Skip to content

Commit 7f483eb

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-security-docs-pr into WI444612-antimalware
2 parents 739b9d7 + 89e4d76 commit 7f483eb

3 files changed

Lines changed: 36 additions & 8 deletions

File tree

articles/defender-for-cloud/data-ingestion-benefit.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,6 @@ The following subset of [security data types](/azure/azure-monitor/reference/ta
5151
- [Update](/azure/azure-monitor/reference/tables/update) and [UpdateSummary](/azure/azure-monitor/reference/tables/updatesummary) when the Update Management solution isn't running in the workspace or solution targeting is enabled.
5252
- [MDCFileIntegrityMonitoringEvents](/azure/azure-monitor/reference/tables/mdcfileintegritymonitoringevents)
5353
- [WindowsEvent](/azure/azure-monitor/reference/tables/windowsevent?branch=main)
54-
- [LinuxAuditLog](/azure/azure-monitor/reference/tables/linuxauditlog)
5554

5655
> [!NOTE]
5756
> Although `WindowsEvent` is listed, only security events from the `Microsoft-SecurityEvent` stream that go to the `SecurityEvent` table qualify for the 500 MB/day allowance. Application, System, or other event log channels are not covered and are billed as regular ingestion.

articles/defender-for-cloud/defender-for-containers-azure-enable-portal.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -137,8 +137,9 @@ You can exclude specific AKS clusters from automatic provisioning by applying ta
137137

138138
1. Under **Overview**, select **Tags**.
139139

140-
1. Add one of these tags:
141-
- For Defender sensor: `ms_defender_container_exclude_sensors` = `true`
140+
1. Add this tag:
141+
142+
- For Defender sensor: `ms_defender_container_exclude_sensors` = `true`
142143

143144
## Monitor ongoing security
144145

articles/defender-for-cloud/release-notes.md

Lines changed: 33 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -29,13 +29,15 @@ This article summarizes what's new in Microsoft Defender for Cloud. It includes
2929

3030
## February 2026
3131

32-
|Date| Category|Update|
32+
| Date | Category | Update |
3333
| -------- | -------- | -------- |
3434
| February 20, 2026 | Preview | [Container runtime antimalware detection and prevention (Preview)](#container-runtime-antimalware-detection-and-prevention-preview) |
3535
| February 10, 2026| Preview | [Database-level recommendations experience for SQL Vulnerability Assessment findings (Preview)](#database-level-recommendations-experience-for-sql-vulnerability-assessment-preview) |
3636
| February 10, 2026| GA | [Scanning support for Minimus and Photon OS container images](#scanning-support-for-minimus-and-photon-os-container-images) |
3737
| February 9, 2026| GA | [Simulate alerts for SQL servers on machines](#simulate-alerts-for-sql-servers-on-machines) |
3838
| February 3, 2026| Preview | [Threat protection for AI agents (Preview)](#threat-protection-for-ai-agentspreview) |
39+
|February 2, 2026| GA | [Updated CIEM recommendation logic](#updated-ciem-recommendation-logic) |
40+
|February 2, 2026| Preview | [Threat protection for AI agents (Preview)](#threat-protection-for-ai-agentspreview) |
3941

4042
### Container runtime antimalware detection and prevention (Preview)
4143

@@ -45,7 +47,7 @@ Microsoft Defender for Cloud is announcing container runtime anti-malware detect
4547

4648
Learn more about [antimalware detection and prevention](anti-malware.md).
4749

48-
## Database-level recommendations experience for SQL Vulnerability Assessment (Preview)
50+
### Database-level recommendations experience for SQL Vulnerability Assessment (Preview)
4951

5052
February 10, 2026
5153

@@ -71,13 +73,13 @@ The SQL [vulnerability assessment rules reference](sql-azure-vulnerability-asses
7173

7274
The existing server-level (aggregated) experience remains available during preview.
7375

74-
## Scanning support for Minimus and Photon OS container images
76+
### Scanning support for Minimus and Photon OS container images
7577

7678
February 10, 2026
7779

7880
Microsoft Defender for Cloud's vulnerability scanner, powered by Microsoft Defender Vulnerability Management, is extending its scanning coverage to Minimus and Photon OS container images, and identify vulnerabilities in Minimus Images and Photos OS to validate that they're shipping the most secure builds possible. As additional image types are being scanned, your bill might increase. For all supported distributions, see [Registries and images support for vulnerability assessment](support-matrix-defender-for-containers.md#registries-and-images-support-for-vulnerability-assessment).
7981

80-
## Simulate alerts for SQL servers on machines
82+
### Simulate alerts for SQL servers on machines
8183

8284
February 9, 2026
8385

@@ -87,6 +89,32 @@ Simulated alerts generates realistic alerts with full SQL and machine context on
8789

8890
Learn how to [simulate alerts for SQL servers on machines](simulate-alerts-sql-machines.md).
8991

92+
## Updated CIEM recommendation logic
93+
94+
February 2, 2026
95+
96+
Cloud Infrastructure Entitlement Management (CIEM) recommendations are now available as a native capability in Microsoft Defender for Cloud across Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
97+
98+
This update changes how inactive identities and over-permissioned roles are evaluated and improves recommendation accuracy. It may affect existing recommendation results.
99+
100+
### Key changes
101+
102+
- Inactive identity detection now evaluates unused role assignments instead of sign-in activity.
103+
- The inactivity lookback window is extended to 90 days (previously 45 days).
104+
- Identities created within the past 90 days aren’t evaluated as inactive.
105+
- The Permissions Creep Index (PCI) metric is deprecated and no longer appears in recommendations.
106+
- CIEM onboarding no longer requires elevated high-risk permissions.
107+
108+
### Cloud-specific considerations
109+
110+
| Cloud | Details |
111+
|--------|---------|
112+
| **Azure** | Inactive identity recommendations include evaluation of read-level permissions. |
113+
| **AWS** | CIEM evaluates AWS users and roles whose permissions can be reliably assessed. SAML and SSO identities require [AWS CloudTrail Logs (Preview)](integrate-cloud-trail.md) to be enabled in the Defender CSPM plan. Serverless and compute identities are excluded from CIEM inactivity evaluation, which might affect recommendation counts. |
114+
| **GCP** | CIEM evaluation requires [Cloud Logging ingestion (Preview)](logging-ingestion.md) to be enabled in the Defender CSPM plan. |
115+
116+
Learn more about [permissions management in Defender for Cloud](permissions-management.md).
117+
90118
## Threat protection for AI agents (Preview)
91119

92120
February 2, 2026 
@@ -103,7 +131,7 @@ Learn more about [Threat Protection for AI Agents with Microsoft Defender for Cl
103131
| -------- | -------- | -------- |
104132
|January 8, 2026| Preview | [Microsoft Security Private Link (Preview)](#microsoft-security-private-link-preview) |
105133

106-
## Microsoft Security Private Link (Preview)
134+
### Microsoft Security Private Link (Preview)
107135

108136
January 8, 2026
109137

0 commit comments

Comments
 (0)