Learn about important Azure product updates, roadmap and announcements. Subscribe to notifications to stay informed.RSS feed
New enhancements and updates were made to Azure Security Center in June 2020.
Target availability: Q3 2020
The Azure Log Analytics agent for Windows will begin to use SHA-2 signing exclusively on 17 Aug. 2020. This change requires action only if you’re running the agent on a legacy OS version.
In order to enable enterprise-level scenarios on top of Security Center, we now enable you to consume Security Center alerts and recommendations in additional places except the Azure Portal or API.
Embedded developers can now access reliable, real-time performance for resource-constrained devices and seamless integration to Azure IoT. STMicroelectronics, Renesas, Qualcomm, NXP and Microchip will offer development kits featuring Azure RTOS.
Target availability: Q2 2020
Azure Security Center is expanding its container security features to protect Azure Kubernetes Service (AKS).
Target availability: Q2 2020
The Log Analytics agent for Windows, sometimes known as the OMS Windows agent or Microsoft Monitoring agent, will begin to enforce SHA-2 signing on 18 May 2020. This change only requires action if you are running the agent on a legacy OS version (Windows 7, Windows Server 2008 R2 or Windows Server 2008).
Windows Admin Center is a management portal for Windows Servers that are not deployed in Azure, offering them several Azure management capabilities such as backup and system updates. We have recently added an ability to onboard these non-Azure servers to be protected by ASC directly from the Windows Admin Center experience.
Target availability: Q1 2020
The features, operation and UI for Azure Security Center’s just-in-time tools that secure your management ports have been enhanced.
Azure Security Center for IoT now extends support for Azure real-time operating system (RTOS) in addition to Linux (Ubuntu, Debian) and Windows 10 IoT core operating systems.
Azure Security Center is extending fileless attack detection for Linux, in addition to Windows.
An enhanced version of the Secure Score feature of Azure Security Center is now available in preview.
Customer Lockbox provides customers with the capability to control Azure support engineers’ access to workloads that contain customer data. This expanded support now provides customers control over access to their data for a larger set of Azure offerings.
Azure Disk Encryption enables you to encrypt your Azure Virtual Machine disks with your keys safeguarded in Azure Key Vault.
With the Microsoft Security Code Analysis extension, you can infuse security analysis tools including Credential Scanner, BinSkim and others into your Azure DevOps continuous integration and delivery (CI/CD) pipelines.
Azure Key Vault is an essential service for protecting data and improving performance of cloud applications by offering the ability to centrally manage keys, secrets, cryptographic keys and policies in the cloud.
You can now view detected malware across storage accounts using Azure Security Center.
Today we are introducing a new capability in Security Center that allows customers to create automation configurations leveraging Azure Logic Apps and to create policies that will automatically trigger them based on specific ASC findings such as Recommendations or Alerts.
With the many tasks that a user is given as part of Secure Score, the ability to effectively remediate issues across a large fleet can become challenging. In order to simplify remediation of security misconfigurations and to be able to quickly remediate recommendations on a bulk of resources and improve your secure score, you can use Quick Fix.
The Regulatory Compliance dashboard provides insights into your compliance posture based on Security Center assessments. The dashboard shows how your environment complies with controls and requirements designated by specific regulatory standards and industry benchmarks, and provides prescriptive recommendations for how to address these requirements.
Azure Security Center can now scan container images in Azure Container Registry for vulnerabilities. The image scanning works by parsing the container image file, then checking to see whether there are any known vulnerabilities (powered by Qualys).
Azure at Build
Read the Azure blog for the latest news.Blog
Tell us what you think of Azure and what you want to see in the future.Provide feedback
Azure is available in more regions than any other cloud provider.Check product availability in your region