Skip to content

Commit c0c3267

Browse files
authored
Merge pull request #2190 from DebLanger/prreview
Fix documentation formatting issues
2 parents 57eea4c + c1c2448 commit c0c3267

17 files changed

Lines changed: 92 additions & 321 deletions

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -564,6 +564,11 @@
564564
"source_path_from_root": "/articles/defender-for-cloud/tutorial-enable-containers-arc.md",
565565
"redirect_url": "/azure/defender-for-cloud/defender-for-containers-arc-enable-portal",
566566
"redirect_document_id": false
567+
},
568+
{
569+
"source_path_from_root": "/articles/defender-for-cloud/extract-resource-identifiers-support.md",
570+
"redirect_url": "/azure/defender-for-cloud/defender-portal/integration-faq#extracting-identifiers-for-support-cases",
571+
"redirect_document_id": false
567572
}
568573
]
569574
}

articles/defender-for-cloud/TOC.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -683,7 +683,6 @@
683683
href: deploy-vulnerability-assessment-byol-vm.md
684684
- name: Move to scanning with Defender Vulnerability Management
685685
displayName: qualys, rapid7, vulnerability, migrate, transition, Microsoft Defender Vulnerability Management, mdvm
686-
href: transition-to-built-in.md
687686
- name: Machine secrets scanning
688687
items:
689688
- name: Overview

articles/defender-for-cloud/asset-inventory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -199,7 +199,7 @@ This article describes how to use the unified cloud asset inventory in Microsoft
199199

200200
The cloud asset inventory provides a unified, contextual view of cloud infrastructure across Azure, AWS, and GCP environments. It categorizes assets by workload, criticality, and coverage status while integrating health data, device actions, and risk signals into a single interface.
201201

202-
:::image type="content" source="media/asset-inventory/cloud-infrastructure.png" alt-text="Screenshot of cloud asset inventory in the Defender portal" lightbox="media/asset-inventory/cloud-infrastructure.png":::
202+
:::image type="content" source="media/asset-inventory/cloud-infrastructure.png" alt-text="Screenshot of cloud asset inventory in the Defender portal." lightbox="media/asset-inventory/cloud-infrastructure.png":::
203203

204204
## Key capabilities
205205

articles/defender-for-cloud/cloud-infrastructure-dashboard.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Cloud overview dashboard in Microsoft Defender for Cloud
3-
description: Learn how to use the Cloud overview dashboard to monitor security posture, threat protection, and exposure management across your multi-cloud environment.
3+
description: Learn how to use the Cloud overview dashboard to monitor security posture, threat protection, and exposure management across your multicloud environment.
44
ms.topic: how-to
55
ms.date: 11/10/2025
66
ms.author: dlanger
@@ -49,7 +49,7 @@ At the top of the dashboard, you’ll find key filters:
4949
- **Environment Filter**: Pivot the dashboard by the cloud environment you want to view, such as Azure, AWS, GCP.
5050
- **Time Range**: Select 30 days, 3 months, or 6 months to view trends over time. This applies to all historical graphs and trend indicators.
5151

52-
:::image type="content" source="media/defender-portal-dashboard/top-controls.png" alt-text="Screenshot of filters on cloud overview dashboard":::
52+
:::image type="content" source="media/defender-portal-dashboard/top-controls.png" alt-text="Screenshot of filters on cloud overview dashboard.":::
5353

5454
## Dashboard sections
5555

@@ -66,7 +66,7 @@ This section gives you a quick snapshot of your current security status:
6666

6767
In addition, all cloud and code environments that are currently connected to Defender for Cloud are presented.
6868

69-
:::image type="content" source="media/defender-portal-dashboard/overview-highlights.png" alt-text="Screenshot of cloud overview dashboard highlights":::
69+
:::image type="content" source="media/defender-portal-dashboard/overview-highlights.png" alt-text="Screenshot of cloud overview dashboard highlights.":::
7070

7171
### Top Actions
7272

@@ -76,19 +76,19 @@ This section helps you understand where to start and is designed to guide your n
7676
**High-Severity Incidents**: Investigate active alerts.
7777
**Attack Paths**: Understand potential lateral movement.
7878

79-
:::image type="content" source="media/defender-portal-dashboard/top-actions.png" alt-text="Screenshot of cloud overview dashboard top actions":::
79+
:::image type="content" source="media/defender-portal-dashboard/top-actions.png" alt-text="Screenshot of cloud overview dashboard top actions.":::
8080

8181
### Trends over time
8282

8383
Track how your security posture and threat detection evolve.
8484

8585
**Security Posture**: View over time of the new Cloud Secure Score in addition to recommendations by severity.
8686

87-
:::image type="content" source="media/defender-portal-dashboard/security-posture.png" alt-text="Screenshot of cloud overview dashboard security posture trends":::
87+
:::image type="content" source="media/defender-portal-dashboard/security-posture.png" alt-text="Screenshot of cloud overview dashboard security posture trends.":::
8888

8989
**Threat Detection**: View alert trends by severity.
9090

91-
:::image type="content" source="media/defender-portal-dashboard/threat-detection.png" alt-text="Screenshot of cloud overview dashboard threat detection trends":::
91+
:::image type="content" source="media/defender-portal-dashboard/threat-detection.png" alt-text="Screenshot of cloud overview dashboard threat detection trends.":::
9292

9393
Each graph updates daily and reflects the selected time range. Hover over data points to see daily breakdowns.
9494

@@ -107,7 +107,7 @@ Workloads include:
107107

108108
Each tile acts as a mini dashboard, showing top issues, protection coverage, and links to detailed views. This helps teams focus on what matters most for each workload.
109109

110-
:::image type="content" source="media/defender-portal-dashboard/workloads.png" alt-text="Screenshot of cloud overview dashboard workload insights" lightbox="media/defender-portal-dashboard/workloads.png":::
110+
:::image type="content" source="media/defender-portal-dashboard/workloads.png" alt-text="Screenshot of cloud overview dashboard workload insights." lightbox="media/defender-portal-dashboard/workloads.png":::
111111

112112
## Next steps
113113

articles/defender-for-cloud/cloud-scopes-unified-rbac.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -83,10 +83,10 @@ Relationship to unified RBAC:
8383

8484
Planning guidance:
8585

86-
1. Start coarse (major org / region boundaries).
87-
1. Validate operational ownership and review cadence.
88-
1. Introduce finer scopes only when risk, confidentiality, or compliance requires it.
89-
1. Document purpose and owner for each scope to support lifecycle and audit.
86+
- Start coarse (major org / region boundaries).
87+
- Validate operational ownership and review cadence.
88+
- Introduce finer scopes only when risk, confidentiality, or compliance requires it.
89+
- Document purpose and owner for each scope to support lifecycle and audit.
9090

9191
## Prerequisites
9292

articles/defender-for-cloud/concept-regulatory-compliance-standards.md

Lines changed: 30 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -133,40 +133,40 @@ The following standards are available in Defender for Cloud:
133133

134134
|Standards|Clouds|
135135
| -------- | -------- |
136-
|EU 2022 2555 (NIS2) 2022  |Azure, AWS, GCP|
137-
|EU General Data Protection Regulation (GDPR) 2016 679  |Azure, AWS, GCP|
138-
|NIST CSF v2.0  |Azure, AWS, GCP|
139-
|NIST 800 171 Rev3  |Azure, AWS, GCP|
140-
|NIST SP 800 53 R5.1.1  |Azure, AWS, GCP|
141-
|PCI DSS v4.0.1  |Azure, AWS, GCP|
142-
|CIS AWS Foundations v3.0.0  |AWS|
143-
|CIS Azure Foundations v2.1.0  |Azure|
144-
|CIS Controls v8.1  |Azure, AWS, GCP|
145-
|CIS GCP Foundations v3.0  |GCP|
136+
|EU 2022 2555 (NIS2) 2022 |Azure, AWS, GCP|
137+
|EU General Data Protection Regulation 2016 679 |Azure, AWS, GCP|
138+
|NIST CSF v2.0 |Azure, AWS, GCP|
139+
|NIST 800 171 Rev3 |Azure, AWS, GCP|
140+
|NIST SP 800 53 R5.1.1 |Azure, AWS, GCP|
141+
|PCI DSS v4.0.1 |Azure, AWS, GCP|
142+
|CIS AWS Foundations v3.0.0 |AWS|
143+
|CIS Azure Foundations v2.1.0 |Azure|
144+
|CIS Controls v8.1 |Azure, AWS, GCP|
145+
|CIS GCP Foundations v3.0 |GCP|
146146
|CIS Google Cloud Platform Foundation Benchmark|GCP|
147147
|CIS Azure Kubernetes Service (AKS) Benchmark|Azure|
148148
|CIS Amazon Elastic Kubernetes Service (EKS) Benchmark|AWS|
149149
|CIS Google Kubernetes Engine (GKE) Benchmark|GCP|
150-
|HITRUST CSF v11.3.0  |Azure, AWS, GCP|
151-
|SOC 2023  |Azure, AWS, GCP|
152-
|SWIFT Customer Security Controls Framework 2024  |Azure, AWS, GCP|
153-
|ISO IEC 27001:2022  |Azure, AWS, GCP|
154-
|ISO IEC 27002:2022  |Azure, AWS, GCP|
155-
|ISO IEC 27017:2015  |Azure, AWS, GCP|
156-
|Cybersecurity Maturity Model Certification (CMMC) Level 2 v2.0  |Azure, AWS, GCP|
157-
|AWS Well Architected Framework 2024  |AWS|
158-
|Canada Federal PBMM 3.2020  |Azure, AWS, GCP|
159-
|APRA CPS 234 2019  |Azure, AWS|
160-
|CSA Cloud Controls Matrix v4.0.12  |Azure, AWS, GCP|
161-
|Cyber Essentials v3.1  |Azure, AWS, GCP|
162-
|Criminal Justice Information Services Security Policy v5.9.5  |Azure, AWS, GCP|
163-
|FFIEC CAT 2017  |Azure, AWS, GCP|
164-
|Brazilian General Data Protection Law (LGPD) 2018  |Azure, AWS, GCP|
165-
|NZISM v3.7  |Azure, AWS, GCP|
166-
|Sarbanes Oxley Act 2022 (SOX)  |Azure, AWS, GCP|
167-
|NCSC Cyber Assurance Framework (CAF) v3.2  |Azure, AWS, GCP|
150+
|HITRUST CSF v11.3.0 |Azure, AWS, GCP|
151+
|SOC 2023 |Azure, AWS, GCP|
152+
|SWIFT Customer Security Controls Framework 2024 |Azure, AWS, GCP|
153+
|ISO IEC 27001:2022 |Azure, AWS, GCP|
154+
|ISO IEC 27002:2022 |Azure, AWS, GCP|
155+
|ISO IEC 27017:2015 |Azure, AWS, GCP|
156+
|Cybersecurity Maturity Model Certification (CMMC) Level 2 v2.0 |Azure, AWS, GCP|
157+
|AWS Well Architected Framework 2024 |AWS|
158+
|Canada Federal PBMM 3.2020 |Azure, AWS, GCP|
159+
|APRA CPS 234 2019 |Azure, AWS|
160+
|CSA Cloud Controls Matrix v4.0.12 |Azure, AWS, GCP|
161+
|Cyber Essentials v3.1 |Azure, AWS, GCP|
162+
|Criminal Justice Information Services Security Policy v5.9.5 |Azure, AWS, GCP|
163+
|FFIEC CAT 2017 |Azure, AWS, GCP|
164+
|Brazilian General Data Protection Law (LGPD) 2018 |Azure, AWS, GCP|
165+
|NZISM v3.7 |Azure, AWS, GCP|
166+
|Sarbanes Oxley Act 2022 (SOX) |Azure, AWS, GCP|
167+
|NCSC Cyber Assurance Framework (CAF) v3.2 |Azure, AWS, GCP|
168168
|Australian Government ISM Protected|Azure|
169-
|FedRAMP ‘H’ & ‘M’|Azure|
169+
|FedRAMP 'H' & 'M'|Azure|
170170
|HIPAA|Azure|
171171
|RMIT Malaysia |Azure|
172172
|SOC 2|Azure, GCP|
@@ -184,4 +184,4 @@ The following standards are available in Defender for Cloud:
184184
## Related content
185185

186186
- [Assign regulatory compliance standards](assign-regulatory-compliance-standards.md)
187-
- [Improve regulatory compliance](regulatory-compliance-dashboard.md)
187+
- [Improve regulatory compliance](regulatory-compliance-dashboard.md)

articles/defender-for-cloud/continuous-export-view-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ After you've set up continuous export of Microsoft Defender for Cloud security a
1414

1515
## Prerequisites
1616

17-
- [Setup continuous export in the Azure portal](continuous-export.md) or [setup continuous export with Azure Policy](continuous-export-azure-policy.md) or [setup continuous export with REST API](continuous-export-rest-api.md).
17+
- [Set up continuous export in the Azure portal](continuous-export.md) or [set up continuous export with Azure Policy](continuous-export-azure-policy.md) or [set up continuous export with REST API](continuous-export-rest-api.md).
1818

1919
## View exported alerts and recommendations in Azure Monitor
2020

articles/defender-for-cloud/defender-for-cloud-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Defender for Cloud uses its broader Cloud Native Application Protection Platform
3737

3838
In addition to its core CNAPP capabilities, Defender for Cloud delivers [AI security and AI threat protection](#ai-security-and-threat-protection) to safeguard generative AI workloads throughout their lifecycle. These features help you discover AI applications, identify vulnerabilities, reduce risks, and detect threats targeting your generative AI workloads.
3939

40-
:::image type="content" source="media/defender-for-cloud-introduction/cloud-security-pillars.png" alt-text="Diagram showing the core functionality of Defender for Cloud":::
40+
:::image type="content" source="media/defender-for-cloud-introduction/cloud-security-pillars.png" alt-text="Diagram showing the core functionality of Defender for Cloud.":::
4141

4242
> [!NOTE]
4343
> For pricing information, check out [the Defender for Cloud pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/). You can also [estimate costs with the Defender for Cloud cost calculator](cost-calculator.md).
@@ -54,7 +54,7 @@ Defender for Cloud's available plans and their CNAPP benefits include:
5454
|--|--|--|
5555
| **Defender CSPM / Foundational CSPM** | Provides advanced security posture capabilities including agentless vulnerability scanning, data-aware security posture, the cloud security graph, and advanced threat hunting. | Check out the [differences between the CSPM plans](concept-cloud-security-posture-management.md#plan-availability). <br><br> [Enable the Defender CSPM plan](tutorial-enable-cspm-plan.md). |
5656
| **Defender for Servers** | Provides threat detection and advanced defenses for Windows and Linux machines that run in Azure, AWS, GCP, and on-premises environments. | [Plan your Defender for Servers deployment](plan-defender-for-servers.md) <br><br> Check out the [differences between the Defender for Servers plans](defender-for-servers-overview.md#defender-for-servers-plans) <br><br> [Deploy Defender for Servers](tutorial-enable-servers-plan.md) |
57-
| **Defender for Containers** | Provides environment hardening, vulnerability assessment, run time protection of Kubernetes nodes and clusters. | [Overview of Container security in Microsoft Defender for Containers](defender-for-containers-introduction.md) <br><br> [Defender for Containers architecture](defender-for-containers-architecture.md) <br><br> Protect your [Azure](tutorial-enable-containers-azure.md), [IaaS](tutorial-enable-containers-arc.md), [AWS](tutorial-enable-container-aws.md), and [GCP](tutorial-enable-container-gcp.md) containers with Defender for Containers |
57+
| **Defender for Containers** | Provides environment hardening, vulnerability assessment, run time protection of Kubernetes nodes and clusters. | [Overview of Container security in Microsoft Defender for Containers](defender-for-containers-introduction.md) <br><br> [Defender for Containers architecture](defender-for-containers-architecture.md) <br><br> Protect your [Azure](tutorial-enable-containers-azure.md), [IaaS](defender-for-containers-arc-enable-portal.md), [AWS](tutorial-enable-container-aws.md), and [GCP](tutorial-enable-container-gcp.md) containers with Defender for Containers |
5858
| **Defender for Resource Manager** | Detects unusual and potentially harmful activity by automatically monitoring the resource management operations. | [Overview of Microsoft Defender for Resource Manager](defender-for-resource-manager-introduction.md) <br><br> [Protect your resources with Defender for Resource Manager](tutorial-enable-resource-manager-plan.md) |
5959
| **Defender for Storage** | Protects against malware, storage specific threats, sensitive data leakage, and Shared Access Signature (SAS) token misuse. | [Overview of Microsoft Defender for Storage](defender-for-storage-introduction.md) <br><br> [Malware scanning](defender-for-storage-malware-scan.md) <br><br> [Detect threats to sensitive data](defender-for-storage-data-sensitivity.md) <br><br> [Deploy Microsoft Defender for Storage](tutorial-enable-storage-plan.md) |
6060
| **Defender for App Service** | Identifies attacks that target applications running over App Service. | [Overview of Defender for App Service to protect your Azure App Service web apps and APIs](defender-for-app-service-introduction.md) <br><br> [Protect your applications with Defender for App Service](tutorial-enable-app-service-plan.md) |

articles/defender-for-cloud/defender-for-storage-threats-alerts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ In addition to security threats, configuration errors might inadvertently expose
3636

3737
To minimize the risk of security breaches and configuration errors, security teams employ a combination of posture management tools and workload protection tools. These tools ensure Azure Storage stays secure by providing visibility into early signs of breaches. They help prevent attacks and maintain secure configurations.
3838

39-
Microsoft security researchers analyzed the attack surface of storage services. The potential security risks are described in the[threat matrix for cloud-based storage services](https://www.microsoft.com/security/blog/2021/04/08/threat-matrix-for-storage/), which are based on the[MITRE ATT&CK® framework](https://attack.mitre.org/techniques/enterprise/), a knowledge base for the tactics and techniques employed in cyber-attacks.
39+
Microsoft security researchers analyzed the attack surface of storage services. The potential security risks are described in the [threat matrix for cloud-based storage services](https://www.microsoft.com/security/blog/2021/04/08/threat-matrix-for-storage/), which are based on the [MITRE ATT&CK® framework](https://attack.mitre.org/techniques/enterprise/), a knowledge base for the tactics and techniques employed in cyber-attacks.
4040

4141
For a comparison between malware scanning and hash reputation analysis, see [Understanding the differences between these methods](defender-for-storage-introduction.md#understand-the-differences-between-malware-scanning-and-hash-reputation-analysis).
4242

@@ -65,7 +65,7 @@ Security alerts include details of the suspicious activity, relevant investigati
6565

6666
## Accelerated threat detection with Storage aggregated logs
6767

68-
Storage aggregated logs in Defender XDR's Avanced Hunting give security teams a powerful way to spot patterns and anomalies across large volumes of storage activity. Instead of analyzing raw events one by one, the new `CloudStorageAggregatedEvents` table delivers summarized insights, such as spikes in failed operations, unusual authentication types, or suspicious access from unexpected locations, helping teams quickly identify potential threats and prioritize investigations. This capability reduces noise, accelerates detection, and strengthens protection for cloud storage at scale. This capability is included only in the new Defender for Storage per-storage account plan. For the full schema and field details, see the [CloudStorageAggregatedEvents reference table.](/defender-xdr/advanced-hunting-cloudstorageaggregatedevents-table)
68+
Storage aggregated logs in Defender XDR's Advanced Hunting give security teams a powerful way to spot patterns and anomalies across large volumes of storage activity. Instead of analyzing raw events one by one, the new `CloudStorageAggregatedEvents` table delivers summarized insights, such as spikes in failed operations, unusual authentication types, or suspicious access from unexpected locations, helping teams quickly identify potential threats and prioritize investigations. This capability reduces noise, accelerates detection, and strengthens protection for cloud storage at scale. This capability is included only in the new Defender for Storage per-storage account plan. For the full schema and field details, see the [CloudStorageAggregatedEvents reference table.](/defender-xdr/advanced-hunting-cloudstorageaggregatedevents-table)
6969

7070
## Related content
7171

0 commit comments

Comments
 (0)