You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/asset-inventory.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -199,7 +199,7 @@ This article describes how to use the unified cloud asset inventory in Microsoft
199
199
200
200
The cloud asset inventory provides a unified, contextual view of cloud infrastructure across Azure, AWS, and GCP environments. It categorizes assets by workload, criticality, and coverage status while integrating health data, device actions, and risk signals into a single interface.
201
201
202
-
:::image type="content" source="media/asset-inventory/cloud-infrastructure.png" alt-text="Screenshot of cloud asset inventory in the Defender portal" lightbox="media/asset-inventory/cloud-infrastructure.png":::
202
+
:::image type="content" source="media/asset-inventory/cloud-infrastructure.png" alt-text="Screenshot of cloud asset inventory in the Defender portal." lightbox="media/asset-inventory/cloud-infrastructure.png":::
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/cloud-infrastructure-dashboard.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Cloud overview dashboard in Microsoft Defender for Cloud
3
-
description: Learn how to use the Cloud overview dashboard to monitor security posture, threat protection, and exposure management across your multi-cloud environment.
3
+
description: Learn how to use the Cloud overview dashboard to monitor security posture, threat protection, and exposure management across your multicloud environment.
4
4
ms.topic: how-to
5
5
ms.date: 11/10/2025
6
6
ms.author: dlanger
@@ -49,7 +49,7 @@ At the top of the dashboard, you’ll find key filters:
49
49
-**Environment Filter**: Pivot the dashboard by the cloud environment you want to view, such as Azure, AWS, GCP.
50
50
-**Time Range**: Select 30 days, 3 months, or 6 months to view trends over time. This applies to all historical graphs and trend indicators.
51
51
52
-
:::image type="content" source="media/defender-portal-dashboard/top-controls.png" alt-text="Screenshot of filters on cloud overview dashboard":::
52
+
:::image type="content" source="media/defender-portal-dashboard/top-controls.png" alt-text="Screenshot of filters on cloud overview dashboard.":::
53
53
54
54
## Dashboard sections
55
55
@@ -66,7 +66,7 @@ This section gives you a quick snapshot of your current security status:
66
66
67
67
In addition, all cloud and code environments that are currently connected to Defender for Cloud are presented.
68
68
69
-
:::image type="content" source="media/defender-portal-dashboard/overview-highlights.png" alt-text="Screenshot of cloud overview dashboard highlights":::
69
+
:::image type="content" source="media/defender-portal-dashboard/overview-highlights.png" alt-text="Screenshot of cloud overview dashboard highlights.":::
70
70
71
71
### Top Actions
72
72
@@ -76,19 +76,19 @@ This section helps you understand where to start and is designed to guide your n
76
76
**High-Severity Incidents**: Investigate active alerts.
Each graph updates daily and reflects the selected time range. Hover over data points to see daily breakdowns.
94
94
@@ -107,7 +107,7 @@ Workloads include:
107
107
108
108
Each tile acts as a mini dashboard, showing top issues, protection coverage, and links to detailed views. This helps teams focus on what matters most for each workload.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/continuous-export-view-data.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ After you've set up continuous export of Microsoft Defender for Cloud security a
14
14
15
15
## Prerequisites
16
16
17
-
-[Setup continuous export in the Azure portal](continuous-export.md) or [setup continuous export with Azure Policy](continuous-export-azure-policy.md) or [setup continuous export with REST API](continuous-export-rest-api.md).
17
+
-[Set up continuous export in the Azure portal](continuous-export.md) or [set up continuous export with Azure Policy](continuous-export-azure-policy.md) or [set up continuous export with REST API](continuous-export-rest-api.md).
18
18
19
19
## View exported alerts and recommendations in Azure Monitor
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-cloud-introduction.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ Defender for Cloud uses its broader Cloud Native Application Protection Platform
37
37
38
38
In addition to its core CNAPP capabilities, Defender for Cloud delivers [AI security and AI threat protection](#ai-security-and-threat-protection) to safeguard generative AI workloads throughout their lifecycle. These features help you discover AI applications, identify vulnerabilities, reduce risks, and detect threats targeting your generative AI workloads.
39
39
40
-
:::image type="content" source="media/defender-for-cloud-introduction/cloud-security-pillars.png" alt-text="Diagram showing the core functionality of Defender for Cloud":::
40
+
:::image type="content" source="media/defender-for-cloud-introduction/cloud-security-pillars.png" alt-text="Diagram showing the core functionality of Defender for Cloud.":::
41
41
42
42
> [!NOTE]
43
43
> For pricing information, check out [the Defender for Cloud pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/). You can also [estimate costs with the Defender for Cloud cost calculator](cost-calculator.md).
@@ -54,7 +54,7 @@ Defender for Cloud's available plans and their CNAPP benefits include:
54
54
|--|--|--|
55
55
|**Defender CSPM / Foundational CSPM**| Provides advanced security posture capabilities including agentless vulnerability scanning, data-aware security posture, the cloud security graph, and advanced threat hunting. | Check out the [differences between the CSPM plans](concept-cloud-security-posture-management.md#plan-availability). <br><br> [Enable the Defender CSPM plan](tutorial-enable-cspm-plan.md). |
56
56
|**Defender for Servers**| Provides threat detection and advanced defenses for Windows and Linux machines that run in Azure, AWS, GCP, and on-premises environments. |[Plan your Defender for Servers deployment](plan-defender-for-servers.md) <br><br> Check out the [differences between the Defender for Servers plans](defender-for-servers-overview.md#defender-for-servers-plans) <br><br> [Deploy Defender for Servers](tutorial-enable-servers-plan.md)|
57
-
|**Defender for Containers**| Provides environment hardening, vulnerability assessment, run time protection of Kubernetes nodes and clusters. |[Overview of Container security in Microsoft Defender for Containers](defender-for-containers-introduction.md) <br><br> [Defender for Containers architecture](defender-for-containers-architecture.md) <br><br> Protect your [Azure](tutorial-enable-containers-azure.md), [IaaS](tutorial-enable-containers-arc.md), [AWS](tutorial-enable-container-aws.md), and [GCP](tutorial-enable-container-gcp.md) containers with Defender for Containers |
57
+
|**Defender for Containers**| Provides environment hardening, vulnerability assessment, run time protection of Kubernetes nodes and clusters. |[Overview of Container security in Microsoft Defender for Containers](defender-for-containers-introduction.md) <br><br> [Defender for Containers architecture](defender-for-containers-architecture.md) <br><br> Protect your [Azure](tutorial-enable-containers-azure.md), [IaaS](defender-for-containers-arc-enable-portal.md), [AWS](tutorial-enable-container-aws.md), and [GCP](tutorial-enable-container-gcp.md) containers with Defender for Containers |
58
58
|**Defender for Resource Manager**| Detects unusual and potentially harmful activity by automatically monitoring the resource management operations. |[Overview of Microsoft Defender for Resource Manager](defender-for-resource-manager-introduction.md) <br><br> [Protect your resources with Defender for Resource Manager](tutorial-enable-resource-manager-plan.md)|
59
59
|**Defender for Storage**| Protects against malware, storage specific threats, sensitive data leakage, and Shared Access Signature (SAS) token misuse. |[Overview of Microsoft Defender for Storage](defender-for-storage-introduction.md) <br><br> [Malware scanning](defender-for-storage-malware-scan.md) <br><br> [Detect threats to sensitive data](defender-for-storage-data-sensitivity.md) <br><br> [Deploy Microsoft Defender for Storage](tutorial-enable-storage-plan.md)|
60
60
|**Defender for App Service**| Identifies attacks that target applications running over App Service. |[Overview of Defender for App Service to protect your Azure App Service web apps and APIs](defender-for-app-service-introduction.md) <br><br> [Protect your applications with Defender for App Service](tutorial-enable-app-service-plan.md)|
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-storage-threats-alerts.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ In addition to security threats, configuration errors might inadvertently expose
36
36
37
37
To minimize the risk of security breaches and configuration errors, security teams employ a combination of posture management tools and workload protection tools. These tools ensure Azure Storage stays secure by providing visibility into early signs of breaches. They help prevent attacks and maintain secure configurations.
38
38
39
-
Microsoft security researchers analyzed the attack surface of storage services. The potential security risks are described in the[threat matrix for cloud-based storage services](https://www.microsoft.com/security/blog/2021/04/08/threat-matrix-for-storage/), which are based on the[MITRE ATT&CK® framework](https://attack.mitre.org/techniques/enterprise/), a knowledge base for the tactics and techniques employed in cyber-attacks.
39
+
Microsoft security researchers analyzed the attack surface of storage services. The potential security risks are described in the[threat matrix for cloud-based storage services](https://www.microsoft.com/security/blog/2021/04/08/threat-matrix-for-storage/), which are based on the[MITRE ATT&CK® framework](https://attack.mitre.org/techniques/enterprise/), a knowledge base for the tactics and techniques employed in cyber-attacks.
40
40
41
41
For a comparison between malware scanning and hash reputation analysis, see [Understanding the differences between these methods](defender-for-storage-introduction.md#understand-the-differences-between-malware-scanning-and-hash-reputation-analysis).
42
42
@@ -65,7 +65,7 @@ Security alerts include details of the suspicious activity, relevant investigati
65
65
66
66
## Accelerated threat detection with Storage aggregated logs
67
67
68
-
Storage aggregated logs in Defender XDR's Avanced Hunting give security teams a powerful way to spot patterns and anomalies across large volumes of storage activity. Instead of analyzing raw events one by one, the new `CloudStorageAggregatedEvents` table delivers summarized insights, such as spikes in failed operations, unusual authentication types, or suspicious access from unexpected locations, helping teams quickly identify potential threats and prioritize investigations. This capability reduces noise, accelerates detection, and strengthens protection for cloud storage at scale. This capability is included only in the new Defender for Storage per-storage account plan. For the full schema and field details, see the [CloudStorageAggregatedEvents reference table.](/defender-xdr/advanced-hunting-cloudstorageaggregatedevents-table)
68
+
Storage aggregated logs in Defender XDR's Advanced Hunting give security teams a powerful way to spot patterns and anomalies across large volumes of storage activity. Instead of analyzing raw events one by one, the new `CloudStorageAggregatedEvents` table delivers summarized insights, such as spikes in failed operations, unusual authentication types, or suspicious access from unexpected locations, helping teams quickly identify potential threats and prioritize investigations. This capability reduces noise, accelerates detection, and strengthens protection for cloud storage at scale. This capability is included only in the new Defender for Storage per-storage account plan. For the full schema and field details, see the [CloudStorageAggregatedEvents reference table.](/defender-xdr/advanced-hunting-cloudstorageaggregatedevents-table)
0 commit comments