Skip to content

Commit c5427ce

Browse files
authored
Merge pull request #171462 from memildin/asc-melvyn-recs-stuff
Updated recommendation reference page
2 parents 05407fa + 4e04fae commit c5427ce

10 files changed

+52
-52
lines changed

articles/security-center/recommendations-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article lists Azure Security Center's security recommendations
44
author: memildin
55
ms.service: security-center
66
ms.topic: reference
7-
ms.date: 07/25/2021
7+
ms.date: 09/05/2021
88
ms.author: memildin
99
ms.custom: generated
1010
---

includes/asc-recs-appservices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: memildin
33
ms.service: security-center
44
ms.topic: include
5-
ms.date: 07/25/2021
5+
ms.date: 09/05/2021
66
ms.author: memildin
77
ms.custom: generated
88
---

includes/asc-recs-compute.md

Lines changed: 6 additions & 6 deletions
Large diffs are not rendered by default.

includes/asc-recs-container.md

Lines changed: 4 additions & 4 deletions
Large diffs are not rendered by default.

includes/asc-recs-data.md

Lines changed: 9 additions & 9 deletions
Large diffs are not rendered by default.

includes/asc-recs-identityandaccess.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: memildin
33
ms.service: security-center
44
ms.topic: include
5-
ms.date: 07/25/2021
5+
ms.date: 09/05/2021
66
ms.author: memildin
77
ms.custom: generated
88
---

includes/asc-recs-iot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: memildin
33
ms.service: security-center
44
ms.topic: include
5-
ms.date: 07/25/2021
5+
ms.date: 09/05/2021
66
ms.author: memildin
77
ms.custom: generated
88
---

includes/asc-recs-networking.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: memildin
33
ms.service: security-center
44
ms.topic: include
5-
ms.date: 07/25/2021
5+
ms.date: 09/05/2021
66
ms.author: memildin
77
ms.custom: generated
88
---
@@ -24,5 +24,5 @@ There are **14** recommendations in this category.
2424
|[Non-internet-facing virtual machines should be protected with network security groups](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/a9341235-9389-42f0-a0bf-9bfb57960d44) |Protect your non-internet-facing virtual machine from potential threats by restricting access to it with a network security group (NSG). NSGs contain a list of Access Control List (ACL) rules that allow or deny network traffic to your VM from other instances, whether or not they're on the same subnet.<br>Note that to keep your machine as secure as possible, the VM's access to the internet must be restricted and an NSG should be enabled on the subnet.<br />(Related policy: [Non-internet-facing virtual machines should be protected with network security groups](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2fbb91dfba-c30d-4263-9add-9c2384e659a6)) |Low |
2525
|[Secure transfer to storage accounts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/1c5de8e1-f68d-6a17-e0d2-ec259c42768c) |Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking.<br />(Related policy: [Secure transfer to storage accounts should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f404c3081-a854-4457-ae30-26a93ef643f9)) |High |
2626
|[Subnets should be associated with a network security group](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/eade5b56-eefd-444f-95c8-23f29e5d93cb) |Protect your subnet from potential threats by restricting access to it with a network security group (NSG). NSGs contain a list of Access Control List (ACL) rules that allow or deny network traffic to your subnet. When an NSG is associated with a subnet, the ACL rules apply to all the VM instances and integrated services in that subnet, but don't apply to internal traffic inside the subnet. To secure resources in the same subnet from one another, enable NSG directly on the resources as well.<br />(Related policy: [Subnets should be associated with a Network Security Group](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2fe71308d3-144b-4262-b144-efdc3cc90517)) |Low |
27-
|[Virtual networks should be protected by Azure Firewall](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/f67fb4ed-d481-44d7-91e5-efadf504f74a) |Some of your virtual networks aren't protected with a firewall. Use Azure Firewall to restrict access to your virtual networks and prevent potential threats. To learn more about Azure Firewall, <br> Click <a href="https://azure.microsoft.com/pricing/details/azure-firewall">here</a><br />(Related policy: [All Internet traffic should be routed via your deployed Azure Firewall](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2ffc5e4038-4584-4632-8c85-c0448d374b2c)) |Low |
27+
|[Virtual networks should be protected by Azure Firewall](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/f67fb4ed-d481-44d7-91e5-efadf504f74a) |Some of your virtual networks aren't protected with a firewall. Use Azure Firewall to restrict access to your virtual networks and prevent potential threats. To learn more about Azure Firewall, <br> see [Azure Firewall pricing](https://azure.microsoft.com/pricing/details/azure-firewall)<br />(Related policy: [All Internet traffic should be routed via your deployed Azure Firewall](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2ffc5e4038-4584-4632-8c85-c0448d374b2c)) |Low |
2828
|||

includes/asc/recommendations-with-deny.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: memildin
33
ms.service: security-center
44
ms.topic: include
5-
ms.date: 07/25/2021
5+
ms.date: 09/05/2021
66
ms.author: memildin
77
ms.custom: generated
88
---

includes/asc/security-control-recommendations.md

Lines changed: 26 additions & 26 deletions
Large diffs are not rendered by default.

0 commit comments

Comments
 (0)