What's the difference between Azure Security Center, Azure Defender and Azure Sentinel?

Published Feb 22 2021 02:22 AM 57.6K Views
Microsoft

It's common to have a pre-defined perspective when you hear the word "security". Some people think of applications being configured correctly or insecure coding practices. Some people think of identity concepts like password spray attacks, phishing or multi factor authentication. And some people think of infrastructure concepts like networking, VPNs and port scanning. Security is all of these - and more.

 

Microsoft helps you manage a layered approach to security with tools that integrate with your Azure and non-Azure workloads. Three common capabilities that are used in unison are Azure Security Center, Azure Defender and Azure Sentinel. So what's the difference between them and when would you use each product?

 

Azure Security Products.PNG

Azure Security Center - Security Posture Management

This is your "base layer" for monitoring the security configuration and health of your workloads. Azure Security Center collects events from Azure or log analytics agents and correlates them in a security analytics engine, to provide you with tailored recommendations (hardening tasks). Strengthening your security posture can be achieved by implementing these recommendations. 

 

The Azure Security Center uses a built-in Azure Policy initiative in audit-only mode (the Azure Security Benchmark) as well as Azure Monitor logs and other Azure security solutions like Microsoft Cloud App Security. 

The free pricing tier of the Azure Security Center is enabled by default on all Azure subscriptions, once you visit the Azure Security Center in the portal for the first time (or activate it via the API). 
Then it will automatically discover and onboard Azure resources, including PaaS services in Azure (Service Fabric,  SQL Database etc). And you can include non-Azure resources via the Log Analytics agent and Azure Arc.

 

Azure Security Center also includes a network map - an interactive graphical view of the network topology of your Azure workloads and the traffic routes. By default, the topology map displays resources that have network recommendations with high or medium severity. To learn more, visit Protect your network resources. 

Azure Security Center network mapAzure Security Center network map

 

But one of the most important features is the pro-active security recommendations  for Azure Compute, data, identity and access and networking resources. Implementing these will improve your Secure Score - a visual indication of the improvement of your overall security posture. Learn more about the security recommendations.

Azure Security Center secure scoreAzure Security Center secure score

To get started, visit the Azure Security Center Planning and operations guide

 

Azure Defender - Advanced Workload Protection

To add additional security alerts and advanced threat detection, certain types of resources can also be monitored by Azure Defender. The Azure Defender pane inside the Azure Security Center shows you which workloads are protected by Azure Defender or not. This is a paid service and turning on Azure Defender for servers (for example) applies to all servers in that Azure subscription, when they are running.

 

The Azure Defender dashbaordThe Azure Defender dashbaord

 

Azure Defender is available for servers, app service, Storage, SQL, Key Vault, Resource Manager, DNS, Kubernetes and container registries. It can also apply to non-Azure servers on-premises and in other clouds, via Azure Arc.

 

Lets look at some of the features you'd get for your Windows Server (as an example) by adding Azure Defender for servers:

Security alerts: Appearing in Azure Security Center, security alerts detail the suspicious process executed, start time and MITRE ATT&CK tactic  - for Windows, Linux, Azure App Service, Containers (AKS), Containers (host level), SQL Database, Azure Synapse Analytics, Azure Resource Manager, DNS, Azure Storage, Cosmos DB (preview), Azure network layer, Azure key vault and Azure DDoS Protection. For more information, see Security alerts - a reference guide. 

 

Vulnerability assessment - Your VM is scanned for artefacts which are analysed by Qualys' cloud service and the results sent back to Azure Security Center. These results show if any vulnerabilities have been identified in the software running on your VM (including its operating system), highlighting the highest priorities and including the latest available patches. The cost of this service is included in your Azure Defender pricing. For more details, visit Azure Defender's integrated vulnerability assessment solution for Azure and hybrid machines. 

 

Just in time access - JIT VM access enables you to lock down standard inbound management ports (such as port 3389) and easily open them when requested by an appropriate user, to their connection only (or IP range), for a limited period of time. Then the ports are automatically locked down again. This includes an approval process and no manual configuration of Network Security Groups or Azure Firewall. For more information, visit Understanding just-in-time (JIT) VM access. 

 

Adaptive application controls - This feature provides an intelligent and automated allow list of known-safe applications for your VM. Machine learning analysis your workload to detect what is common or known in your organisation (which you can further customize) and you'll get security alerts if any other applications are run that are not on the allow list. Learn more at Use adaptive controls to reduce your machines' attack surface. 

 

Azure Defender for servers also includes file integrity monitoring, adaptive network hardening and Docker host hardening. For more information on these capabilities and the other Azure Defender workload types and features, visit Introduction to Azure Defender. 

 

So far so good! Our VM is being monitored by Azure Security Center protecting all the VMs in our subscription, and we've added Azure Defender for servers for vulnerability scanning, adaptive application and network control and just in time access to management ports. What about Azure Sentinel?

 

Azure Sentinel - Security Information Event Management + Security Orchestration Automated Response

Azure Sentinel helps you to bring in the big picture of what's happening across your environment and connect the dots that might be related to the same security incident. While I've mentioned Azure and on-premises workloads so far, there's often more to your IT footprint than that - Microsoft 365, Azure Active Directory, Amazon Web Services - CloudTrail, Citrix Analytics, VMWare Carbon Black Cloud Endpoint, and third party firewalls and proxies, just to name a few examples. For a full list of supported data sources visit Connect data sources.

 Azure Sentinel core capabilitiesAzure Sentinel core capabilities

 

With all of those different data sources connected, Azure Sentinel uses AI and Microsoft's threat intelligence stream to detect threats across your environment, correlate alerts into incidents, use deep investigation tools to find the scope and root cause and access powerful hunting search and query tools. Now you're no longer having to search through logs separately in different systems, trying to decide what may be relevant and what is just noise, while trying to compare time stamps to link to the same possible event.

Investigating a security threatInvestigating a security threat

In addition, Azure Sentinel supports playbooks with Azure Logic Apps - build your own automated workflows to open tickets, send notifications or trigger actions when particular events are detected.

 

Summary

In human terms - Azure Security Center is me living a generally healthy life and watching for signs that I'm run-down. Azure Defender is my gym membership or vitamins that help improve or boost my health, and Azure Sentinel is the regular and specialists tests and treatments from my doctor, that alert me to specific signs that need investigating across my whole body, including my blood tests.

 

Now you can choose which workloads need the added protection of Azure Defender and which workloads should be included for visibility in Azure Sentinel, for comprehensive security management across your entire IT environment.

 

Sarah Young recently joined us to explain how Azure Security Center and Azure Sentinel can protect hybrid (on-prem + cloud) environments. Check out her sessions:

OPS101: Security your Hybrid environment Part 1 - Azure Security Center

OPS103: Security your Hybrid environment Part 2 - Azure Sentinel

 

 

 

 

 

15 Comments
Occasional Visitor

Awesome post ! 

Regular Visitor
Thank you for the post Sonia
Occasional Visitor

Excellent and clear explanation post before this article I was bit confused to grasp the Azure security center, defended and sentinel.

Microsoft

Excellent article Sonia!

Occasional Contributor

Great article, thanks.

The Azure Security Benchmark) is broken, please check.

Microsoft

I'm finally having a clear picture about the three products - thanks for sharing Sonia!

Occasional Visitor

Absolutely fantastic, and thanks for sharing all the related links. Everything fits together perfectly now :) 

Microsoft

Great article and just in time, I am doing my preparation for the certification Az-500 this month :)

New Contributor

Very insightful and well explained. Thanks for the amazing work!

Occasional Visitor

The human analogy is the best!! :)

Occasional Visitor

Well Explained. Great Piece.

New Contributor

Hi Sonia,

thanks for the great article! One thing is not clear to me: We are getting container vulnerabilities in Security Center due to the Qualys scanner. As those vulnerabilities do not generate security alerts, they are not streamed to Sentinel. Is it the case that we need to manually look up container vulnerabilities in Security Center even if Sentinel is in place? Or is there any way I oversaw to stream those vulnerability information to Sentinel?

 

Thanks for your help!

Senior Member

Very well Summarized. Thanks Sonia !

Senior Member

Very well summarized. Thanks a lot

Occasional Visitor

La mejor parte:

En términos humanos: Azure Security Center soy yo viviendo una vida generalmente saludable y observando las señales de que estoy agotado. Azure Defender es mi membresía en el gimnasio o vitaminas que ayudan a mejorar o aumentar mi salud, y Azure Sentinel es la prueba y los tratamientos regulares y especializados de mi médico, que me alertan de signos específicos que necesitan investigar en todo mi cuerpo, incluidos mis análisis de sangre.

Explicando las cosas aplicadas a situaciones más sencillas, como debe ser :stareyes:

%3CLINGO-SUB%20id%3D%22lingo-sub-2155188%22%20slang%3D%22en-US%22%3EWhat's%20the%20difference%20between%20Azure%20Security%20Center%2C%20Azure%20Defender%20and%20Azure%20Sentinel%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2155188%22%20slang%3D%22en-US%22%3E%3CP%3EIt's%20common%20to%20have%20a%20pre-defined%20perspective%20when%20you%20hear%20the%20word%20%22security%22.%20Some%20people%20think%20of%20applications%20being%20configured%20correctly%20or%20insecure%20coding%20practices.%20Some%20people%20think%20of%20identity%20concepts%20like%20password%20spray%20attacks%2C%20phishing%20or%20multi%20factor%20authentication.%20And%20some%20people%20think%20of%20infrastructure%20concepts%20like%20networking%2C%20VPNs%20and%20port%20scanning.%20Security%20is%20all%20of%20these%20-%20and%20more.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20helps%20you%20manage%20a%20layered%20approach%20to%20security%20with%20tools%20that%20integrate%20with%20your%20Azure%20and%20non-Azure%20workloads.%20Three%20common%20capabilities%20that%20are%20used%20in%20unison%20are%20Azure%20Security%20Center%2C%20Azure%20Defender%20and%20Azure%20Sentinel.%20So%20what's%20the%20difference%20between%20them%20and%20when%20would%20you%20use%20each%20product%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Azure%20Security%20Products.PNG%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F256459i5FA890E666D3F0CD%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Azure%20Security%20Products.PNG%22%20alt%3D%22Azure%20Security%20Products.PNG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--524193934%22%20id%3D%22toc-hId--524193260%22%20id%3D%22toc-hId--524193260%22%20id%3D%22toc-hId--524193260%22%20id%3D%22toc-hId--524193260%22%20id%3D%22toc-hId--524193260%22%20id%3D%22toc-hId--524193260%22%20id%3D%22toc-hId--524193260%22%20id%3D%22toc-hId--524193260%22%20id%3D%22toc-hId--524193260%22%20id%3D%22toc-hId--524193260%22%20id%3D%22toc-hId--524193260%22%20id%3D%22toc-hId--524193260%22%20id%3D%22toc-hId--524193260%22%20id%3D%22toc-hId--524193260%22%3EAzure%20Security%20Center%20-%20Security%20Posture%20Management%3C%2FH2%3E%0A%3CP%3EThis%20is%20your%20%22base%20layer%22%20for%20monitoring%20the%20security%20configuration%20and%20health%20of%20your%20workloads.%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsecurity-center%2Fsecurity-center-introduction%3FWT.mc_id%3Dmodinfra-17262-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Security%20Center%3C%2FA%3E%20collects%20events%20from%20Azure%20or%20log%20analytics%20agents%20and%20correlates%20them%20in%20a%20security%20analytics%20engine%2C%20to%20provide%20you%20with%20tailored%20recommendations%20(hardening%20tasks).%20Strengthening%20your%20security%20posture%20can%20be%20achieved%20by%20implementing%20these%20recommendations.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20Azure%20Security%20Center%20uses%20a%20built-in%20Azure%20Policy%20initiative%20in%20audit-only%20mode%20(the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsecurity%2Fbenchmarks%2Fintroduction%2FWT.mc_id%3Dmodinfra-17262-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Security%20Benchmark%3C%2FA%3E)%20as%20well%20as%20Azure%20Monitor%20logs%20and%20other%20Azure%20security%20solutions%20like%20Microsoft%20Cloud%20App%20Security.%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EThe%20free%20pricing%20tier%20of%20the%20Azure%20Security%20Center%20is%20enabled%20by%20default%20on%20all%20Azure%20subscriptions%2C%20once%20you%20visit%20the%20Azure%20Security%20Center%20in%20the%20portal%20for%20the%20first%20time%20(or%20activate%20it%20via%20the%20API).%26nbsp%3B%3CBR%20%2F%3EThen%20it%20will%20automatically%20discover%20and%20onboard%20Azure%20resources%2C%20including%26nbsp%3BPaaS%20services%20in%20Azure%20(Service%20Fabric%2C%26nbsp%3B%20SQL%20Database%20etc).%20And%20you%20can%20include%20non-Azure%20resources%20via%20the%20Log%20Analytics%20agent%20and%20Azure%20Arc.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAzure%20Security%20Center%20also%20includes%20a%20%3CSTRONG%3Enetwork%20map%3C%2FSTRONG%3E%20-%20an%20interactive%20graphical%20view%20of%20the%20network%20topology%20of%20your%20Azure%20workloads%20and%20the%20traffic%20routes.%20By%20default%2C%20the%20topology%20map%20displays%20resources%20that%20have%20network%20recommendations%20with%20high%20or%20medium%20severity.%20To%20learn%20more%2C%20visit%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsecurity-center%2Fsecurity-center-network-recommendations%3FWt.mc_id%3Dmodinfra-17262-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EProtect%20your%20network%20resources.%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22network-map-traffic.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F256465i68CD48D392D88BCC%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22network-map-traffic.png%22%20alt%3D%22Azure%20Security%20Center%20network%20map%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EAzure%20Security%20Center%20network%20map%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBut%20one%20of%20the%20most%20important%20features%20is%20the%20pro-active%20%3CSTRONG%3Esecurity%20recommendations%3C%2FSTRONG%3E%26nbsp%3B%20for%20Azure%20Compute%2C%20data%2C%20identity%20and%20access%20and%20networking%20resources.%20Implementing%20these%20will%20improve%20your%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsecurity-center%2Fsecure-score-security-controls%3FWT.mc_id%3Dmodinfra-17262-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3ESecure%20Score%3C%2FA%3E%20-%20a%20visual%20indication%20of%20the%20improvement%20of%20your%20overall%20security%20posture.%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsecurity-center%2Frecommendations-reference%3FWT.mc_modinfra-17262-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3ELearn%20more%20about%20the%20security%20recommendations.%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22asc-secure-score.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F256463i8E8ACCB7DAEB6E6D%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22asc-secure-score.png%22%20alt%3D%22Azure%20Security%20Center%20secure%20score%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EAzure%20Security%20Center%20secure%20score%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3ETo%20get%20started%2C%20visit%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsecurity-center%2Fsecurity-center-planning-and-operations-guide%3FWT.mc_id%3Dmodinfra-17262-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Security%20Center%20Planning%20and%20operations%20guide%3C%2FA%3E.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1963318899%22%20id%3D%22toc-hId-1963319573%22%20id%3D%22toc-hId-1963319573%22%20id%3D%22toc-hId-1963319573%22%20id%3D%22toc-hId-1963319573%22%20id%3D%22toc-hId-1963319573%22%20id%3D%22toc-hId-1963319573%22%20id%3D%22toc-hId-1963319573%22%20id%3D%22toc-hId-1963319573%22%20id%3D%22toc-hId-1963319573%22%20id%3D%22toc-hId-1963319573%22%20id%3D%22toc-hId-1963319573%22%20id%3D%22toc-hId-1963319573%22%20id%3D%22toc-hId-1963319573%22%20id%3D%22toc-hId-1963319573%22%3EAzure%20Defender%20-%20Advanced%20Workload%20Protection%3C%2FH2%3E%0A%3CP%3ETo%20add%20additional%20security%20alerts%20and%20advanced%20threat%20detection%2C%20certain%20types%20of%20resources%20can%20also%20be%20monitored%20by%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fitops-talk-blog%2Fwhat-is-azure-defender%2Fba-p%2F1843528%3FWT.mc_id%3Dmodinfra-17262-socuff%22%20target%3D%22_self%22%3EAzure%20Defender.%3C%2FA%3E%20The%20Azure%20Defender%20pane%20inside%20the%20Azure%20Security%20Center%20shows%20you%20which%20workloads%20are%20protected%20by%20Azure%20Defender%20or%20not.%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsecurity-center%2Fsecurity-center-pricing%3FWT.mc_id%3Dmodinfra-17262-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EThis%20is%20a%20paid%20service%3C%2FA%3E%20and%20turning%20on%20Azure%20Defender%20for%20servers%20(for%20example)%20applies%20to%20all%20servers%20in%20that%20Azure%20subscription%2C%20when%20they%20are%20running.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22ASC-AzureDefender.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F256464iC0199C24BE1457F0%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22ASC-AzureDefender.png%22%20alt%3D%22The%20Azure%20Defender%20dashbaord%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EThe%20Azure%20Defender%20dashbaord%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAzure%20Defender%20is%20available%20for%20servers%2C%20app%20service%2C%20Storage%2C%20SQL%2C%20Key%20Vault%2C%20Resource%20Manager%2C%20DNS%2C%20Kubernetes%20and%20container%20registries.%20It%20can%20also%20apply%20to%20non-Azure%20servers%20on-premises%20and%20in%20other%20clouds%2C%20via%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fazure-arc%2Foverview%3FWT.mc_id%3Dmodinfra-17262-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Arc%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELets%20look%20at%20some%20of%20the%20features%20you'd%20get%20for%20your%20Windows%20Server%20(as%20an%20example)%20by%20adding%20Azure%20Defender%20for%20servers%3A%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ESecurity%20alerts%3A%3C%2FSTRONG%3E%20Appearing%20in%20Azure%20Security%20Center%2C%20security%20alerts%20detail%20the%20suspicious%20process%20executed%2C%20start%20time%20and%20MITRE%20ATT%26amp%3BCK%20tactic%26nbsp%3B%20-%20for%20Windows%2C%20Linux%2C%20Azure%20App%20Service%2C%20Containers%20(AKS)%2C%20Containers%20(host%20level)%2C%20SQL%20Database%2C%20Azure%20Synapse%20Analytics%2C%20Azure%20Resource%20Manager%2C%20DNS%2C%20Azure%20Storage%2C%20Cosmos%20DB%20(preview)%2C%20Azure%20network%20layer%2C%20Azure%20key%20vault%20and%20Azure%20DDoS%20Protection.%20For%20more%20information%2C%20see%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsecurity-center%2Falerts-reference%3FWT.mc_id-modinfra-17262-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3ESecurity%20alerts%20-%20a%20reference%20guide.%26nbsp%3B%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EVulnerability%20assessment%3C%2FSTRONG%3E%20-%20Your%20VM%20is%20scanned%20for%20artefacts%20which%20are%20analysed%20by%20Qualys'%20cloud%20service%20and%20the%20results%20sent%20back%20to%20Azure%20Security%20Center.%20These%20results%20show%20if%20any%20vulnerabilities%20have%20been%20identified%20in%20the%20software%20running%20on%20your%20VM%20(including%20its%20operating%20system)%2C%20highlighting%20the%20highest%20priorities%20and%20including%20the%20latest%20available%20patches.%20The%20cost%20of%20this%20service%20is%20included%20in%20your%20Azure%20Defender%20pricing.%20For%20more%20details%2C%20visit%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsecurity-center%2Fdeploy-vulnerability-assessment-vm%3FWT.mc_id%3Dmodinfra-17262-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Defender's%20integrated%20vulnerability%20assessment%20solution%20for%20Azure%20and%20hybrid%20machines.%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EJust%20in%20time%20access%3C%2FSTRONG%3E%20-%20JIT%20VM%20access%20enables%20you%20to%20lock%20down%20standard%20inbound%20management%20ports%20(such%20as%20port%203389)%20and%20easily%20open%20them%20when%20requested%20by%20an%20appropriate%20user%2C%20to%20their%20connection%20only%20(or%20IP%20range)%2C%20for%20a%20limited%20period%20of%20time.%20Then%20the%20ports%20are%20automatically%20locked%20down%20again.%20This%20includes%20an%20approval%20process%20and%20no%20manual%20configuration%20of%20Network%20Security%20Groups%20or%20Azure%20Firewall.%20For%20more%20information%2C%20visit%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsecurity-center%2Fjust-in-time-explained%3FWT.mc_id%3Dmodinfra-17262-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EUnderstanding%20just-in-time%20(JIT)%20VM%20access.%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EAdaptive%20application%20controls%3C%2FSTRONG%3E%20-%20This%20feature%20provides%20an%20intelligent%20and%20automated%20allow%20list%20of%20known-safe%20applications%20for%20your%20VM.%20Machine%20learning%20analysis%20your%20workload%20to%20detect%20what%20is%20common%20or%20known%20in%20your%20organisation%20(which%20you%20can%20further%20customize)%20and%20you'll%20get%20security%20alerts%20if%20any%20other%20applications%20are%20run%20that%20are%20not%20on%20the%20allow%20list.%20Learn%20more%20at%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsecurity-center%2Fsecurity-center-adaptive-application%3FWT.mc_id%3Dmodinfra-17262-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EUse%20adaptive%20controls%20to%20reduce%20your%20machines'%20attack%20surface.%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAzure%20Defender%20for%20servers%20also%20includes%20file%20integrity%20monitoring%2C%20adaptive%20network%20hardening%20and%20Docker%20host%20hardening.%20For%20more%20information%20on%20these%20capabilities%20and%20the%20other%20Azure%20Defender%20workload%20types%20and%20features%2C%20visit%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsecurity-center%2Fazure-defender%3FWT.mc_id%3Dmodinfra-17262-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EIntroduction%20to%20Azure%20Defender.%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ESo%20far%20so%20good!%3C%2FSTRONG%3E%26nbsp%3BOur%20VM%20is%20being%20monitored%20by%20Azure%20Security%20Center%20protecting%20all%20the%20VMs%20in%20our%20subscription%2C%20and%20we've%20added%20Azure%20Defender%20for%20servers%20for%20vulnerability%20scanning%2C%20adaptive%20application%20and%20network%20control%20and%20just%20in%20time%20access%20to%20management%20ports.%20What%20about%20Azure%20Sentinel%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-155864436%22%20id%3D%22toc-hId-155865110%22%20id%3D%22toc-hId-155865110%22%20id%3D%22toc-hId-155865110%22%20id%3D%22toc-hId-155865110%22%20id%3D%22toc-hId-155865110%22%20id%3D%22toc-hId-155865110%22%20id%3D%22toc-hId-155865110%22%20id%3D%22toc-hId-155865110%22%20id%3D%22toc-hId-155865110%22%20id%3D%22toc-hId-155865110%22%20id%3D%22toc-hId-155865110%22%20id%3D%22toc-hId-155865110%22%20id%3D%22toc-hId-155865110%22%20id%3D%22toc-hId-155865110%22%3EAzure%20Sentinel%20-%20Security%20Information%20Event%20Management%20%2B%20Security%20Orchestration%20Automated%20Response%3C%2FH2%3E%0A%3CP%3EAzure%20Sentinel%20helps%20you%20to%20bring%20in%20the%20big%20picture%20of%20what's%20happening%20across%20your%20environment%20and%20connect%20the%20dots%20that%20might%20be%20related%20to%20the%20same%20security%20incident.%20While%20I've%20mentioned%20Azure%20and%20on-premises%20workloads%20so%20far%2C%20there's%20often%20more%20to%20your%20IT%20footprint%20than%20that%20-%20Microsoft%20365%2C%20Azure%20Active%20Directory%2C%20Amazon%20Web%20Services%20-%20CloudTrail%2C%20Citrix%20Analytics%2C%20VMWare%20Carbon%20Black%20Cloud%20Endpoint%2C%20and%20third%20party%20firewalls%20and%20proxies%2C%20just%20to%20name%20a%20few%20examples.%20For%20a%20full%20list%20of%20supported%20data%20sources%20visit%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsentinel%2Fconnect-data-sources%3FWT.mc_id%3Dmodinfra-17262-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EConnect%20data%20sources.%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Azure-Sentinel-core-capabilities.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F256461iA1AC2690242466CF%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22Azure-Sentinel-core-capabilities.png%22%20alt%3D%22Azure%20Sentinel%20core%20capabilities%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EAzure%20Sentinel%20core%20capabilities%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20style%3D%22text-align%3A%20center%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20all%20of%20those%20different%20data%20sources%20connected%2C%20Azure%20Sentinel%20uses%20AI%20and%20Microsoft's%20threat%20intelligence%20stream%20to%20detect%20threats%20across%20your%20environment%2C%20correlate%20alerts%20into%20incidents%2C%20use%20deep%20investigation%20tools%20to%20find%20the%20scope%20and%20root%20cause%20and%20access%20powerful%20hunting%20search%20and%20query%20tools.%20Now%20you're%20no%20longer%20having%20to%20search%20through%20logs%20separately%20in%20different%20systems%2C%20trying%20to%20decide%20what%20may%20be%20relevant%20and%20what%20is%20just%20noise%2C%20while%20trying%20to%20compare%20time%20stamps%20to%20link%20to%20the%20same%20possible%20event.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Investigation.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F256462iAC7519F10517D10F%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Investigation.png%22%20alt%3D%22Investigating%20a%20security%20threat%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EInvestigating%20a%20security%20threat%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EIn%20addition%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsentinel%2Ftutorial-respond-threats-playbook%3FWT.mc_id%3Dmodinfra-17262-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Sentinel%20supports%20playbooks%20with%20Azure%20Logic%20Apps%3C%2FA%3E%20-%20build%20your%20own%20automated%20workflows%20to%20open%20tickets%2C%20send%20notifications%20or%20trigger%20actions%20when%20particular%20events%20are%20detected.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1651590027%22%20id%3D%22toc-hId--1651589353%22%20id%3D%22toc-hId--1651589353%22%20id%3D%22toc-hId--1651589353%22%20id%3D%22toc-hId--1651589353%22%20id%3D%22toc-hId--1651589353%22%20id%3D%22toc-hId--1651589353%22%20id%3D%22toc-hId--1651589353%22%20id%3D%22toc-hId--1651589353%22%20id%3D%22toc-hId--1651589353%22%20id%3D%22toc-hId--1651589353%22%20id%3D%22toc-hId--1651589353%22%20id%3D%22toc-hId--1651589353%22%20id%3D%22toc-hId--1651589353%22%20id%3D%22toc-hId--1651589353%22%3ESummary%3C%2FH2%3E%0A%3CP%3EIn%20human%20terms%20-%20Azure%20Security%20Center%20is%20me%20living%20a%20generally%20healthy%20life%20and%20watching%20for%20signs%20that%20I'm%20run-down.%20Azure%20Defender%20is%20my%20gym%20membership%20or%20vitamins%20that%20help%20improve%20or%20boost%20my%20health%2C%20and%20Azure%20Sentinel%20is%20the%20regular%20and%20specialists%20tests%20and%20treatments%20from%20my%20doctor%2C%20that%20alert%20me%20to%20specific%20signs%20that%20need%20investigating%20across%20my%20whole%20body%2C%20including%20my%20blood%20tests.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENow%20you%20can%20choose%20which%20workloads%20need%20the%20added%20protection%20of%20Azure%20Defender%20and%20which%20workloads%20should%20be%20included%20for%20visibility%20in%20Azure%20Sentinel%2C%20for%20comprehensive%20security%20management%20across%20your%20entire%20IT%20environment.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESarah%20Young%20recently%20joined%20us%20to%20explain%20how%20Azure%20Security%20Center%20and%20Azure%20Sentinel%20can%20protect%20hybrid%20(on-prem%20%2B%20cloud)%20environments.%20Check%20out%20her%20sessions%3A%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fitops-talk-blog%2Fops101-securing-your-hybrid-environment-part-1-azure-security%2Fba-p%2F2103250%3FWT.mc_id%3Dmodinfra-17262-socuff%22%20target%3D%22_self%22%3EOPS101%3A%20Security%20your%20Hybrid%20environment%20Part%201%20-%20Azure%20Security%20Center%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fitops-talk-blog%2Fops103-securing-your-hybrid-environment-part-2-azure-sentinel%2Fba-p%2F2103853%3FWt.mc_id%3Dmodinfra-17262-socuff%22%20target%3D%22_self%22%3EOPS103%3A%20Security%26nbsp%3Byour%20Hybrid%20environment%20Part%202%20-%20Azure%20Sentinel%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2155188%22%20slang%3D%22en-US%22%3E%3CP%3ELearn%20the%20key%20features%20of%20and%20differences%20between%20Azure%20Security%20Center%2C%20Azure%20Defender%20and%20Azure%20Sentinel.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Lifering.jpeg%22%20style%3D%22width%3A%20749px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F256456i6918A108260EDCA3%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Lifering.jpeg%22%20alt%3D%22Lifering.jpeg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2155188%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESonia%20Cuff%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2165353%22%20slang%3D%22en-US%22%3ERe%3A%20What's%20the%20difference%20between%20Azure%20Security%20Center%2C%20Azure%20Defender%20and%20Azure%20Sentinel%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2165353%22%20slang%3D%22en-US%22%3E%3CP%3EAwesome%20post%20!%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2165600%22%20slang%3D%22en-US%22%3ERE%3A%20What's%20the%20difference%20between%20Azure%20Security%20Center%2C%20Azure%20Defender%20and%20Azure%20Sentinel%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2165600%22%20slang%3D%22en-US%22%3EThank%20you%20for%20the%20post%20Sonia%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2168289%22%20slang%3D%22en-US%22%3ERe%3A%20What's%20the%20difference%20between%20Azure%20Security%20Center%2C%20Azure%20Defender%20and%20Azure%20Sentinel%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2168289%22%20slang%3D%22en-US%22%3E%3CP%3EExcellent%20and%20clear%20explanation%20post%20before%20this%20article%20I%20was%20bit%20confused%20to%20grasp%20the%20Azure%20security%20center%2C%20defended%20and%20sentinel.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2171842%22%20slang%3D%22en-US%22%3ERe%3A%20What's%20the%20difference%20between%20Azure%20Security%20Center%2C%20Azure%20Defender%20and%20Azure%20Sentinel%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2171842%22%20slang%3D%22en-US%22%3E%3CP%3EExcellent%20article%20Sonia!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2173263%22%20slang%3D%22en-US%22%3ERe%3A%20What's%20the%20difference%20between%20Azure%20Security%20Center%2C%20Azure%20Defender%20and%20Azure%20Sentinel%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2173263%22%20slang%3D%22en-US%22%3E%3CP%3EGreat%20article%2C%20thanks.%3C%2FP%3E%3CP%3EThe%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsecurity%2Fbenchmarks%2Fintroduction%2FWT.mc_id%3Dmodinfra-17262-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Security%20Benchmark%3C%2FA%3E)%20is%20broken%2C%20please%20check.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2191271%22%20slang%3D%22en-US%22%3ERe%3A%20What's%20the%20difference%20between%20Azure%20Security%20Center%2C%20Azure%20Defender%20and%20Azure%20Sentinel%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2191271%22%20slang%3D%22en-US%22%3E%3CP%3EI'm%20finally%20having%20a%20clear%20picture%20about%20the%20three%20products%20-%20thanks%20for%20sharing%20Sonia!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2192722%22%20slang%3D%22en-US%22%3ERe%3A%20What's%20the%20difference%20between%20Azure%20Security%20Center%2C%20Azure%20Defender%20and%20Azure%20Sentinel%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2192722%22%20slang%3D%22en-US%22%3E%3CP%3EAbsolutely%20fantastic%2C%20and%20thanks%20for%20sharing%20all%20the%20related%20links.%20Everything%20fits%20together%20perfectly%20now%20%3A)%3C%2Fimg%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2203557%22%20slang%3D%22en-US%22%3ERe%3A%20What's%20the%20difference%20between%20Azure%20Security%20Center%2C%20Azure%20Defender%20and%20Azure%20Sentinel%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2203557%22%20slang%3D%22en-US%22%3E%3CP%3EGreat%20article%20and%20just%20in%20time%2C%20I%20am%20doing%20my%20preparation%20for%20the%20certification%20Az-500%20this%20month%20%3A)%3C%2Fimg%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2276302%22%20slang%3D%22en-US%22%3ERe%3A%20What's%20the%20difference%20between%20Azure%20Security%20Center%2C%20Azure%20Defender%20and%20Azure%20Sentinel%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2276302%22%20slang%3D%22en-US%22%3E%3CP%3EVery%20insightful%20and%20well%20explained.%20Thanks%20for%20the%20amazing%20work!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2378962%22%20slang%3D%22en-US%22%3ERe%3A%20What's%20the%20difference%20between%20Azure%20Security%20Center%2C%20Azure%20Defender%20and%20Azure%20Sentinel%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2378962%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20human%20analogy%20is%20the%20best!!%20%3A)%3C%2Fimg%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2389904%22%20slang%3D%22en-US%22%3ERe%3A%20What's%20the%20difference%20between%20Azure%20Security%20Center%2C%20Azure%20Defender%20and%20Azure%20Sentinel%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2389904%22%20slang%3D%22en-US%22%3E%3CP%3EWell%20Explained.%20Great%20Piece.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Co-Authors
Version history
Last update:
‎Feb 22 2021 04:05 PM
Updated by: