Skip to content

Commit 9bd4170

Browse files
committed
Merge branch 'WI538961-ai-model-security' of https://github.com/ElazarK/azure-security-docs-pr; branch 'main' of https://github.com/MicrosoftDocs/azure-security-docs-pr into WI538961-ai-model-security
2 parents 861e458 + 3e21b21 commit 9bd4170

21 files changed

Lines changed: 741 additions & 59 deletions

articles/defender-for-cloud/file-integrity-monitoring-enable-defender-endpoint.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to enable File Integrity Monitoring when you collect data
44
author: Elazark
55
ms.author: elkrieger
66
ms.topic: how-to
7-
ms.date: 06/25/2025
7+
ms.date: 03/22/2026
88
ms.custom: sfi-image-nochange
99
#customer intent: As a security administrator, I want to enable File Integrity Monitoring so that I can detect unauthorized changes to critical files.
1010
---
@@ -18,9 +18,9 @@ After you enable Defender for Servers Plan 2, follow the instructions in this ar
1818
> [!NOTE]
1919
>
2020
> - If you use a previous version of File Integrity Monitoring with the Log Analytics agent (Microsoft Monitoring agent (MMA)) or the Azure Monitor agent (AMA), you can [migrate to the new File Integrity Monitoring experience](migrate-file-integrity-monitoring.md).
21-
> - From June 2025 onwards, File Integrity Monitoring powered by Microsoft Defender for Endpoint requires a minimum version. [Update the agent](#verify-defender-for-endpoint-client-version) as needed.
22-
> - Windows: 10.8760 or later.
23-
> - Linux: 30.124082 or later.
21+
> - File Integrity Monitoring powered by Microsoft Defender for Endpoint requires a minimum agent version. [Update the agent](#verify-defender-for-endpoint-client-version) as needed.
22+
> - **Windows (legacy machines/downlevel clients)**: Defender for Servers Windows client (MDE agent) version 10.8799 or later.
23+
> - **Linux**: 30.124082 or later.
2424
2525
## Prerequisites
2626

articles/defender-for-cloud/file-integrity-monitoring-overview.md

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about tracking file change with file integrity monitoring in
44
author: Elazark
55
ms.author: elkrieger
66
ms.topic: concept-article
7-
ms.date: 08/12/2025
7+
ms.date: 03/22/2026
88
---
99

1010
# File integrity monitoring
@@ -34,9 +34,19 @@ File integrity monitoring uses the Microsoft Defender for Endpoint agent and age
3434
- Collected file integrity monitoring data is part of the [500-MB benefit included in Defender for Servers Plan 2](data-ingestion-benefit.md).
3535
- File integrity monitoring gives information about file and resource changes. It includes the source of the change, account details, indication of who made the changes, and information about the initiating process.
3636

37-
### Migrate to the new version
37+
## Version requirements
3838

39-
File integrity monitoring previously used the Log Analytics agent (also known as the Microsoft Monitoring agent (MMA)) or the Azure Monitor agent (AMA) to collect data. If you're using file integrity monitoring with one of these legacy methods, you can [migrate file integrity monitoring](migrate-file-integrity-monitoring.md) to use Defender for Endpoint.
39+
To ensure proper file integrity monitoring functionality, machines must run the **Defender for Servers Windows client (Microsoft Defender for Endpoint agent) version 10.8799 or above**. This requirement is especially important for:
40+
41+
- Legacy Windows machines (downlevel clients)
42+
- Environments transitioning from MMA or AMA-based FIM
43+
44+
> [!IMPORTANT]
45+
> Due to a pipeline change in Microsoft Defender for Endpoint, users with existing FIM deployments on legacy Windows machines must update their MDE agent to version 10.8799 or above to continue receiving file integrity monitoring data.
46+
47+
### Migrate legacy AMA/MMA clients to MDE-based file integrity monitoring
48+
49+
If you're currently using file integrity monitoring with legacy agent-based methods (Log Analytics agent/Microsoft Monitoring Agent (MMA) or Azure Monitor Agent (AMA)), you need to migrate to the MDE-based (Microsoft Defender for Endpoint) approach. This migration ensures continued functionality and access to enhanced capabilities. Learn how to [migrate file integrity monitoring](migrate-file-integrity-monitoring.md) from legacy AMA/MMA clients to the MDE-based solution.
4050

4151
## Configure file integrity monitoring
4252

articles/defender-for-cloud/regional-availability.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,10 +40,10 @@ Austria East, Belgium Central, Chile Central, China East 2, China North, China N
4040
### Defender for Storage (Malware Scanning)
4141

4242
**Supported regions:**
43-
Asia East, Asia Northeast, Australia Central 2, Australia East, Australia Southeast, Brazil South, Brazil Southeast, Canada Central, Canada East, Central US, East US, East US 2, East US 2 (EU Access Program), France Central, France South, Germany North, Germany West Central, India Central, India South, Israel Central*****, Italy North, Japan East, Japan West, Korea Central, Korea South, Mexico Central*****, New Zealand North, North Central US, North Europe, Norway East, Norway West, Poland Central*****, Spain Central*****, South Africa North, South Africa West, South Central US, South East US, Sweden Central, Sweden South******, Switzerland North, Switzerland West, UAE North, UK South, UK West, US Gov East, US Gov South Central, US Gov Southwest, West Central US, West Europe, West US, West US 2, West US 3
43+
Asia East, Asia Southeast, Asia Northeast, Australia Central 2, Australia East, Australia Southeast, Brazil South, Brazil Southeast, Canada Central, Canada East, Central US, East US, East US 2, East US 2 (EU Access Program), France Central, France South, Germany North, Germany West Central, India Central, India South, Israel Central*****, Italy North, Japan East, Japan West, Korea Central, Korea South, Mexico Central*****, New Zealand North, North Central US, North Europe, Norway East, Norway West, Poland Central*****, Spain Central*****, South Africa North, South Africa West, South Central US, South East US, Sweden Central, Sweden South******, Switzerland North, Switzerland West, UAE North, UK South, UK West, US Gov East, US Gov South Central, US Gov Southwest, West Central US, West Europe, West US, West US 2, West US 3
4444

4545
**Unsupported regions:**
46-
Asia Southeast, Austria East, Belgium Central, Central US (EU Access Program), Chile Central, China East, China East 2, China East 3, China North, China North 2, China North 3, EU SSLV, India West, Indonesia Central, Israel North West, Jio India Central, Jio India West, Malaysia South, Qatar, South East US 3, South US 2, Taiwan North, Taiwan North West, UAE Central, US DoD Central, US DoD East
46+
Austria East, Belgium Central, Central US (EU Access Program), Chile Central, China East, China East 2, China East 3, China North, China North 2, China North 3, EU SSLV, India West, Indonesia Central, Israel North West, Jio India Central, Jio India West, Malaysia South, Qatar, South East US 3, South US 2, Taiwan North, Taiwan North West, UAE Central, US DoD Central, US DoD East
4747

4848
****** Supported via API management only.
4949

articles/defender-for-cloud/release-notes.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,13 +51,28 @@ Learn more about [AI model security](ai-model-security.md).
5151

5252
| Date | Category | Update |
5353
| -------- | -------- | -------- |
54+
| March 22, 2026| Update | [File Integrity Monitoring requires MDE agent version 10.8799+ for legacy Windows machines](#file-integrity-monitoring-requires-mde-agent-version-108799-for-legacy-windows-machines) |
5455
| March 12, 2026 | GA | [Kubernetes gated deployment support for AKS Automatic (GA)](#kubernetes-gated-deployment-support-for-aks-automatic-ga) |
5556
| March 11, 2026 | GA| [Severity‑based risk assignment for "Not evaluated" recommendations](#severitybased-risk-assignment-for-not-evaluated-recommendations) |
5657
| March 10, 2026| Preview |[Code to runtime enrichment for recommendations](#code-to-runtime-enrichment-for-recommendations-preview)|
5758
| March 10, 2026 | Preview | [On-demand malware scanning of Azure Files in Microsoft Defender for Storage](#on-demand-malware-scanning-of-azure-files-in-microsoft-defender-for-storage-preview) |
5859
| March 04, 2026 | Deprecation | [Deprecation of preview of container and container images vulnerability recommendations](#deprecation-of-preview-of-container-and-container-images-vulnerability-recommendations) |
5960
| March 04, 2026 | Preview |[New individual recommendations format in Azure portal (Preview)](#new-individual-recommendations-format-in-azure-portal-preview)|
6061

62+
### File Integrity Monitoring requires MDE agent version 10.8799+ for legacy Windows machines
63+
64+
March 22, 2026
65+
66+
Due to a pipeline change in Microsoft Defender for Endpoint (MDE), File Integrity Monitoring now requires the **Defender for Servers Windows client (Microsoft Defender for Endpoint agent) version 10.8799 or above** for proper functionality on legacy Windows machines (downlevel clients).
67+
68+
**Key details:**
69+
70+
- **Affected systems**: Legacy Windows machines (Windows Server 2016, Windows Server 2012 R2, and other downlevel clients)
71+
- **Required version**: Defender for Servers Windows client (MDE agent) 10.8799 or later
72+
- **Impact**: FIM monitoring will not function properly on versions below the minimum requirement
73+
74+
Learn more about [File Integrity Monitoring](file-integrity-monitoring-overview.md) and how to [enable File Integrity Monitoring](file-integrity-monitoring-enable-defender-endpoint.md).
75+
6176
### Kubernetes gated deployment support for AKS Automatic (GA)
6277

6378
March 12, 2026
@@ -206,7 +221,7 @@ Learn more about [reviewing security recommendations](review-security-recommenda
206221

207222
| Date | Category | Update |
208223
| -------- | -------- | -------- |
209-
| February 22, 2026 | Preview | [Container runtime anti-malware detection and blocking (Preview)](#container-runtime-anti-malware-detection-and-blocking-preview) |
224+
| February 22, 2026 | Preview | [Container runtime anti-malware detection and blocking (Preview)](#container-runtime-anti-malware-detection-and-blocking-preview)
210225
| February 22, 2026 | Update - Preview | [Binary drift now supports blocking (Preview)](#binary-drift-now-supports-blocking-preview) |
211226
| February 10, 2026| Preview | [Database-level recommendations experience for SQL Vulnerability Assessment findings (Preview)](#database-level-recommendations-experience-for-sql-vulnerability-assessment-preview) |
212227
| February 10, 2026| GA | [Scanning support for Minimus and Photon OS container images](#scanning-support-for-minimus-and-photon-os-container-images) |

articles/key-vault/includes/key-management-policy-grammar.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -257,7 +257,7 @@ The encoding is as follows:
257257
An Environment Assertion is a signed assertion, in JSON Web Token form, from a trusted authority. An Environment Asserting contains at least a key encryption key and one or more claims about the target environment (for example, TEE type, publisher, version) that are matched against the Key Release Policy. The key encryption key is a public RSA key owned and protected by the target execution environment that is used for key export. It must appear in the TEE keys claim (x-ms-runtime/keys). This claim is a JSON object representing a JSON Web Key Set. Within the JWKS, one of the keys must meet the requirements for use as an encryption key (key_use is "enc", or key_ops contains "encrypt"). The first suitable key is chosen.
258258

259259
## Key Vault and Managed HSM Attestation Token Requirements
260-
Azure Key Vault Premium and Managed HSM Secure Key Release were designed alongside [Microsoft Azure Attestation Service](../../attestation/overview.md) but may work with any attestation servers tokens if it conforms to the expected token structure, supports OpenID connect, and has the expected claims. DigiCert is presently the only public CA that Azure Key Vault Premium and Managed HSM trust for attestation token signing certificates.
260+
Azure Key Vault Premium and Managed HSM Secure Key Release were designed alongside [Microsoft Azure Attestation Service](/azure/attestation/overview) but may work with any attestation server's tokens if it conforms to the expected token structure, supports OpenID connect, and has the expected claims. DigiCert is presently the only public CA that Azure Key Vault Premium and Managed HSM trust for attestation token signing certificates.
261261

262262

263263

@@ -279,4 +279,4 @@ The full set of requirements are:
279279

280280
- Marked with **key_use** of encryption or a **key_ops** array containing the Encrypt operation.
281281

282-
For a sample token see [Examples of an Azure Attestation token](../../attestation/attestation-token-examples.md#sample-jwt-generated-for-sev-snp-attestation).
282+
For a sample token see [Examples of an Azure Attestation token](/azure/attestation/attestation-token-examples#sample-jwt-generated-for-sev-snp-attestation).
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
author: msmbaldwin
3+
ms.author: mbaldwin
4+
ms.service: azure-key-vault
5+
ms.subservice: managed-hsm
6+
ms.topic: include
7+
ms.date: 03/13/2026
8+
# Include: Managed HSM cleanup warning
9+
---
10+
11+
> [!WARNING]
12+
> Deleting the resource group puts the Managed HSM into a soft-deleted state. The Managed HSM continues to be billed until it's purged. See [Managed HSM soft-delete and purge protection](/azure/key-vault/managed-hsm/recovery)
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
author: msmbaldwin
3+
ms.author: mbaldwin
4+
ms.service: azure-key-vault
5+
ms.subservice: managed-hsm
6+
ms.topic: include
7+
ms.date: 03/13/2026
8+
# Include: Managed HSM intro description
9+
---
10+
11+
Managed HSM is a fully managed, highly available, single-tenant, standards-compliant cloud service that enables you to safeguard cryptographic keys for your cloud applications, using **FIPS 140-3 Level 3** validated HSMs. For more information on Managed HSM, review the [Overview](/azure/key-vault/managed-hsm/overview).
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
---
2+
author: msmbaldwin
3+
ms.author: mbaldwin
4+
ms.service: azure-key-vault
5+
ms.subservice: managed-hsm
6+
ms.topic: include
7+
ms.date: 03/13/2026
8+
# Include: DefaultAzureCredential explanation table
9+
---
10+
11+
`DefaultAzureCredential` automatically selects the appropriate credential based on your environment:
12+
13+
| Environment | Credential used |
14+
|-------------|-----------------|
15+
| Azure VMs, App Service, Functions | System-assigned or user-assigned managed identity |
16+
| Azure Kubernetes Service | Workload identity |
17+
| Local development | Azure CLI, Visual Studio, or VS Code credentials |
18+
| CI/CD pipelines | Workload identity federation or service principal |
19+
20+
The credential checks these sources in order:
21+
1. Environment variables
22+
2. Workload identity
23+
3. Managed identity
24+
4. Azure CLI
25+
5. Azure PowerShell
26+
6. Visual Studio / VS Code credentials
27+
28+
For production workloads in Azure, managed identities are strongly recommended because they eliminate credential management entirely.
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
author: msmbaldwin
3+
ms.author: mbaldwin
4+
ms.service: azure-key-vault
5+
ms.subservice: managed-hsm
6+
ms.topic: include
7+
ms.date: 03/13/2026
8+
# Include: Managed HSM SDK prerequisites
9+
---
10+
11+
- An Azure subscription. [Create one for free](https://azure.microsoft.com/free/).
12+
- A provisioned and activated Managed HSM. See [Quickstart: Provision and activate a managed HSM using Azure CLI](/azure/key-vault/managed-hsm/quick-create-cli).
13+
- A key created in your Managed HSM. See [Manage keys in a Managed HSM](/azure/key-vault/managed-hsm/key-management).
14+
- An Azure resource with a managed identity (such as a VM, App Service, or Azure Function) or Azure CLI for local development.
15+
- The managed identity must have the appropriate Managed HSM local RBAC role assigned. See [Secure access to your managed HSMs](/azure/key-vault/managed-hsm/how-to-secure-access).
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
---
2+
author: msmbaldwin
3+
ms.author: mbaldwin
4+
ms.service: azure-key-vault
5+
ms.subservice: managed-hsm
6+
ms.topic: include
7+
ms.date: 03/13/2026
8+
# Include: Managed HSM role assignment CLI example
9+
---
10+
11+
## Assign Managed HSM roles
12+
13+
For your application to access keys, assign the appropriate Managed HSM local RBAC role to your managed identity:
14+
15+
```azurecli
16+
# Get the principal ID of your managed identity
17+
principalId=$(az vm identity show --name myVM --resource-group myRG --query principalId -o tsv)
18+
19+
# Assign the Crypto User role for key operations
20+
az keyvault role assignment create \
21+
--hsm-name ContosoMHSM \
22+
--role "Managed HSM Crypto User" \
23+
--assignee $principalId \
24+
--scope /keys
25+
```
26+
27+
For more information on roles and permissions, see [Managed HSM local RBAC built-in roles](/azure/key-vault/managed-hsm/built-in-roles).

0 commit comments

Comments
 (0)