Skip to content

Commit 642bca4

Browse files
authored
Merge pull request #2254 from snicklezzz/wi540131-private-links
Wi540131 private links
2 parents ac5336c + 51cde53 commit 642bca4

9 files changed

Lines changed: 274 additions & 4 deletions

articles/defender-for-cloud/TOC.yml

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -71,6 +71,13 @@
7171
- name: Connect machines with Azure Arc
7272
displayName: azure stack, ash, windows, linux, hybrid, arc, on-premises, Microsoft Defender XDR, alerts, integration, m365, m365d, m365 defender
7373
href: quickstart-onboard-machines.md
74+
- name: Networking and connectivity
75+
items:
76+
- name: Microsoft Security Private Link for Microsoft Defender for Cloud (Preview)
77+
displayName: private endpoints, private link, security private link, networking, connectivity, VPN, ExpressRoute
78+
href: concept-private-links.md
79+
- name: Configure private endpoints with Microsoft Security Private Link (Preview)
80+
href: configure-private-endpoints.md
7481
- name: Enable specific plans
7582
expanded: false
7683
items:
Lines changed: 104 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,104 @@
1+
---
2+
title: Microsoft Security Private Link for Microsoft Defender for Cloud (Preview)
3+
description: Learn how Microsoft Security Private Link provides secure, private connectivity between your virtual network and Microsoft Defender for Cloud.
4+
author: Elazark
5+
ms.author: elkrieger
6+
ms.topic: article
7+
ms.date: 01/07/2025
8+
---
9+
10+
# Microsoft Security Private Link for Microsoft Defender for Cloud (Preview)
11+
12+
Microsoft Security Private Link allows workloads in your virtual network to connect to Microsoft Defender for Cloud. You enable this connection by creating a Security Private Link resource in your subscription and private endpoints in your Azure virtual networks that connect to it.
13+
14+
With private endpoints, all security-related traffic from your workloads traverses the Microsoft backbone network without exposure to the public internet. This includes telemetry from Defender agents, sensors, add-ons, and extensions.
15+
16+
> [!NOTE]
17+
> Microsoft Security Private Link isn't supported in sovereign cloud regions, such as Azure Government and Azure operated by 21Vianet (21Vianet).
18+
19+
## Supported scenarios
20+
21+
Microsoft Security Private Link supports the following scenarios:
22+
23+
- **Network-isolated environments**
24+
Protect workloads in isolated or restricted networks where outbound internet access is limited or not permitted.
25+
26+
- **Hybrid and on-premises connectivity**
27+
Securely connect on-premises or hybrid environments to Microsoft Defender for Cloud by using [VPN](/azure/vpn-gateway/vpn-gateway-about-vpngateways) or [ExpressRoute](/azure/expressroute/expressroute-locations) with private peering.
28+
29+
> [!IMPORTANT]
30+
> For network-isolated workloads, Microsoft Security Private Link replaces the need for Azure Monitor Private Link Scope (AMPLS) and Azure Firewall egress rules.
31+
32+
## Connectivity architecture
33+
34+
Microsoft Security Private Link uses Azure Private Endpoints to establish private connectivity between your virtual network and Defender for Cloud. This allows workloads to connect to Defender for Cloud endpoints using their existing fully qualified domain names (FQDNs) and authorization model.
35+
36+
### How it works
37+
38+
- You create a private endpoint in your virtual network and assign it an IP address from the virtual network address space.
39+
40+
- All traffic between your workloads and Defender services flows through the Microsoft backbone network, never traversing the public internet.
41+
42+
- Multiple Defender services can share a single Security Private Link resource, simplifying network architecture.
43+
44+
> [!NOTE]
45+
> Using private endpoints might incur additional Azure costs depending on the number of endpoints and the selected architecture. For more information, see [Azure Private Link pricing](https://azure.microsoft.com/pricing/details/private-link/).
46+
47+
:::image type="content" source="media/concept-private-links/security-private-link-diagram.png" alt-text="Diagram showing how Microsoft Defender for Cloud connects to protected resources through private endpoints." lightbox="media/concept-private-links/security-private-link-diagram.png":::
48+
49+
## Roles and permissions
50+
51+
Microsoft Security Private Link uses [Azure role-based access control (RBAC)](/azure/role-based-access-control/overview) to manage access to the Security Private Link resource and private endpoint connections. The following roles are typically involved:
52+
53+
- **Private Link resource owner**
54+
Owns the Microsoft Security Private Link resource and can approve, reject, or delete private endpoint connection requests.
55+
56+
- **Network Contributor**
57+
Can create private endpoints within a virtual network.
58+
59+
- **Security Admin**
60+
Can approve, reject, or delete private endpoint connections but can't create private endpoints in a virtual network unless extra network permissions are granted.
61+
62+
These roles can be assigned to different users or teams to separate network management from security governance responsibilities.
63+
64+
## Approval workflow
65+
66+
Private endpoint connections to Microsoft Security Private Link resources follow the standard [Azure Private Link approval workflow](/azure/private-link/private-endpoint-overview#access-to-a-private-link-resource-using-approval-workflow).
67+
68+
When a private endpoint is created, a connection request is sent to the owner of the Microsoft Security Private Link resource. The resource owner can approve or reject the request from the **Private endpoint connections** tab in the Azure portal.
69+
70+
If the user requesting the private endpoint is also an owner of the Security Private Link, the request is automatically approved.
71+
72+
Approved and pending connections can be managed at any time through the Private Link resource in the Azure portal.
73+
74+
## DNS configuration
75+
76+
When you create a private endpoint, a [private DNS zone](/azure/dns/private-dns-overview) is provisioned by default that corresponds to the Defender for Cloud private Link subdomain `*.defender.microsoft.com`.
77+
78+
> [!NOTE]
79+
> For details about how to configure DNS for private endpoints, see [Azure Private Endpoint DNS integration](/azure/private-link/private-endpoint-dns).
80+
81+
When workloads connect to Defender service endpoints from within the virtual network with private endpoints configured, the FQDN resolves to the private IP address of the endpoint. Connections from outside the virtual network (if public access is still enabled) resolve to the public endpoint.
82+
83+
Each Microsoft Defender for Cloud service uses specific domain endpoints. For example:
84+
85+
| Service | Name | Type | Value | Port |
86+
|---------|------|------|-------|------|
87+
| Defender for Containers | `*.cloud.defender.microsoft.com` | CNAME | `*.privatelink.cloud.defender.microsoft.com` | 443 |
88+
| Defender for Containers | `*.privatelink.cloud.defender.microsoft.com` | A | 10.0.0.5 | 443 |
89+
90+
If you're using a custom DNS server, configure delegation or A records to resolve FQDNs to the private endpoint IP address.
91+
92+
## Connectivity comparison with Microsoft Security Private Link
93+
94+
| Feature | Without Private Endpoint | With Security Private Link |
95+
|--------|--------------------------|----------------------------|
96+
| Internet exposure | Yes | No |
97+
| Compliance alignment | Limited | Strong |
98+
| Multi-service integration | Manual | Simplified |
99+
100+
## Next steps
101+
102+
- [Configure private endpoints with Microsoft Security Private Link](configure-private-endpoints.md)
103+
104+
- Learn more about [Azure Private Link](/azure/private-link).
Lines changed: 141 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,141 @@
1+
---
2+
title: Configure private endpoints with Microsoft Security Private Link
3+
description: Configure private endpoints with Microsoft Security Private Link to securely connect your virtual network to Microsoft Defender for Cloud.
4+
author: Elazark
5+
ms.author: elkrieger
6+
ms.topic: how-to
7+
ms.date: 01/07/2025
8+
#customer intent: As a security administrator, I want to configure a private endpoint for Microsoft Defender for Cloud so that Defender traffic stays within my private network.
9+
10+
---
11+
12+
# Configure private endpoints with Microsoft Security Private Link (Preview)
13+
14+
Use a [private endpoint](/azure/private-link/private-endpoint-overview) with Microsoft Security Private Link to connect workloads in your private network to Microsoft Defender for Cloud over [Azure Private Link](/azure/private-link/private-link-overview).
15+
16+
> [!NOTE]
17+
> Microsoft Security Private Link isn't supported in sovereign cloud regions, such as Azure Government and Azure operated by 21Vianet.
18+
19+
## Prerequisites
20+
21+
Before you begin, make sure that:
22+
23+
- Defender for Cloud is enabled on your Azure subscription. If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn).
24+
25+
- A [virtual network and subnet](/azure/virtual-network/quick-create-portal) where your workloads are deployed. This is where the private endpoint is created.
26+
27+
- You reviewed the required [roles and permissions](concept-private-links.md#roles-and-permissions).
28+
29+
## Create a private endpoint using a Security Private Link resource (Azure portal)
30+
31+
A Security Private Link resource must belong to a resource group.
32+
33+
When you create a Security Private Link resource, you can create a private endpoint as part of the same workflow.
34+
35+
1. Sign in to the [Azure portal](https://portal.azure.com).
36+
37+
1. Select **Create a resource**.
38+
39+
1. Search for **Security Private Link**.
40+
41+
1. Under **Security Private Link** select **Create**.
42+
43+
:::image type="content"source="media/configure-private-endpoints/marketplace-create-security-private-link.png"alt-text="Screenshot of the Azure Marketplace showing the Security Private Link tile with the Create button."lightbox="media/configure-private-endpoints/marketplace-create-security-private-link.png":::
44+
45+
1. Select a subscription and an existing resource group, or create a new one.
46+
47+
1. If needed, select a resource group location.
48+
49+
1. Enter a name.
50+
51+
1. Select **Next: Networking**.
52+
53+
> [!NOTE]
54+
> Microsoft Security Private Link currently supports the **containers** sub-resource, which is used by the Defender for Containers plan.
55+
56+
1. Select **Create a private endpoint**.
57+
58+
1. Enter a name and a location.
59+
60+
:::image type="content" source="media/configure-private-endpoints/create-private-endpoint-blade-networking-tab.png" alt-text="Screenshot of the Create Security Private Link wizard on the Networking tab, showing the Create a private endpoint pane with sub-resource and Private DNS integration." lightbox="media/configure-private-endpoints/create-private-endpoint-blade-networking-tab.png":::
61+
62+
1. Select **containers** as the target sub-resource.
63+
64+
1. Select the virtual network and subnet.
65+
66+
1. Enable **Private DNS integration** to create a private DNS zone automatically.
67+
68+
1. Select **Add**.
69+
70+
1. Select **Next: Tags** and add any required tags.
71+
72+
1. Select **Review + create**
73+
74+
1. Select **Create**.
75+
76+
## Create a private endpoint for an existing Security Private Link resource (Azure portal)
77+
78+
If you already have a Security Private Link resource, you can create a private endpoint separately and connect it to that resource.
79+
80+
1. Sign in to the [Azure portal](https://portal.azure.com).
81+
82+
1. Navigate to **Network foundation** > **Private Link** > **Private endpoints**.
83+
84+
1. Select **Create**.
85+
86+
:::image type="content" source="media/configure-private-endpoints/network-foundation-create-private-endpoint.png" alt-text="Screenshot of the Network foundation Private endpoints page, showing the Create button." lightbox="media/configure-private-endpoints/network-foundation-create-private-endpoint.png":::
87+
88+
1. Select a subscription and an existing resource group, or create a new one.
89+
90+
1. Enter a name and network interface name, and select a region.
91+
92+
1. Select **Next: Resource**.
93+
94+
> [!NOTE]
95+
> Microsoft Security Private Link currently supports the **containers** sub-resource, which is used by the Defender for Containers plan.
96+
97+
1. Select **Connect to an Azure resource in my directory**.
98+
99+
1. Select a subscription.
100+
101+
1. Select **Microsoft.Security/privateLinks** as the resource type.
102+
103+
1. Select the Security Private Link resource for Defender for Cloud.
104+
105+
1. Select **containers** as the target sub-resource, then select **Next: Virtual Network**.
106+
107+
1. Select the virtual network and the subnet.
108+
109+
1. Leave the private IP address allocation set to **Dynamic**, then select **Next: DNS**.
110+
111+
1. Enable **Integrate with private DNS zone** and verify that the private DNS zone is populated automatically.
112+
113+
1. Select **Next: Tags**.
114+
115+
1. Add any required tags.
116+
117+
1. Select **Review + create**.
118+
119+
1. Select **Create**.
120+
121+
## Approve the private endpoint connection
122+
123+
When the private endpoint is created, a connection request is sent to the Security Private Link resource.
124+
125+
- If the requester is an **Owner**, the connection is approved automatically.
126+
127+
- Otherwise, an **Owner** must approve the request from **Private endpoint connections** in the Azure portal.
128+
129+
## Validate the private endpoint connection
130+
131+
From a workload connected to the virtual network, run:
132+
133+
```bash
134+
nslookup api.cloud.defender.microsoft.com
135+
```
136+
137+
The FQDN should resolve to a private IP address under `privatelink.cloud.defender.microsoft.com`.
138+
139+
## Related content
140+
141+
- Learn more about [Microsoft Security Private Link for Microsoft Defender for Cloud](concept-private-links.md).

articles/defender-for-cloud/defender-portal/integration-faq.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ Microsoft Defender for Cloud expands within the Defender portal to provide incid
8888

8989
**Customers can continue to use Azure Lighthouse for multi-tenant posture management and operations, in parallel with the Defender portal.** This approach ensures that organizations retain full posture management capabilities while benefiting from the unified incident management and response features available in the Defender portal.
9090

91-
As we build and enhance MTO capabilities in future releases, customers will see expanded support for multitenant posture management and additional experiences directly within the Defender portal.
91+
As we build and enhance MTO capabilities in future releases, customers see expanded support for multitenant posture management and additional experiences directly within the Defender portal.
9292

9393
### Synchronization & data consistency
9494

@@ -102,15 +102,15 @@ In the short term, security recommendations resolved in the Azure portal will be
102102

103103
#### Will the count of healthy and unhealthy resources be consistent across the Azure and the Defender portal? If not, what explains the difference?
104104

105-
Customers may notice differences when using Defender for Cloud in the Defender portal. With this expansion, we're exposing customers with the discovery of their complete environment and hence, the count can be different. This applies to the Secure Score, security recommendations, and the number of discovered resources in the environment.
105+
Customers might notice differences when using Defender for Cloud in the Defender portal. With this expansion, we're exposing customers with the discovery of their complete environment and hence, the count can be different. This applies to the Secure Score, security recommendations, and the number of discovered resources in the environment.
106106

107107
## Feature availability & roadmap
108108

109109
### If I only use Foundational CSPM and have other Defender Plans enabled, such as Defender for Storage, will I be able to see Foundational CSPM data in the new portal?
110110

111-
Yes, security recommendations provided by the Foundational CSPM plan will appear for any subscription with at least one paid plan.
111+
Yes, security recommendations provided by the Foundational CSPM plan appears for any subscription with at least one paid plan.
112112

113-
### I can see recommendation ownership via Governance feature. Will Governance feature be available in the Defender portal?
113+
### I can see recommendation ownership via Governance feature. Will the Governance feature be available in the Defender portal?
114114

115115
Governance assignments created manually or automatic will continue to work, and the assignment status including the relevant owner and due date will appear in the Defender portal. However, editing operations such as owner and due date changes will still be done via the Azure portal. In the future, we plan to introduce improved mobilization capabilities to allow security teams to operate and delegate the remediation effort directly to the Defender portal.
116116

50.6 KB
Loading
293 KB
Loading
99.1 KB
Loading
89 KB
Loading

articles/defender-for-cloud/release-notes.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,24 @@ This article summarizes what's new in Microsoft Defender for Cloud. It includes
2727
<!-- 5. Under the relevant month, add a short paragraph about the new feature. Give the paragraph an H3 (###) heading. Keep the title short and not rambling. -->
2828
<!-- 6. In the Update column, add a bookmark to the H3 paragraph that you created (#<bookmark-name>) .-->
2929

30+
## January 2026
31+
32+
|Date | Category | Update|
33+
| -------- | -------- | -------- |
34+
|January 8, 2026| Preview | [Microsoft Security Private Link (Preview)](#microsoft-security-private-link-preview) |
35+
36+
## Microsoft Security Private Link (Preview)
37+
38+
January 8, 2026
39+
40+
Microsoft Defender for Cloud is announcing Microsoft Security Private Link in Preview.
41+
42+
Microsoft Security Private Link enables private connectivity between Defender for Cloud and your workloads. The connection is established by creating private endpoints in your virtual network, allowing Defender for Cloud traffic to remain on the Microsoft backbone network and avoid exposure to the public internet.
43+
44+
Private endpoints are currently supported for the Defender for Containers plan.
45+
46+
Learn more about [Microsoft Security Private Link for Microsoft Defender for Cloud](concept-private-links.md).
47+
3048
## December 2025
3149

3250
|Date | Category | Update|

0 commit comments

Comments
 (0)