Skip to content

Commit c48a3d7

Browse files
R-C-StewartCopilot
andcommitted
fixed pr-review alttext issue
Co-authored-by: Copilot <[email protected]>
1 parent 1add2b0 commit c48a3d7

4 files changed

Lines changed: 10 additions & 10 deletions

File tree

learn-pr/wwl-sci/implement-defender-databases/includes/2-explore-defender-databases-capabilities.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Platform security controls and auditing logs are foundational, but they don't alert you when an attack is in progress or when an AI service begins querying sensitive data in unusual patterns. Microsoft Defender for Databases fills this gap by providing active threat detection, real-time alerts, and automated vulnerability scanning across your database workloads. At Contoso Financial Services, the security team needs to determine which plans to enable and how to configure detection policies.
22

3-
:::image type="content" source="../media/defender-databases-capabilities.png" alt-text="Diagram showing the Defender for Databases plans with their coverage, shared threat detection capabilities, and MITRE ATT&CK mapping." lightbox="../media/defender-databases-capabilities.png":::
3+
:::image type="content" source="../media/defender-databases-capabilities.png" alt-text="Diagram of Defender for Databases plans, coverage, shared threat detection capabilities, and MITRE ATT&CK mapping." lightbox="../media/defender-databases-capabilities.png":::
44

55
| Plan | Coverage |
66
|------|----------|

learn-pr/wwl-sci/implement-defender-databases/includes/4-enable-defender-open-source-databases.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Defender for Cloud extends threat detection beyond Azure SQL Database to include open-source relational database services. Contoso Financial Services runs Azure Database for PostgreSQL as a secondary customer portal database, which currently sits outside the SQL threat detection coverage you configured in the previous unit.
22

3-
:::image type="content" source="../media/open-source-database-coverage.png" alt-text="Coverage map showing which Azure and Amazon Rational Database Service (RDS) are protected by Defender for open-source relational databases and which aren't covered." lightbox="../media/open-source-database-coverage.png":::
3+
:::image type="content" source="../media/open-source-database-coverage.png" alt-text="Diagram of Azure and Amazon RDS database types covered by Defender for open-source relational databases." lightbox="../media/open-source-database-coverage.png":::
44

55
| Coverage | Included | Not included |
66
|----------|----------|--------------|

learn-pr/wwl-sci/implement-defender-databases/includes/5-configure-vulnerability-assessment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
When you enable Defender for Azure SQL Databases, vulnerability assessment automatically becomes available to scan your databases for security misconfigurations and known vulnerabilities. For Contoso Financial Services, the first scan reveals the current security posture of the banking database before the regulator review.
22

3-
:::image type="content" source="../media/vulnerability-assessment-workflow.png" alt-text="Workflow diagram showing the vulnerability assessment process from enabling Defender through express configuration, autoscan, severity-categorized findings, and remediation or baseline actions." lightbox="../media/vulnerability-assessment-workflow.png":::
3+
:::image type="content" source="../media/vulnerability-assessment-workflow.png" alt-text="Diagram of the vulnerability assessment workflow from Defender enablement through autoscan, findings, and remediation." lightbox="../media/vulnerability-assessment-workflow.png":::
44

55
## Choose express configuration
66

learn-pr/wwl-sci/implement-defender-databases/includes/6-configure-alert-routing-validate-coverage.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Defender for Databases generates security alerts in Microsoft Defender for Cloud, but those alerts don't automatically reach the people who need to respond to them. At Contoso Financial Services, the security team enabled Defender for Azure SQL Databases and Defender for open-source relational databases across production subscriptions. Now you configure where alerts go, create suppression rules for expected behavior patterns, and validate that the detection pipeline works end-to-end.
22

3-
:::image type="content" source="../media/alert-routing-pipeline.png" alt-text="Diagram showing how Defender for Databases detections flow through alert generation, suppression rules, and routing to email notifications and Microsoft Sentinel." lightbox="../media/alert-routing-pipeline.png":::
3+
:::image type="content" source="../media/alert-routing-pipeline.png" alt-text="Diagram of Defender for Databases detections flowing through alert generation, suppression rules, and routing to email and Microsoft Sentinel." lightbox="../media/alert-routing-pipeline.png":::
44

55
| Destination | Configuration method | Purpose |
66
|-------------|---------------------|---------|
@@ -63,11 +63,11 @@ This validation confirms that when a real incident occurs, the right people rece
6363

6464
Before handing off the implementation:
6565

66-
- [ ] Defender for Azure SQL Databases is enabled on all production subscriptions
67-
- [ ] Defender for open-source relational databases is enabled on all subscriptions with PostgreSQL or MySQL
68-
- [ ] Email notifications route to the SOC team distribution list
69-
- [ ] Microsoft Sentinel data connector is active and Defender for Databases incidents appear in Microsoft Sentinel
70-
- [ ] Suppression rules are scoped correctly and have expiration dates set
71-
- [ ] Sample alerts are generated and validated end-to-end
66+
- Defender for Azure SQL Databases is enabled on all production subscriptions
67+
- Defender for open-source relational databases is enabled on all subscriptions with PostgreSQL or MySQL
68+
- Email notifications route to the SOC team distribution list
69+
- Microsoft Sentinel data connector is active and Defender for Databases incidents appear in Microsoft Sentinel
70+
- Suppression rules are scoped correctly and have expiration dates set
71+
- Sample alerts are generated and validated end-to-end
7272

7373
With alert routing configured and validated, the security operations team receives Defender for Databases detections in the systems they use for incident management. Your implementation connects detection to response. This foundation enables database security operations at Contoso.

0 commit comments

Comments
 (0)