Blog Post

Microsoft Defender for Cloud Blog
5 MIN READ

Breaking down security silos: Microsoft Defender for Cloud Expands into the Defender Portal

DianaGrigore's avatar
DianaGrigore
Icon for Microsoft rankMicrosoft
Dec 11, 2025

Picture this: You’re managing security across Azure, AWS, and GCP. Alerts are coming from every direction, dashboards are scattered and your team spends more time switching portals than mitigating threats. Sound familiar? That’s the reality for many organizations today.

Now imagine a different world—where visibility, control and response converge into one unified experience, where posture management, vulnerability insights and incident response live side by side. That world is no longer a dream: Microsoft Defender for Cloud (MDC) is now integrated into Defender XDR in public preview.

 

The expansion of MDC into the Defender portal isn’t just a facelift. It’s a strategic leap forward toward a Cloud-Native Application Protection Platform (CNAPP) that scales with your business. With Microsoft Defender for Cloud’s deep integration into the unified portal, we eliminate security silos and bring a modern, streamlined experience that is more intuitive and purpose-built for today’s security teams, while delivering a single pane of glass for hybrid and multi-cloud security.

 

Defender for Cloud Overview dashboard

Here’s what makes this release a game-changer:

  • Unified dashboard
    See everything with a single pane of glass—security posture, coverage, trends—across Azure, AWS and GCP. No more blind spots.
  • Risk-based recommendations
    Prioritize by exploitability and business impact. Focus on what matters most, not just noise.
  • Attack path analysis across all Defenders
    Visualize potential breach paths and cut them off before attackers can exploit them.
  • Unified cloud assets inventory
    A consolidated view of assets, health data and onboarding state—so you know exactly where you stand.
  • Cloud scopes & unified RBAC
    Create boundaries between teams, ensure each persona has access to the right level of data in the Defender portal.

The enhanced in-portal experience includes all familiar Defender for Cloud capabilities and adds powerful new cloud-native workflows — now accessible directly within the Defender portal. Over time, additional features will be rolled out so that security teams can rely on a single pane of glass for all their pre- and post-breach operations.

Unified cloud security dashboard

A brand-new “Cloud Security→ Overview” page in Defender portal gives you a central place to assess your cloud posture across all connected clouds and environments (Azure, AWS, GCP, on-prem and onboarded environments such as Azure DevOps, Github, Gitlab, DockerHub, Jfrog).

The unified dashboard displays the new Cloud Security Score, Threat Detection alerts and Defender coverage statistics. Amongst the high-level metrics, you can find the number of assessed resources, count of active recommendations, security alerts and more, giving you at-a-glance insight into your environment’s health.

From here, you can drill into individual areas: Security posture, Exposure Management bringing visibility over Recommendations and Vulnerability Management, a unified asset inventory, workload specific insights and historical security posture data going back up to 6 months.

 

Cloud Security Overview page

Cloud Assets Inventory

The cloud asset inventory view provides a unified, contextual inventory of all resources you have connected to Defender for Cloud — across cloud environments or on-premises.

Assets are categorized by workload type, criticality, Defender coverage status, with integrated health data, risk signals, associated exposure management data, recommendations and related attack paths. Resources with unresolved security recommendations or alerts are clearly flagged — helping you quickly prioritize on risky or non-compliant assets.

While you will get a complete list of cloud assets under "All assets", the rest of the tabs show you the complete view into each workload, with detailed and specific insights on each workload (VMs, Data, Containers, AI, API, DevOps, Identity and Serverless).

 

Cloud Assets Overview page

Posture & Risk Management: From Secure Score to risk-based recommendations

The traditional posture-management and CSPM capabilities of Defender for Cloud expand into the Defender portal under “Exposure Management.”

A key upgrade is the new Cloud Secure Score — a risk-based model that factors in asset criticality and risk factors (e.g. internet exposure, data sensitivity) to give a more accurate, prioritized view of cloud security posture. The score ranges from 0 to 100, where 100 means perfect posture. It aggregates across all assets, weighting each asset by its criticality and the risk of its open recommendations.

You can view the Cloud Secure Score overall, by subscription, cloud environment or workload type. This allows security teams to quickly understand which parts of their estate require urgent attention, and track posture improvements over time.

 

Cloud Initiative Overview

Defender for Cloud continues to generate security recommendations based on assessments against built-in (or custom) security standards.

When you have the Defender CSPM plan enabled in the Defender portal, these recommendations are surfaced with risk-based prioritization, where recommendations are tied to high-risk or critical assets show up first — helping you remediate what matters most.

 

Cloud Recommendations Overview

Each recommendation shows risk level, number of attack paths, MITRE ATT&CK tactics and techniques. For each recommendation you will see the remediation steps, attack map and the initiatives it contributes to - such as the Cloud Secure score. Continued remediation — across all subscriptions and environments — is the path toward a hardened cloud estate.

 

Example of a cloud recommendation contributing to the Secure Score

Proactive Attack Surface Management: Attack path analysis

A powerful addition is the "Attack paths" overview, which helps you visualize potential paths attackers could use — from external exposure zones to your most critical business assets to infiltrate your environment and access sensitive data.

Defender’s algorithm models your network, resource interactions, vulnerabilities and external exposures to surface realistic, exploitable attack paths, rather than generic threat scenarios, while putting focus on the top targets, entry points and choke points involved in attack paths. The Attack Paths page organizes findings by risk level and correlates data across all Defender solutions, allowing users to rapidly detect high-impact attack paths and focus remediation on the most vulnerable assets.

For some workloads, for example container-based or runtime workloads, additional prerequisites may apply (e.g. enabling agentless scanning or relevant Defender plans) to get full visualization.

Attack paths Overview

Governance, Visibility and Access: Cloud Scopes and Unified RBAC

The expansion into the Defender portal doesn’t just bring new dashboards — it also brings unified access and governance using a single identity and RBAC model for the Defender solutions. Now you can manage cloud security permissions alongside identity, device and app permissions.

Applying the scope for GCP environments only

Cloud Scopes ensure that teams with appropriate roles within the defined permission groups (e.g. Security operations, Security posture) can access the assets and features they need, scoped to specific subscriptions and environments. This unified scope system simplifies operations, reduces privilege sprawl and enforces consistent governance across cloud environments and across security domains.

Creating a cloud scope for specific environments

The expansion of Defender for Cloud into the Defender portal is more than a consolidation—it’s a strategic shift toward a truly integrated security ecosystem. Cloud security is no longer an isolated discipline. It is intertwined with exposure management, threat detection, identity protection and organizational governance.

To conclude, this new experience empowers security teams to:

  • Understand cloud risk in full context
  • Prioritize remediation that reduces real-world threats
  • Investigate attacks holistically across cloud and non-cloud systems
  • Govern access and configurations with greater consistency
  • Predict and prevent attack paths before they happen

In this new era, cloud security becomes a continuous, intelligent and unified journey. The Defender portal is now the command center for that journey—one where insights, context and action converge to help organizations secure the present while anticipating the future.

Ready to Explore?
Updated Dec 11, 2025
Version 1.0
No CommentsBe the first to comment