Cuir in eagar

Comhroinn trí


Data security dashboard

Microsoft Defender for Cloud's data security dashboard provides an interactive view of significant risks to sensitive data. It prioritizes alerts and potential attack paths across multicloud data resources, making data protection management more effective.

With the data security dashboard you can:

  • Easily locate and summarize sensitive data resources in your cloud data estate.
  • Identify and prioritize data resources at risk to prevent and respond to sensitive data breaches.
  • Investigate active high severity threats that lead to sensitive data.
  • Explore potential threats data by highlighting attack paths that lead to sensitive data.
  • Explore useful data insights by highlighting useful data queries in the security explorer.

To access the data security dashboard in Defender for Cloud, select Data Security.

Screenshot that shows you how to navigate to the data security dashboard.

Prerequisites

To view the dashboard:

To receive the alerts for data sensitivity:

Required permissions and roles

Permissions:

  • Microsoft.Security/assessments/read
  • Microsoft.Security/assessments/subassessments/read
  • Microsoft.Security/alerts/read

Role - the minimum required privileged role-based access control role of Security explorer.

Note

The data security dashboard feature is turned on at the subscription level.

Data security overview section

The data security overview section provides a general overview of your cloud data estate, per cloud, including all data resources, divided into storage assets, managed databases, and hosted databases (IaaS).

Screenshot that shows the overview section of the data security view.

  • Coverage status - displays the limited data coverage for resources without Defender CSPM workload protection:

    • Covered – resources that have the necessary Defender CSPM, or Defender for Storage, or Defender for Databases enabled.
    • Partially covered – missing either the Defender CSPM, Defender for Storage, or Defender for Storage plan. Select the tooltip to present a detailed view of what is missing.
    • Not covered - resources that aren't covered by Defender CSPM, or Defender for Storage, or Defender for Databases.
  • Sensitive resources – displays how many resources are sensitive.

    • Sensitive resources requiring attention - displays the number of sensitive resources that have either high severity security alerts or attack paths.

Top issues

The Top issues section provides a highlighted view of top active and potential risks to sensitive data.

  • Sensitive data resources with high severity alerts - summarizes the active threats to sensitive data resources and which data types are at risk.

  • Sensitive data resources in attack paths - summarizes the potential threats to sensitive data resources by presenting attack paths leading to sensitive data resources and which data types are at potential risk.

  • Data queries in security explorer - presents the top data-related queries in security explorer that helps focus on multicloud risks to sensitive data.

    Screenshot that shows the top issues section of the data security view.

Closer look

The Closer look section provides a more detailed view into the sensitive data within the organization.

  • Sensitive data discovery - summarizes the results of the sensitive resources discovered, allowing customers to explore a specific sensitive information type and label.

  • Internet-exposed data resources - summarizes the discovery of sensitive data resources that are internet-exposed for storage and managed databases.

    Screenshot that shows the closer look section of the data security dashboard.

You can select the Manage data sensitivity settings to get to the Data sensitivity page. The Data sensitivity page allows you to manage the data sensitivity settings of cloud resources at the tenant level, based on selective info types and labels originating from the Purview compliance portal, and customize sensitivity settings such as creating your own customized info types and labels, and setting sensitivity label thresholds.

Screenshot that shows where to access managing data sensitivity settings.

Next steps