Critical assets protection in Microsoft Defender for Cloud

Critical assets protection enables security administrators to automatically tag the "crown jewel" resources that are most critical to their organizations, allowing Defender for Cloud to provide them with the highest level of protection and prioritize security issues on these assets above anything else.

Defender for Cloud suggests pre-defined classification rules that was developed by our research team to discover critical assets automatically, and allows you to create custom classification rules based on your business and organizational conventions.

Critical asset rules are bi-directionally synced with Microsoft Security Exposure Management - rules that were created in Microsoft Security Exposure Management are synced to Defender for Cloud, and vice versa. Learn more about critical assets protection in Microsoft Security Exposure Management.

Availability

Aspect Details
Release state General Availability
Prerequisites Defender Cloud Security Posture Management (CSPM) enabled
Required Microsoft Entra ID built-in roles: To create/edit/read classification rules: Security Operator or higher
To read classification rules: Global Reader, Security Reader
Clouds: All commercial clouds

Set up critical asset rules

  1. Sign in to the Azure portal.

  2. Navigate to Microsoft Defender for Cloud > Environment Settings.

  3. Select the Resource criticality tile.

    Screenshot of the resource criticality tile.

  4. The Critical asset management pane opens. Select Open Microsoft Defender portal."

    Screenshot of the critical asset management pane.

  5. You then arrive at the Critical asset management page in the Microsoft Defender XDR portal.

    Screenshot of critical asset management page.

  6. To create custom critical asset rules to tag your resources as Critical resources in Defender for Cloud, select the Create a new classification button.

    Screenshot of Create a new classification button.

  7. Add a name and description for your new classification, and use under Query builder, select Cloud resource to build your critical assets rule. Then select Next.

    Screenshot of how to create critical asset classification.

  8. On the Preview assets page, you can see a list of assets that match the rule you created. After reviewing the page, select Next.

    Screenshot of Preview assets page, showing a list of all assets that match the rule.

  9. On the Assign criticality page, assign the criticality level to all assets matching the rule. Then select Next.

    A screenshot of the Assign criticality page.

  10. You can then see the Review and finish page. Review the results, and once you approve, select Submit.

    Screenshot of the Review and finish page.

  11. After you select Submit, you can close the Microsoft Defender XDR portal. You should wait for up to two hours until all assets matching your rule are tagged as Critical.

Note

Your critical asset rules apply to all the resources in the tenant that match the rule's condition.

View and protect your critical assets in Defender for Cloud

  1. Once your assets are updated, go to the Attack path analysis page in Defender for Cloud. You can see all the attack paths to your critical assets.

    Screenshot of attack path analysis page.

  2. If you select an attack path title, you can see its details. Select the target, and under Insights - Critical resource, you can see the critical asset tagging information.

    Screenshot of critical resource insights.

  3. In the Recommendations page of Defender for Cloud, select the Preview available banner to see all the recommendations, which are now prioritized based on asset criticality.

    Screenshot of the recommendations page, showing critical resources.

  4. Select a recommendation, and then choose the Graph tab. Then choose the target, and select the Insights tab. You can see the critical asset tagging information.

    Screenshot of critical asset insights for recommendations.

  5. In the Inventory page of Defender for Cloud, you can see the critical assets in your organization.

    Screenshot of inventory page with critical assets tagged.

  6. To run custom queries on your critical assets, go to the Cloud Security Explorer page in Defender for Cloud.

    Screenshot of Cloud Security Explorer page with query for critical assets.

For more information about improving your cloud security posture, see Cloud security posture management (CSPM).