Azure Security product name changes – Microsoft Ignite November 2021

Published Nov 25 2021 12:25 AM 3,963 Views
Microsoft

Do you remember that on release in Feb 2010, Azure was known as Windows Azure? It took four years before it was renamed to Microsoft Azure, to more accurately reflect that it wasn’t just for Windows workloads. This November, some Azure security products also got a name upgrade!

 

Instead of What’s the difference between Azure Security Center, Azure Defender and Azure Sentinel, I’d now need to re-write it as What’s the difference between Microsoft Defender for Cloud, Microsoft Defender for Cloud and Azure Sentinel! We also have Azure Defender for IoT now known as Microsoft Defender for IoT, and Microsoft Cloud App Security is Microsoft Defender for Cloud Apps.

Azure to Microsoft security product name changesAzure to Microsoft security product name changes

The Azure – Microsoft evolution

Given the Windows Azure to Microsoft Azure evolution above, it makes sense to align these Azure-based security products with the Microsoft brand more than the cloud platform they run from. This is because of our ongoing investment in hybrid environments and providing capabilities in these tools (sometimes via Azure Arc) to manage the security posture of and signals from non-Azure workloads. Why would you look at an Azure security product if you thought it just protected stuff in Azure, when you might also have on-premises infrastructure or things in other people’s clouds?

 

Start with Microsoft Defender for Cloud

Microsoft Defender for Cloud (formerly known as Azure Security Center) is your tool for overall security posture management and threat protection. It’s going to give you recommendations on how to improve the secureness (or “hardening”) of your workloads running in Azure (e.g. PaaS services, networks and data in Azure SQL) and visibility into other cloud environments (like AWS-specific security recommendations).

 

Microsoft Defender for ...

Next, add advanced features for specific workload types, like Microsoft Defender for Servers (formerly under the Azure Defender name).

Whether those servers are in Azure or elsewhere, this license them for Microsoft Defender for Endpoint and picks up those alerts. It also includes features like operating system level assessments, adaptive application controls, file integrity monitoring and more.
Microsoft Defender also offers advanced workload protection for App Service, Storage, SQL, Kubernetes, container registries, Key Vault, Resource Manager, DNS and open-source relational databases.

 

Microsoft Defender for Endpoint

While this didn’t have a name change this year (it’s been formerly known as Windows Defender Advanced Threat Protection and Microsoft Defender ATP), it’s worth mentioning as it's also a component of Microsoft Defender for Servers. Microsoft Defender for Endpoint collects a vast array of behavioural signals from your server, surfaces vulnerability assessments and uses advanced analytics and big data to adapt to changing threats. It also uses our Intelligent Security Graph with signals from across Windows, Azure and Office, as well as data generated by Microsoft threat hunters, security teams and partners, to generate alerts when it identifies attacker tools, techniques and patterns. This is light-years ahead of legacy anti-virus software only comparing threats to their virus definition files.

 

Microsoft Defender for IoT?

While technically not a Microsoft Defender for Cloud workload protection product, Microsoft Defender for IoT provides an agentless solution for discovery of IoT devices, identification of risks and vulnerabilities (such as open ports, unpatched devices and unauthorized applications, and detection of IoT anomalies and advanced threats. It integrates into Microsoft Sentinel and other third-party security tools. Learn more about how Microsoft Defender for IoT can secure your IoT devices.

 

Expand the picture with Microsoft Sentinel

Next, consider the security information event management (SIEM) and security orchestration automate response (SOAR) capabilities of Microsoft Sentinel. It takes events from Microsoft Defender for Cloud (and by default it’s workload protection products too), and lets you add other data sources about users, devices, applications, and infrastructure, whether on-premises or in other clouds. This can range from Microsoft 365 sources to non-Microsoft products that use Syslog, Common Event Format, or REST APIs. Now you’re really seeing the bigger picture across your environment, where you can investigate threats with artificial intelligence, hunt for suspicious activities and respond to incidents rapidly with built-in orchestration and automation of common tasks.

 

Microsoft cloud security productsMicrosoft cloud security products

Discovering what you didn’t know you had with Microsoft Defender for Cloud App Security

Finally, Microsoft Defender for Cloud Apps (formerly known as Microsoft Cloud App Security) helps you discover what cloud apps people in your organization are using, that you didn’t know were being used (a term called “shadow IT”). Humans are like water, they will find the path of least resistance. If they think it’s too hard or too restrictive to use only the apps you’ve provided for them, they’ll spin up something else with a few clicks and a credit card. Microsoft Defender for Cloud App Security will analyse your network to see exactly which cloud applications are in use and the risk factor of those apps (are they well-known, do they have good security controls etc). You’ll get information about their usage and whether those apps are compliant with regulations like HIPAA or GDPR and you’ll see if those apps could be used with Azure Active Directory for single sign-on. Finally, the app discovery policies can monitor app usage and alert you to things like spikes in uploads or downloads.

 

Summary

Hopefully this gives you a picture of some of the Microsoft security products and how they fit together, though we haven’t covered things like Azure Purview (for data governance), Microsoft 365 Defender or Azure AD Identity Protection – to name a few! End-to-end security is a big topic, but now you know if a talk, slide deck or website references Azure security something, it might now be called Microsoft security something!

 

Read the official announcement from Vasu Jakkal, Corporate Vice President, Security, Compliance and ...

 

View the Microsoft Defender for Cloud Apps Ninja Training resources

 

 

 

 

 

 

%3CLINGO-SUB%20id%3D%22lingo-sub-3004418%22%20slang%3D%22en-US%22%3EAzure%20Security%20product%20name%20changes%20%E2%80%93%20Microsoft%20Ignite%20November%202021%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3004418%22%20slang%3D%22en-US%22%3E%3CP%3EDo%20you%20remember%20that%20on%20release%20in%20Feb%202010%2C%20Azure%20was%20known%20as%20Windows%20Azure%3F%20It%20took%20four%20years%20before%20it%20was%20renamed%20to%20Microsoft%20Azure%2C%20to%20more%20accurately%20reflect%20that%20it%20wasn%E2%80%99t%20just%20for%20Windows%20workloads.%20This%20November%2C%20some%20Azure%20security%20products%20also%20got%20a%20name%20upgrade!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EInstead%20of%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fitops-talk-blog%2Fwhat-s-the-difference-between-azure-security-center-azure%2Fba-p%2F2155188%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%3EWhat%E2%80%99s%20the%20difference%20between%20Azure%20Security%20Center%2C%20Azure%20Defender%20and%20Azure%20Sentinel%2C%3C%2FA%3E%26nbsp%3BI%E2%80%99d%20now%20need%20to%20re-write%20it%20as%20%3CEM%3EWhat%E2%80%99s%20the%20difference%20between%20Microsoft%20Defender%20for%20Cloud%2C%20Microsoft%20Defender%20for%20Cloud%20and%20Azure%20Sentinel%3C%2FEM%3E!%26nbsp%3BWe%20also%20have%20Azure%20Defender%20for%20IoT%20now%20known%20as%20Microsoft%20Defender%20for%20IoT%2C%20and%20Microsoft%20Cloud%20App%20Security%20is%20Microsoft%20Defender%20for%20Cloud%20Apps.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Azure%20to%20Microsoft%20security%20product%20name%20changes%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F329376i16B0EDDAE0065268%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Product%20Name%20Changes-simple%20text.jpg%22%20alt%3D%22Azure%20to%20Microsoft%20security%20product%20name%20changes%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EAzure%20to%20Microsoft%20security%20product%20name%20changes%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-330034874%22%20id%3D%22toc-hId-330035060%22%3EThe%20Azure%20%E2%80%93%20Microsoft%20evolution%3C%2FH2%3E%0A%3CP%3EGiven%20the%20Windows%20Azure%20to%20Microsoft%20Azure%20evolution%20above%2C%20it%20makes%20sense%20to%20align%20these%20Azure-based%20security%20products%20with%20the%20Microsoft%20brand%20more%20than%20the%20cloud%20platform%20they%20run%20from.%20This%20is%20because%20of%20our%20ongoing%20investment%20in%20hybrid%20environments%20and%20providing%20capabilities%20in%20these%20tools%20(sometimes%20via%20Azure%20Arc)%20to%20manage%20the%20security%20posture%20of%20and%20signals%20from%20non-Azure%20workloads.%20Why%20would%20you%20look%20at%20an%20Azure%20security%20product%20if%20you%20thought%20it%20just%20protected%20stuff%20in%20Azure%2C%20when%20you%20might%20also%20have%20on-premises%20infrastructure%20or%20things%20in%20other%20people%E2%80%99s%20clouds%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1477419589%22%20id%3D%22toc-hId--1477419403%22%3EStart%20with%20Microsoft%20Defender%20for%20Cloud%3C%2FH2%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fdefender-for-cloud%2Fdefender-for-cloud-introduction%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20Cloud%3C%2FA%3E%20(formerly%20known%20as%20Azure%20Security%20Center)%20is%20your%20tool%20for%20overall%20security%20posture%20management%20and%20threat%20protection.%20It%E2%80%99s%20going%20to%20give%20you%20recommendations%20on%20how%20to%20improve%20the%20secureness%20(or%20%E2%80%9Chardening%E2%80%9D)%20of%20your%20workloads%20running%20in%20Azure%20(e.g.%20PaaS%20services%2C%20networks%20and%20data%20in%20Azure%20SQL)%20and%20visibility%20into%20other%20cloud%20environments%20(like%20AWS-specific%20security%20recommendations).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1010093244%22%20id%3D%22toc-hId-1010093430%22%3EMicrosoft%20Defender%20for%20...%3C%2FH2%3E%0A%3CP%3ENext%2C%20add%20advanced%20features%20for%20specific%20workload%20types%2C%20like%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fdefender-for-cloud%2Fdefender-for-servers-introduction%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%20Microsoft%20Defender%20for%20Servers%3C%2FA%3E%20(formerly%20under%20the%20Azure%20Defender%20name).%3C%2FP%3E%0A%3CP%3EWhether%20those%20servers%20are%20in%20Azure%20or%20elsewhere%2C%20this%20license%20them%20for%20Microsoft%20Defender%20for%20Endpoint%20and%20picks%20up%20those%20alerts.%20It%20also%20includes%20features%20like%20operating%20system%20level%20assessments%2C%20adaptive%20application%20controls%2C%20file%20integrity%20monitoring%20and%20more.%3CBR%20%2F%3EMicrosoft%20Defender%20also%20offers%20advanced%20workload%20protection%20for%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fdefender-for-cloud%2Fdefender-for-app-service-introduction%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EApp%20Service%3C%2FA%3E%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fdefender-for-cloud%2Fdefender-for-storage-introduction%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EStorage%3C%2FA%3E%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fdefender-for-cloud%2Fdefender-for-sql-introduction%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESQL%3C%2FA%3E%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fdefender-for-cloud%2Fdefender-for-kubernetes-introduction%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EKubernetes%3C%2FA%3E%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fdefender-for-cloud%2Fdefender-for-container-registries-introduction%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Econtainer%20registries%3C%2FA%3E%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fdefender-for-cloud%2Fdefender-for-key-vault-introduction%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EKey%20Vault%3C%2FA%3E%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fdefender-for-cloud%2Fdefender-for-resource-manager-introduction%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EResource%20Manager%3C%2FA%3E%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fdefender-for-cloud%2Fdefender-for-dns-introduction%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EDNS%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fdefender-for-cloud%2Fdefender-for-databases-introduction%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Eopen-source%20relational%20databases%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--797361219%22%20id%3D%22toc-hId--797361033%22%3EMicrosoft%20Defender%20for%20Endpoint%3C%2FH2%3E%0A%3CP%3EWhile%20this%20didn%E2%80%99t%20have%20a%20name%20change%20this%20year%20(it%E2%80%99s%20been%20formerly%20known%20as%20Windows%20Defender%20Advanced%20Threat%20Protection%20and%20Microsoft%20Defender%20ATP)%2C%20it%E2%80%99s%20worth%20mentioning%20as%20it's%20also%20a%20component%20of%20Microsoft%20Defender%20for%20Servers.%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fmicrosoft-365%2Fsecurity%2Fdefender-endpoint%2Fmicrosoft-defender-endpoint%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20Endpoint%3C%2FA%3E%20collects%20a%20vast%20array%20of%20behavioural%20signals%20from%20your%20server%2C%20surfaces%20vulnerability%20assessments%20and%20uses%20advanced%20analytics%20and%20big%20data%20to%20adapt%20to%20changing%20threats.%20It%20also%20uses%20our%20Intelligent%20Security%20Graph%20with%20signals%20from%20across%20Windows%2C%20Azure%20and%20Office%2C%20as%20well%20as%20data%20generated%20by%20Microsoft%20threat%20hunters%2C%20security%20teams%20and%20partners%2C%20to%20generate%20alerts%20when%20it%20identifies%20attacker%20tools%2C%20techniques%20and%20patterns.%20This%20is%20light-years%20ahead%20of%20legacy%20anti-virus%20software%20only%20comparing%20threats%20to%20their%20virus%20definition%20files.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1690151614%22%20id%3D%22toc-hId-1690151800%22%3EMicrosoft%20Defender%20for%20IoT%3F%3C%2FH2%3E%0A%3CP%3EWhile%20technically%20not%20a%20Microsoft%20Defender%20for%20Cloud%20workload%20protection%20product%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fdefender-for-iot%2Forganizations%2Foverview%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20IoT%3C%2FA%3E%20provides%20an%20agentless%20solution%20for%20discovery%20of%20IoT%20devices%2C%20identification%20of%20risks%20and%20vulnerabilities%20(such%20as%20open%20ports%2C%20unpatched%20devices%20and%20unauthorized%20applications%2C%20and%20detection%20of%20IoT%20anomalies%20and%20advanced%20threats.%20It%20integrates%20into%20Microsoft%20Sentinel%20and%20other%20third-party%20security%20tools.%20Learn%20more%20about%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2021%2F11%2F02%2Fhow-microsoft-defender-for-iot-can-secure-your-iot-devices%2F%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehow%20Microsoft%20Defender%20for%20IoT%20can%20secure%20your%20IoT%20devices.%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--117302849%22%20id%3D%22toc-hId--117302663%22%3EExpand%20the%20picture%20with%20Microsoft%20Sentinel%3C%2FH2%3E%0A%3CP%3ENext%2C%20consider%20the%20security%20information%20event%20management%20(SIEM)%20and%20security%20orchestration%20automate%20response%20(SOAR)%20capabilities%20of%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsentinel%2Foverview%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Sentinel%3C%2FA%3E.%20It%20takes%20events%20from%20Microsoft%20Defender%20for%20Cloud%20(and%20by%20default%20it%E2%80%99s%20workload%20protection%20products%20too)%2C%20and%20lets%20you%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsentinel%2Fconnect-data-sourceshttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsentinel%2Foverview%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Eadd%20other%20data%20sources%3C%2FA%3E%20about%20users%2C%20devices%2C%20applications%2C%20and%20infrastructure%2C%20whether%20on-premises%20or%20in%20other%20clouds.%20This%20can%20range%20from%20Microsoft%20365%20sources%20to%20non-Microsoft%20products%20that%20use%20Syslog%2C%20Common%20Event%20Format%2C%20or%20REST%20APIs.%20Now%20you%E2%80%99re%20really%20seeing%20the%20bigger%20picture%20across%20your%20environment%2C%20where%20you%20can%20investigate%20threats%20with%20artificial%20intelligence%2C%20hunt%20for%20suspicious%20activities%20and%20respond%20to%20incidents%20rapidly%20with%20built-in%20orchestration%20and%20automation%20of%20common%20tasks.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Microsoft%20cloud%20security%20products%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F329379iD7EE1236F25DECED%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Microsoft%20Defender_Sentinel.jpg%22%20alt%3D%22Microsoft%20cloud%20security%20products%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EMicrosoft%20cloud%20security%20products%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1924757312%22%20id%3D%22toc-hId--1924757126%22%3EDiscovering%20what%20you%20didn%E2%80%99t%20know%20you%20had%20with%20Microsoft%20Defender%20for%20Cloud%20App%20Security%3C%2FH2%3E%0A%3CP%3EFinally%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Fmanage-apps%2Fcloud-app-security%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20Cloud%20Apps%3C%2FA%3E%26nbsp%3B(formerly%20known%20as%20Microsoft%20Cloud%20App%20Security)%20helps%20you%20discover%20what%20cloud%20apps%20people%20in%20your%20organization%20are%20using%2C%20that%20you%20didn%E2%80%99t%20know%20were%20being%20used%20(a%20term%20called%20%E2%80%9Cshadow%20IT%E2%80%9D).%20Humans%20are%20like%20water%2C%20they%20will%20find%20the%20path%20of%20least%20resistance.%20If%20they%20think%20it%E2%80%99s%20too%20hard%20or%20too%20restrictive%20to%20use%20only%20the%20apps%20you%E2%80%99ve%20provided%20for%20them%2C%20they%E2%80%99ll%20spin%20up%20something%20else%20with%20a%20few%20clicks%20and%20a%20credit%20card.%20Microsoft%20Defender%20for%20Cloud%20App%20Security%20will%20analyse%20your%20network%20to%20see%20exactly%20which%20cloud%20applications%20are%20in%20use%20and%20the%20risk%20factor%20of%20those%20apps%20(are%20they%20well-known%2C%20do%20they%20have%20good%20security%20controls%20etc).%20You%E2%80%99ll%20get%20information%20about%20their%20usage%20and%20whether%20those%20apps%20are%20compliant%20with%20regulations%20like%20HIPAA%20or%20GDPR%20and%20you%E2%80%99ll%20see%20if%20those%20apps%20could%20be%20used%20with%20Azure%20Active%20Directory%20for%20single%20sign-on.%20Finally%2C%20the%20app%20discovery%20policies%20can%20monitor%20app%20usage%20and%20alert%20you%20to%20things%20like%20spikes%20in%20uploads%20or%20downloads.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-562755521%22%20id%3D%22toc-hId-562755707%22%3ESummary%3C%2FH2%3E%0A%3CP%3EHopefully%20this%20gives%20you%20a%20picture%20of%20some%20of%20the%20Microsoft%20security%20products%20and%20how%20they%20fit%20together%2C%20though%20we%20haven%E2%80%99t%20covered%20things%20like%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fservices%2Fpurview%2F%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Purview%3C%2FA%3E%20(for%20data%20governance)%2C%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fbusiness%2Fthreat-protection%2Fmicrosoft-365-defender%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20365%20Defender%3C%2FA%3E%20or%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fbusiness%2Fidentity-access-management%2Fidentity-protection%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20AD%20Identity%20Protection%3C%2FA%3E%20%E2%80%93%20to%20name%20a%20few!%20End-to-end%20security%20is%20a%20big%20topic%2C%20but%20now%20you%20know%20if%20a%20talk%2C%20slide%20deck%20or%20website%20references%20Azure%20security%20something%2C%20it%20might%20now%20be%20called%20Microsoft%20security%20something!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2021%2F11%2F02%2Fprotect-your-business-with-microsoft-securitys-comprehensive-protection%2F%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ERead%20the%20official%20announcement%20from%20Vasu%20Jakkal%2C%20Corporate%20Vice%20President%2C%20Security%2C%20Compliance%20and%20Identity%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fmicrosoft-defender-for-cloud-apps-ninja-training-september-2021%2Fba-p%2F2751518%3FWT.mc_id%3Dmodinfra-48365-socuff%22%20target%3D%22_blank%22%3EView%20the%20Microsoft%20Defender%20for%20Cloud%20Apps%20Ninja%20Training%20resources%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-3004418%22%20slang%3D%22en-US%22%3E%3CP%3EA%20bunch%20of%20Azure%20security%20products%20were%20renamed%20in%20an%20announcement%20at%20Microsoft%20Ignite%20in%20November%202021.%20Learn%20why%20and%20how%20the%20products%20map%20with%20their%20old%20names%20and%20with%20each%20other.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Microsoft%20Defender_Sentinel.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F329375i6678F5074056747E%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Microsoft%20Defender_Sentinel.jpg%22%20alt%3D%22Microsoft%20Defender_Sentinel.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-3004418%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESonia%20Cuff%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Co-Authors
Version history
Last update:
‎Nov 28 2021 05:57 PM
Updated by: