exposure of non-essential ports should be disabled for LightSail instances
1031+
1032+
**Description**: Defender for Cloud identified non-essential ports open to the public in your LightSail instance. Non-essential ports refer to those beyond HTTP (80), HTTPS (443), and standard administrative ports (22 and 3389). Open access to these ports exposes your instance to unauthorized scanning and exploitation, increasing the risk of unauthorized access. Limiting access to these ports to trusted IP addresses is recommended to reduce these vulnerabilities.
1033+
1034+
**Severity**: Low
1035+
1036+
### Secure data recovery automatic snapshots should be enabled on LightSail instances
1037+
1038+
**Description**: Defender for Cloud identified that automatic snapshots are disabled on your LightSail instance. In this context, automatic snapshots refer to daily backups that store the seven most recent recovery points. Without these snapshots, your instance faces an increased risk of data loss and extended downtime in the event of a malware or ransomware attack. This assessment does not apply to Windows instances, as the feature is not supported on that platform.
1039+
1040+
**Severity**: Low
1041+
1042+
### Unintended termination protection should be enabled for AWS CloudFormation stacks
1043+
1044+
**Description**: Defender for Cloud identified that termination protection is not enabled for your AWS CloudFormation stacks. Termination protection is a feature that prevents accidental or unauthorized deletion of stacks. Without it, your stacks are at risk of being unintentionally terminated, which can lead to service interruptions and potential data loss. For more information on enabling termination protection, please visit https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-protect-stacks.html.
1045+
1046+
**Severity**: Medium
1047+
1048+
## GCP Compute recommendations for App Engine and Cloud Run
1049+
1050+
### Custom service accounts should be configured for App Engine applications
1051+
1052+
**Description**: Defender for Cloud identified the use of the default App Engine service account for your applications. This poses a risk because default accounts are often granted broad permissions, such as the Editor role, at the project level, which can be exploited if compromised. Custom service accounts restrict permissions to only those needed for operations, minimizing potential exposure and following the principle of least privilege.
1053+
1054+
**Severity**: Medium
1055+
1056+
### Custom service accounts should be configured on Cloud Run services
1057+
1058+
**Description**: Defender for Cloud identified Cloud Run services utilizing the default Compute Engine service account. Depending on your organization policy configuration, the default service account might automatically be granted the Editor role on your project. This configuration violates the principle of least privilege and poses a risk where a container compromise could allow an attacker to gain extensive administrative access to your GCP environment. Learn more.
1059+
1060+
**Severity**: High
1061+
1062+
### Identity-Aware Proxy protection should be enabled on App Engine applications
1063+
1064+
**Description**: Defender for Cloud identified that Identity-Aware Proxy (IAP) is disabled in App Engine applications. IAP is a centralized authorization layer for HTTPS that verifies user identities and enforces contextual access controls before requests reach your application. Without IAP, your App Engine may be exposed to unauthorized access, increasing the risk of exploitation. Enabling IAP is recommended to strengthen your application's security.
1065+
1066+
**Severity**: Medium
1067+
1068+
### Internal or load balancer ingress should be configured on Cloud Run services
1069+
1070+
**Description**: Defender for Cloud identified Cloud Run services that allow 'all' ingress traffic. This configuration allows the service to be directly reachable from the public internet via its default URL. This poses a risk of bypassing centralized security controls. Learn more.
1071+
1072+
**Severity**: Medium
1073+
9981074
## Related content
9991075

10001076
- [learn about security recommendations](security-policy-concept.md)

0 commit comments

Comments
 (0)