Blog Post

Microsoft Defender for Cloud Blog
3 MIN READ

Microsoft Defender for Cloud Customer Newsletter

alsteele's avatar
alsteele
Icon for Microsoft rankMicrosoft
Apr 02, 2025

April edition

What’s new in Defender for Cloud?

We're enhancing the severity levels of recommendations to improve risk assessment and prioritization. As part of this update, we reevaluated all severity classifications and introduced a new level — Critical. See this page for more info.  

General Availability of File Integrity Monitoring (FIM) based on Microsoft Defender for Endpoint in Azure Government

File Integrity Monitoring based on Microsoft Defender for Endpoint is now GA in Azure Government (GCCH) as part of Defender for Servers Plan 2.

For more details, please refer to our documentation

Blog(s) of the month

In March, our team published the following blog posts we would like to share:

  1. Integrating Security into DevOps Workflows with Microsoft Defender CSPM
  2. New innovations to protect custom AI applications with Defender for Cloud
  3. All Key Vaults Are Critical, But Some Are More Critical Than Others: Finding the Crown Jewels

GitHub Community

Learn more about code reachability in Defender for Cloud: Module 26 - Defender for Cloud Code Reachability Vulnerabilities with Endor Labs

Visit our GitHub page

 

Defender for Cloud in the field

Watch the latest Defender for Cloud in the Field YouTube episode here:

  1. Unveiling Kubernetes lateral movement in Defender for Cloud
  2. Manage cloud security posture with Microsoft Defender for Cloud

Visit our new YouTube page

Customer journey

Discover how other organizations successfully use Microsoft Defender for Cloud to protect their cloud workloads. This month we are featuring Danfuss. Danfoss’s growth contrasted with inefficient manual, on-premises security solutions. It wanted a scalable security solution to defend its global data and SAP landscape while lifting security team effectiveness. 

Danfoss adopted Microsoft Sentinel and the Microsoft Sentinel solution for SAP applications. It ingests logs from 20 applications and thousands of devices with the connectors including Defender for Cloud.

Show me more stories

 

Security community webinars

Join our experts in the upcoming webinars to learn what we are doing to secure your workloads running in Azure and other clouds. Check out our upcoming webinars this month!

April 15 Microsoft Defender for Cloud |  Securing Custom Built AI Applications with Microsoft Defender for Cloud

April 30 Microsoft Defender for Cloud |  Securing Custom Built AI Applications with Microsoft Defender for Cloud

 

We offer several customer connection programs within our private communities. By signing up, you can help us shape our products through activities such as reviewing product roadmaps, participating in co-design, previewing features, and staying up-to-date with announcements. Sign up at aka.ms/JoinCCP.

We greatly value your input on the types of content that enhance your understanding of our security products. Your insights are crucial in guiding the development of our future public content. We aim to deliver material that not only educates but also resonates with your daily security challenges. Whether it’s through in-depth live webinars, real-world case studies, comprehensive best practice guides through blogs, or the latest product updates, we want to ensure our content meets your needs. Please submit your feedback on which of these formats do you find most beneficial and are there any specific topics you’re interested in https://aka.ms/PublicContentFeedback.

Note: If you want to stay current with Defender for Cloud and receive updates in your inbox, please consider subscribing to our monthly newsletter: https://aka.ms/MDCNewsSubscribe
Updated Apr 03, 2025
Version 2.0
No CommentsBe the first to comment