Skip to content

Commit c4d0c2c

Browse files
committed
copied table from release note
1 parent 3106176 commit c4d0c2c

1 file changed

Lines changed: 14 additions & 1 deletion

File tree

articles/defender-for-cloud/serverless-protection.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,12 +12,25 @@ Microsoft Defender for Cloud, as a Cloud-Native Application Protection Platform
1212

1313
Serverless protection automatically discovers and inventories all Web Apps, Azure Functions, and AWS Lambda functions in your environment. Once it discovers these resources, Defender for Cloud identifies misconfigurations, vulnerabilities, and insecure dependencies. Defender for Cloud then offers remediation guidance and continuous posture assessment, helping organizations maintain strong posture management and reduce risk in dynamic, serverless architectures.
1414

15-
## Serverless protection requirements
15+
## Serverless protection requirements and availability
1616

1717
Serverless protection is available as part of the [Defender Cloud Security Posture Management (CSPM) plan](concept-cloud-security-posture-management.md#cspm-plans).
1818

1919
To enable serverless protection, you must [Enable the Defender CSPM plan](tutorial-enable-cspm-plan.md) on your subscription, and [enable the Serverless protection component](tutorial-enable-cspm-plan.md#enable-the-components-of-the-defender-cspm-plan) of the Defender CSPM plan.
2020

21+
Currently, the available features vary by portal. The following table shows which features are available in each portal:
22+
23+
| Feature | Defender for Cloud portal | Defender portal |
24+
|--|--|--|
25+
| Onboarding through the Defender CSPM plan | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="../defender-for-cloud/media/icons/no-icon.png"::: |
26+
| Review misconfiguration recommendations | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
27+
| Build queries with the cloud security explorer | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="../defender-for-cloud/media/icons/no-icon.png"::: |
28+
| Explore workloads in Cloud Inventory | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
29+
| Investigate attack paths | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
30+
| Vulnerability Assessment | - | :::image type="icon" source="./media/icons/yes-icon.png"::: |
31+
32+
To view the availability, see [cloud support](support-matrix-defender-for-cloud.md#cloud-support).
33+
2134
See [limitations](#limitations) for serverless resources.
2235

2336
## Benefits of serverless protection

0 commit comments

Comments
 (0)