-
Notifications
You must be signed in to change notification settings - Fork 143
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Update Azure Security Center to Microsoft Defender for Cloud (#664)
- Loading branch information
1 parent
028742a
commit c931e32
Showing
12 changed files
with
872 additions
and
871 deletions.
There are no files selected for viewing
Large diffs are not rendered by default.
Oops, something went wrong.
Binary file not shown.
Large diffs are not rendered by default.
Oops, something went wrong.
Binary file not shown.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -87,15 +87,15 @@ Parameter name | Default Value | Description | |
|
||
Under the [src/bicep/modules/policies](../src/bicep/modules/policies) directory are JSON files named for the initiatives with default parameters (except for a Log Analytics workspace ID value `<LAWORKSPACE>` that we substitute at deployment time -- any other parameter can be modified as needed). | ||
|
||
#### Azure Security Center (Microsoft Defender for Cloud) | ||
#### Microsoft Defender for Cloud | ||
|
||
By default [Azure Security Center](https://docs.microsoft.com/en-us/azure/defender-for-cloud/defender-for-cloud-introduction) offers a free set of monitoring capabilities that are enabled via an Azure policy when you first set up a subscription and view the Azure Security Center portal blade. | ||
By default [Microsoft Defender for Cloud](https://docs.microsoft.com/en-us/azure/defender-for-cloud/defender-for-cloud-introduction) offers a free set of monitoring capabilities that are enabled via an Azure policy when you first set up a subscription and view the Microsoft Defender for Cloud portal blade. | ||
|
||
Azure Security Center offers a standard/defender sku which enables a greater depth of awareness including more recomendations and threat analytics. You can enable this higher depth level of security in MLZ by setting the parameter `deployASC` during deployment. In addition you can include the `emailSecurityContact` parameter to set a contact email for alerts. | ||
Microsoft Defender for Cloud offers a standard/defender sku which enables a greater depth of awareness including more recomendations and threat analytics. You can enable this higher depth level of security in MLZ by setting the parameter `deployDefender` during deployment. In addition you can include the `emailSecurityContact` parameter to set a contact email for alerts. | ||
|
||
Parameter name | Default Value | Description | ||
-------------- | ------------- | ----------- | ||
`deployASC` | 'false' | When set to "true", enables Azure Security Center for the subscriptions used in the deployment. It defaults to "false". | ||
`deployDefender` | 'false' | When set to "true", enables Microsoft Defender for Cloud for the subscriptions used in the deployment. It defaults to "false". | ||
`emailSecurityContact` | '' | Email address of the contact, in the form of [email protected] | ||
|
||
#### Azure Sentinel | ||
|
@@ -400,7 +400,7 @@ The Bicep/ARM deployment of Mission Landing Zone can be deleted with these steps | |
|
||
1. Delete all resource groups. | ||
1. Delete the diagnostic settings deployed at the subscription level. | ||
1. If Azure Security Center (ASC) was deployed (parameter `deployASC=true` was used) then remove subscription-level policy assignments and downgrade the ASC pricing tiers. | ||
1. If Microsoft Defender for Cloud was deployed (parameter `deployDefender=true` was used) then remove subscription-level policy assignments and downgrade the Microsoft Defender for Cloud pricing tiers. | ||
|
||
> NOTE: If you deploy and delete Mission Landing Zone in the same subscription multiple times without deleting the subscription-level diagnostic settings, the sixth deployment will fail. Azure has a limit of five diagnostic settings per subscription. The error will be similar to this: `"The limit of 5 diagnostic settings was reached."` | ||
|
@@ -432,14 +432,14 @@ az policy assignment list -o table --query "[].{Name:name, DisplayName:displayNa | |
az policy assignment delete --name "<name of policy assignment>" | ||
``` | ||
|
||
To downgrade the ASC pricing level in the Azure portal: | ||
To downgrade the Microsoft Defender for Cloud pricing level in the Azure portal: | ||
|
||
1. Navigate to the Microsoft Defender for Cloud page, then click the "Environment settings" tab in the left navigation panel. | ||
1. In the tree/grid select the subscription you want to manage. | ||
1. Click the large box near the top of the page that says "Enhanced security off". | ||
1. Click the save button. | ||
|
||
To downgrade the ASC pricing level using the AZ CLI: | ||
To downgrade the Microsoft Defender for Cloud pricing level using the AZ CLI: | ||
|
||
```BASH | ||
# List the pricing tiers | ||
|
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -93,7 +93,7 @@ Parameter name | Required | Description | |
`windowsNetworkInterfacePrivateIPAddressAllocationMethod` | No | [Static/Dynamic] The public IP Address allocation method for the Windows virtual machine. It defaults to "Dynamic". | ||
`deployPolicy` | No | When set to "true", deploys the Azure Policy set defined at by the parameter "policy" to the resource groups generated in the deployment. It defaults to "false". | ||
`policy` | No | [NIST/IL5/CMMC] Built-in policy assignments to assign, it defaults to "NIST". IL5 is only available for AzureUsGovernment and will switch to NIST if tried in AzureCloud. | ||
`deployASC` | No | When set to "true", enables Azure Security Center for the subscriptions used in the deployment. It defaults to "false". | ||
`deployDefender` | No | When set to "true", enables Microsoft Defender for Cloud for the subscriptions used in the deployment. It defaults to "false". | ||
`emailSecurityContact` | No | Email address of the contact, in the form of [email protected] | ||
<!-- markdownlint-enable MD034 --> | ||
|
||
|
Oops, something went wrong.