<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft Defender for Cloud topics</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/bd-p/MicrosoftDefenderCloud</link>
    <description>Microsoft Defender for Cloud topics</description>
    <pubDate>Thu, 30 Apr 2026 01:11:34 GMT</pubDate>
    <dc:creator>MicrosoftDefenderCloud</dc:creator>
    <dc:date>2026-04-30T01:11:34Z</dc:date>
    <item>
      <title>Microsoft Defender for Cloud</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/microsoft-defender-for-cloud/m-p/4489722#M2144</link>
      <description>&lt;P&gt;For security operations teams managing Microsoft 365 and Azure environments, knowing which event logs to monitor in the Defender portal is fundamental. The right logs give you visibility into identity threats, device compromise, and policy violations before they escalate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here are the most critical event log categories:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;## 1. Sign-In Logs (Entra ID)&lt;/P&gt;&lt;P&gt;**Location:** Microsoft Entra ID &amp;gt; Sign-in logs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Monitor failed sign-ins, unfamiliar locations, Conditional Access failures, and risky sign-ins flagged by Identity Protection. Identity is the primary attack surface—these logs detect credential compromise and lateral movement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;## 2. Audit Logs (Entra ID)&lt;/P&gt;&lt;P&gt;**Location:** Microsoft Entra ID &amp;gt; Audit logs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Track changes to user accounts, privilege escalations, Conditional Access modifications, and application consent grants. Unauthorized administrative changes can bypass security controls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;## 3. Device Compliance Logs (Intune)&lt;/P&gt;&lt;P&gt;**Location:** Microsoft Intune &amp;gt; Devices &amp;gt; Monitor&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Monitor non-compliant devices, enrollment failures, and policy errors. Non-compliant endpoints represent unmanaged risk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;## 4. Threat &amp;amp; Vulnerability Management&lt;/P&gt;&lt;P&gt;**Location:** Microsoft Defender &amp;gt; Endpoints &amp;gt; TVM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Track critical vulnerabilities, missing updates, and exposed credentials. Proactive vulnerability management prevents exploitation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;## 5. Alerts and Incidents (Defender XDR)&lt;/P&gt;&lt;P&gt;**Location:** Microsoft Defender &amp;gt; Incidents &amp;amp; Alerts&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your central SOC dashboard—monitor high-severity alerts for ransomware, credential theft, and lateral movement across endpoints, identities, email, and apps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;## 6. Cloud App Activity Logs&lt;/P&gt;&lt;P&gt;**Location:** Defender for Cloud Apps &amp;gt; Activity log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Detect unusual file downloads, admin activity from unmanaged devices, and OAuth app permissions. These logs reveal unauthorized data exfiltration and risky SaaS behavior.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;## 7. Email Threat Logs&lt;/P&gt;&lt;P&gt;**Location:** Microsoft Defender &amp;gt; Email &amp;amp; Collaboration &amp;gt; Threat Explorer&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Monitor phishing attempts, malware attachments, and spoofed emails. Email remains the most common attack vector.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;## 8. Cloud Security Alerts&lt;/P&gt;&lt;P&gt;**Location:** Microsoft Defender for Cloud &amp;gt; Security alerts&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Track misconfigurations, policy violations, and threats across Azure subscriptions and hybrid workloads. Essential for cloud infrastructure protection and compliance monitoring.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;## How to Use These Logs Effectively&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Set up automated alerts in Sentinel&lt;/P&gt;&lt;P&gt;2. Establish baselines to detect anomalies&lt;/P&gt;&lt;P&gt;3. Correlate across sources for full attack context&lt;/P&gt;&lt;P&gt;4. Automate response with AIR features&lt;/P&gt;&lt;P&gt;5. Review high-severity logs weekly&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;**Microsoft Defender XDR Documentation:**&lt;/P&gt;&lt;P&gt;https://learn.microsoft.com/en-us/microsoft-365/security/defender/&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;**Entra ID Monitoring:**&lt;/P&gt;&lt;P&gt;https://learn.microsoft.com/en-us/entra/identity/monitoring-health/&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;**Microsoft Defender for Cloud:**&lt;/P&gt;&lt;P&gt;https://learn.microsoft.com/en-us/azure/defender-for-cloud/&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Monitoring the right logs is the foundation of a strong security posture. Start here, tune your alerts, and build the visibility your SOC needs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;#MicrosoftDefender #CyberSecurity #SOC #DefenderXDR #ThreatHunting #SecurityOperations #EntraID #Microsoft365 #ZeroTrust #DefenderForCloud&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jan 2026 11:31:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/microsoft-defender-for-cloud/m-p/4489722#M2144</guid>
      <dc:creator>Lucaraheller</dc:creator>
      <dc:date>2026-01-27T11:31:58Z</dc:date>
    </item>
    <item>
      <title>Defender for servers (P1)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-servers-p1/m-p/4484946#M2135</link>
      <description>&lt;P&gt;Hey guys,&lt;BR /&gt;&lt;BR /&gt;I enabled my Defender for cloud trial licens (P1) for my Windows servers.&lt;BR /&gt;&lt;BR /&gt;They are onboarded and i can see them visually in the (security.microsoft.com) EDR Portal.&lt;/P&gt;&lt;P&gt;My enforcement scope is set to Intune - so all my AV policies etc are created there.&lt;BR /&gt;&lt;BR /&gt;I want to create a AV Policy for my Windows servers but i can't see the objects in Entra.&lt;BR /&gt;&lt;BR /&gt;What is best practice. To register them in Entra manually or should it automaticlly create a object in Entra during the onboarding process?&lt;BR /&gt;&lt;BR /&gt;Can't create &amp;amp; assign a AV policy etc until i create a group and put all my servers into that group.&lt;BR /&gt;&lt;BR /&gt;Any ideas?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Also might be worth mentioning i see that they are managed by "unknown" and not Microsoft Sense? Should i point back the scope to the Defender portal?&amp;nbsp; Whilst my endpoints are managed by Intune.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2026 09:28:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-servers-p1/m-p/4484946#M2135</guid>
      <dc:creator>Diddler431</dc:creator>
      <dc:date>2026-01-12T09:28:29Z</dc:date>
    </item>
    <item>
      <title>Updating SDK for Java used by Defender for Server/CSPM in AWS</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/updating-sdk-for-java-used-by-defender-for-server-cspm-in-aws/m-p/4481776#M2134</link>
      <description>&lt;P&gt;&lt;SPAN data-olk-copy-source="MessageBody"&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-olk-copy-source="MessageBody"&gt;I have a customer who is Defender for Cloud/CSPM in AWS.&amp;nbsp; Last week, Cloud AWS Health Dashboard lit up with a recommendation around the use of AWS SDK for Java 1.x in their organization. This version will reach end of support on December 31, 2025. The recommendation is to migrate to AWS SDK for Java 2.x. The issue is present in all of AWS workload accounts.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;They found that a large amount of these alerts is caused by the Defender CSPM service, running remotely, and using AWS SDK for Java 1.x.&amp;nbsp; Customer attaching a couple of sample events that were gathered from the CloudTrail logs. Please note that in both cases:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;assumed-role: &amp;nbsp;DefenderForCloud-Ciem&lt;/LI&gt;
&lt;LI&gt;sourceIP: 20.237.136.191 (MS Azure range)&lt;/LI&gt;
&lt;LI&gt;userAgent: aws-sdk-java/1.12.742 Linux/6.6.112.1-2.azl3 OpenJDK_64-Bit_Server_VM/21.0.9+10-LTS java/21.0.9 kotlin/1.6.20 vendor/Microsoft cfg/retry-mode/legacy cfg/auth-source#unknown&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can someone provide guidance about this? How to find out if DfC is going to leverage AWS SDK for Java 2.x after Dec 31, 2025?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Terru&lt;/P&gt;</description>
      <pubDate>Mon, 29 Dec 2025 17:26:21 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/updating-sdk-for-java-used-by-defender-for-server-cspm-in-aws/m-p/4481776#M2134</guid>
      <dc:creator>terruahmad</dc:creator>
      <dc:date>2025-12-29T17:26:21Z</dc:date>
    </item>
    <item>
      <title>Automate Defender for Cloud settings: FIM, Vulnerability Assessment, and Guest Configuration Agent</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/automate-defender-for-cloud-settings-fim-vulnerability/m-p/4470557#M2133</link>
      <description>&lt;P&gt;I’m working on automating the configuration of &lt;STRONG&gt;Microsoft Defender for Cloud – Server Plans&lt;/STRONG&gt; across multiple subscriptions (100+), including any newly deployed subscriptions. The goal is to avoid manual changes and ensure compliance from day one.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Current Setup:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I’ve used the built-in policy: &lt;STRONG&gt;Configure Microsoft Defender for Servers plan&lt;/STRONG&gt;, which successfully enables:&lt;UL&gt;&lt;LI&gt;Defender for Cloud Plan P2&lt;/LI&gt;&lt;LI&gt;Endpoint Protection&lt;/LI&gt;&lt;LI&gt;Agentless scanning&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;I attempted to copy this policy and add parameters for Vulnerability Assessment, but the assignment fails with an error.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;What I’ve Tried:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;For &lt;STRONG&gt;File Integrity Monitor&lt;/STRONG&gt;: Policy name → &lt;EM&gt;Configure ChangeTracking Extension for Windows virtual machines&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;For &lt;STRONG&gt;Vulnerability Assessment&lt;/STRONG&gt;: Policy name → &lt;EM&gt;Configure machines to receive a vulnerability assessment provider&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;Assigning these policies works on my non-prod subscription, but the toggle in &lt;STRONG&gt;Defender for Cloud → Environment Settings&lt;/STRONG&gt; remains &lt;STRONG&gt;No&lt;/STRONG&gt;.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Challenge:&lt;/STRONG&gt; How can I ensure these options (File Integrity Monitoring, Vulnerability Assessment, and preferably Guest Configuration Agent) are automatically enabled for:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;All existing subscriptions&lt;/LI&gt;&lt;LI&gt;Any new subscriptions created in the future&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Goal:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;No manual intervention in Defender for Cloud portal&lt;/LI&gt;&lt;LI&gt;Fully automated via Azure Policy or another recommended approach&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;uestions:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Is there a way to extend the built-in policy or create a custom initiative that enforces these settings at the subscription level?&lt;/LI&gt;&lt;LI&gt;Are there ARM templates, Bicep modules, Powershell scripts or REST API calls that can toggle these settings programmatically?&lt;/LI&gt;&lt;LI&gt;Any best practices for ensuring compliance across multiple subscriptions?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help is much appreciated and looking forward to your expertise!&lt;BR /&gt;Thank you in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Pascal Slot&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2025 13:27:07 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/automate-defender-for-cloud-settings-fim-vulnerability/m-p/4470557#M2133</guid>
      <dc:creator>Pascal2</dc:creator>
      <dc:date>2025-11-17T13:27:07Z</dc:date>
    </item>
    <item>
      <title>About Defender for Cloud aggregated logs in Advanced Hunting</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/about-defender-for-cloud-aggregated-logs-in-advanced-hunting/m-p/4459946#M2130</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I create this threat hoping that the Microsoft team will read and hopefully provide insights about future changes and roadmap&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When SOC teams use a non-Microsoft SIEM/SOAR, they need to export logs from M365 and Azure, and send them to the third-party SIEM/SOAR solution.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;• For M365 logs, there is the M365XDR connector that allows exporting logs using an Event Hub.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;• For Azure logs, we used to configure diagnostics settings and send them to an Event Hub.&lt;/P&gt;&lt;P&gt;This began to change with new features within Defender for Cloud (c.f. picture).:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;• Defender for Resource Manager now sends Azure Activity logs to M365XDR portal, and can be exported using M365XDR Streaming API&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;• Defender for Storage now sends logs to M365XDR portal, and can be exported using M365XDR Streaming API (c.f. &lt;A class="lia-external-url" href="https://www.youtube.com/watch?v=Yraeks8c8hg&amp;amp;t=1s)" target="_blank"&gt;https://www.youtube.com/watch?v=Yraeks8c8hg&amp;amp;t=1s)&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;This is great as it is easy to configure and doesn't interfere with infrastructure teams managing operational logs through diagnostic settings.&lt;/P&gt;&lt;P&gt;I have two questions :&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;• Is there any documentation about this? I didn't find any?&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-text-color-8"&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp;• What can we expect in the future weeks, months regarding this native logs collection feature through various Defender for Cloud products? For example, can we expect Defender for SQL to send logs to M365XDR natively?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thanks for you support!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2025 13:31:18 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/about-defender-for-cloud-aggregated-logs-in-advanced-hunting/m-p/4459946#M2130</guid>
      <dc:creator>Molx32</dc:creator>
      <dc:date>2025-10-08T13:31:18Z</dc:date>
    </item>
    <item>
      <title>Defender for Cloud DCR</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-cloud-dcr/m-p/4437197#M2126</link>
      <description>&lt;P&gt;&amp;nbsp;Enabling Defender for Servers Plan 2 and creating a custom DCR to enable the 500MB ingestion into log analytics. The workspace I am sending the logs to is connected to Sentinel. When I looked at creating the DCR I received this pop-up&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;If I enable the Sentinel connector, will this duplicate the cost of the logs or will the connector just enable the data to be surfaced in Sentinel?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jul 2025 14:25:43 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-cloud-dcr/m-p/4437197#M2126</guid>
      <dc:creator>edwaro3</dc:creator>
      <dc:date>2025-07-28T14:25:43Z</dc:date>
    </item>
    <item>
      <title>Is setting an index tag in Azure Defender for Cloud during file write an atomic operation?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/is-setting-an-index-tag-in-azure-defender-for-cloud-during-file/m-p/4436620#M2125</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;When using Azure Defender for Cloud, is setting an index tag at the same time as writing a file considered an atomic operation? Or is there a propagation delay before the tag becomes fully available and effective for search and policy enforcement?&lt;BR /&gt;Any insights or official documentation references would be appreciated!&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 11:12:35 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/is-setting-an-index-tag-in-azure-defender-for-cloud-during-file/m-p/4436620#M2125</guid>
      <dc:creator>vitoiacono</dc:creator>
      <dc:date>2025-07-25T11:12:35Z</dc:date>
    </item>
    <item>
      <title>File Integrity Monitoring - Agentless Issues in Detecting Changes to Files</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/file-integrity-monitoring-agentless-issues-in-detecting-changes/m-p/4428549#M2124</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;Looks like there have been some recent updates made to File Integrity Monitoring.&amp;nbsp; After reviewing the MS documentation &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/file-integrity-monitoring-overview#recommended-items-to-monitor" target="_blank"&gt;here&lt;/A&gt; it looks like you can now create custom Rules for Files and for custom Registry keys.&amp;nbsp; From what I can gather from the documentation, agentless scans are used for custom rules that you create and an agentless scan occurs once every 24 hours.&lt;/P&gt;&lt;P&gt;I have created several custom rules to detect if a file has been Deleted, Added, Modified or Renamed and Defender for Cloud is still not detecting any changes.&amp;nbsp; I have made changes to these files 3 days ago, and no changes have been reported back.&amp;nbsp; Any ideas why this might not be working.&amp;nbsp; I have already confirmed that the appropriate RBAC Roles have been assigned to my Key Vaults where CMK Disks are being used.&lt;/P&gt;&lt;P&gt;I also wanted to know if the Agentless FIM can monitor Folders / Directories as well.&amp;nbsp; I haven't seen anything about this in the documentation.&amp;nbsp; Is this even supported?&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jun 2025 17:29:03 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/file-integrity-monitoring-agentless-issues-in-detecting-changes/m-p/4428549#M2124</guid>
      <dc:creator>nopenuttn</dc:creator>
      <dc:date>2025-06-30T17:29:03Z</dc:date>
    </item>
    <item>
      <title>MISRA support in Defender</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/misra-support-in-defender/m-p/4422451#M2122</link>
      <description>&lt;P&gt;I want to check for MISRA C code compliance. The idea is to check for MISRA C compliance when asking for a Pull Request. If the code fails on those checks, the PR will not be created. This way, we enforce MISRA compliance before integrating the code to the repository.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am not seeing MISRA in the list of standards under - Regulatory Compliance&amp;gt;&amp;gt;Subscriptions&amp;gt;&amp;gt; Security Po;icies&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jun 2025 15:10:18 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/misra-support-in-defender/m-p/4422451#M2122</guid>
      <dc:creator>yogisrivastava</dc:creator>
      <dc:date>2025-06-10T15:10:18Z</dc:date>
    </item>
    <item>
      <title>Runtime protection - Microsoft Defender for Cloud DevOps Security (Defender CSPM)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/runtime-protection-microsoft-defender-for-cloud-devops-security/m-p/4422069#M2121</link>
      <description>&lt;P&gt;Hi team!&lt;/P&gt;
&lt;P&gt;The current support status for Microsoft Defender for Cloud DevOps Security (Defender CSPM) and runtime protection across services are this one :&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Fully Supported for Runtime Protection&lt;/LI&gt;
&lt;LI&gt;Azure Kubernetes Service (AKS)&lt;/LI&gt;
&lt;LI&gt;Amazon Elastic Kubernetes Service (EKS)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;are there more runtime in the product roadmap (Azure Container Apps, AWS, Fargate for Amazon ECS, Azure Functions, AWS Lambda)?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jun 2025 14:04:07 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/runtime-protection-microsoft-defender-for-cloud-devops-security/m-p/4422069#M2121</guid>
      <dc:creator>zafK</dc:creator>
      <dc:date>2025-06-09T14:04:07Z</dc:date>
    </item>
    <item>
      <title>Onboarding MDE with Defender for Cloud (Problem)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/onboarding-mde-with-defender-for-cloud-problem/m-p/4419898#M2120</link>
      <description>&lt;P&gt;Hello Community,&lt;/P&gt;&lt;P&gt;In our Customer i have a strange problem.&lt;/P&gt;&lt;P&gt;We onboarded with Azure Arc server and activate a Defender for Cloud servises only for Endpoint protection.&lt;/P&gt;&lt;P&gt;Some of this device onboarded into Microsoft Defender portale, but not appears as a device, infact i don't have opportunity to put them into a group to apply policy.&lt;/P&gt;&lt;P&gt;I have check sensor of Azure Arc and all works fine (device are in Azure Arc, are in the defender portal and see them on Intune (managed by MDE)).&lt;/P&gt;&lt;P&gt;From Intune portal&lt;/P&gt;&lt;img /&gt;&lt;P&gt;From Defender portal&lt;/P&gt;&lt;img /&gt;&lt;P&gt;But in difference from other device into entra ID exists only the enterprise application and not device&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I show the example of device that works correctly (the same onboarding method)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there anyone who has or has had this problem?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Guido&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 06:09:20 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/onboarding-mde-with-defender-for-cloud-problem/m-p/4419898#M2120</guid>
      <dc:creator>GuidoImpe</dc:creator>
      <dc:date>2025-06-03T06:09:20Z</dc:date>
    </item>
    <item>
      <title>Defender for AI data storage/processing</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-ai-data-storage-processing/m-p/4416586#M2116</link>
      <description>&lt;P&gt;Hi, does anyone know where the data that Defender for AI uses is processed and what data is stored and available to Microsoft?&amp;nbsp;&lt;/P&gt;&lt;P&gt;If abuse monitoring is turned off, the documentation says "Microsoft does not store the prompts and completions associated with the approved Azure subscription."&lt;/P&gt;&lt;P&gt;If content filtering is enabled the documentation says "Noo prompts or generated content are stored in the content classifier models."&lt;/P&gt;&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/legal/cognitive-services/openai/data-privacy?tabs=azure-portal#preventing-abuse-and-harmful-content-generation" target="_blank"&gt;https://learn.microsoft.com/en-us/legal/cognitive-services/openai/data-privacy?tabs=azure-portal#preventing-abuse-and-harmful-content-generation&lt;/A&gt;&lt;/P&gt;&lt;P&gt;But I was wondering what data is stored/processed, where this happens and if there's any documentation around this for the Defender for AI service.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could anyone point me to a page, please?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Neil.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 May 2025 16:06:40 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-ai-data-storage-processing/m-p/4416586#M2116</guid>
      <dc:creator>neiltreebeard</dc:creator>
      <dc:date>2025-05-22T16:06:40Z</dc:date>
    </item>
    <item>
      <title>Need help with enabling the "Security attack path" export data type in continuous export</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/need-help-with-enabling-the-quot-security-attack-path-quot/m-p/4412376#M2108</link>
      <description>&lt;P&gt;I tried enabling the "Security attack path" via API and CMDLET using Powershell. It is not working.&amp;nbsp;&lt;/P&gt;&lt;P&gt;New-AzSecurityAutomation ` -Name $automationName `&amp;nbsp;-ResourceGroupName $resourceGroupName `&lt;/P&gt;&lt;P&gt;I am not sure .Which resource group we should mention here. Is it random RG in a subscription or LAW RG.it is failing in both ways.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;API Method&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;$checkUrl="https://management.azure.com/subscriptions/$($subscription.Id)/resourceGroups/$resourceGroupName/providers/Microsoft.Security/automations/$automationName`?api-version=2023-12-01-preview"&lt;/P&gt;</description>
      <pubDate>Fri, 09 May 2025 15:14:28 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/need-help-with-enabling-the-quot-security-attack-path-quot/m-p/4412376#M2108</guid>
      <dc:creator>santhoshcv20</dc:creator>
      <dc:date>2025-05-09T15:14:28Z</dc:date>
    </item>
    <item>
      <title>Defender for Cloud Inventory API Coverage — No Official Way to Retrieve Per-Resource Coverage?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-cloud-inventory-api-coverage-no-official-way-to/m-p/4412339#M2107</link>
      <description>&lt;P&gt;I'm reaching out to the Microsoft Defender for Cloud team and the broader community because I've run into a gap that I believe others may face too — and I’m hoping for guidance or clarification.&lt;/P&gt;&lt;P&gt;I need to programmatically retrieve a list of resources from a subscription and determine if each resource is covered by a Defender for Cloud plan. This would replicate what we see in the Azure Portal under:&lt;/P&gt;&lt;P&gt;Microsoft Defender for Cloud &amp;gt; Inventory:&lt;/P&gt;&lt;img /&gt;&lt;P&gt;The goal is to fetch this data via API and replicate that table — but the problem is that it seems there’s no way to retrieve the “Defender for Cloud” coverage status per resource.&lt;/P&gt;&lt;P&gt;Here’s what I’ve tried so far:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The /pricings endpoint — returns plan tiers like &lt;EM&gt;Free&lt;/EM&gt; or &lt;EM&gt;Standard&lt;/EM&gt;, but only for the overall subscription or service type, not individual resources.&lt;/LI&gt;&lt;LI&gt;Azure Resource Graph — the properties field does not contain any Defender-related indicators that would confirm whether a specific resource is covered.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;My Question&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Does an API exist today to retrieve per-resource Defender for Cloud coverage?&lt;BR /&gt;Is there a /coverage endpoint or equivalent that is officially supported?&lt;/P&gt;&lt;P&gt;If anyone from the Defender for Cloud or Azure product teams can point me in the right direction, I’d truly appreciate it.&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Fri, 09 May 2025 13:34:16 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-cloud-inventory-api-coverage-no-official-way-to/m-p/4412339#M2107</guid>
      <dc:creator>JuanOJG</dc:creator>
      <dc:date>2025-05-09T13:34:16Z</dc:date>
    </item>
    <item>
      <title>Microsoft Defender for Cloud - Servers &amp; Apps Question</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/microsoft-defender-for-cloud-servers-apps-question/m-p/4411716#M2104</link>
      <description>&lt;P&gt;Hi, while learning about the Microsoft Defender for Cloud (&lt;STRONG&gt;MDC&lt;/STRONG&gt;) Cloud Workload Protection (&lt;STRONG&gt;CWP&lt;/STRONG&gt;), I have seen below points.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;STRONG&gt;Servers&lt;/STRONG&gt;&lt;/SPAN&gt;:&lt;/P&gt;&lt;P&gt;When we opt for MDC CWP for servers, I see &lt;EM&gt;&lt;STRONG&gt;Agentless scanning for machines&lt;/STRONG&gt;&amp;nbsp;&lt;/EM&gt;and along with it below,&lt;/P&gt;&lt;img /&gt;&lt;P&gt;But we already have "&lt;STRONG&gt;Carbon Black&lt;/STRONG&gt;" which handles the above role of Guest Configuration agent.&lt;/P&gt;&lt;P&gt;So, my question is, If I enroll for MDC - Cloud workload protection:&amp;nbsp;&lt;/P&gt;&lt;P&gt;As we need to have a security/defender tool installed on Azure machines (In this case Guest Configuration agent). Would this then replace "Carbon Black" as we already, have it?&amp;nbsp; Or do we see this MDC - Cloud workload protection for Servers as additional apart from Carbon Black?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Apps:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;We have our Azure Apps protected by Cloudflare and VNet Integration which are with our firewall-based routes, do we still need to enroll for App Service protection by MDC CWP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please advise on above 2 areas. Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 07 May 2025 21:39:05 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/microsoft-defender-for-cloud-servers-apps-question/m-p/4411716#M2104</guid>
      <dc:creator>VijayGanji</dc:creator>
      <dc:date>2025-05-07T21:39:05Z</dc:date>
    </item>
    <item>
      <title>Unable to resolve - A vulnerability assessment solution should be enabled on your virtual machines</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/unable-to-resolve-a-vulnerability-assessment-solution-should-be/m-p/4410140#M2100</link>
      <description>&lt;P&gt;We currently have a mix of approximately 45 Windows / Linux Servers and AVD machines which are not successfully being marked as compliant with the Defender recommendation "A vulnerability assessment solution should be enabled on your virtual machines".&lt;BR /&gt;&lt;BR /&gt;On the subscription level we have Defender for Servers Plan 2 enabled and Agentless Scanning CSPM enabled. Within a subscription some of the of these VMs are compliant and others are not. Their compliance state doesn't appear to have any relevance to if the Qualys or MDE extensions are installed. We have servers that are healthy that have Qualys, MDE, or none installed and are healthy.&lt;/P&gt;&lt;P&gt;Our VMs are not using the full feature set of Defender Plan 2 as we use CrowdStrike so the Defender for Endpoint functionality of the Defender for Servers Plan 2 has been disabled, but to my knowledge this shouldn't impact Vulnerability assessments.&lt;/P&gt;&lt;P&gt;In Security Portal it does seem that generally all the VMs that healthy for this recommendation are visible in the devices section. Whereas these 45 that are not, are either not searchable or have sensor health state "inactive".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have an Azure Policy generated to onboard devices to Vulnerability assessment using MDE.Tvm and it seems to be generally working but not for these 45 devices.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The Microsoft Documentation is really unclear, what do we need to make these systems compliant?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 May 2025 17:09:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/unable-to-resolve-a-vulnerability-assessment-solution-should-be/m-p/4410140#M2100</guid>
      <dc:creator>sof_brad</dc:creator>
      <dc:date>2025-05-01T17:09:14Z</dc:date>
    </item>
    <item>
      <title>How are you presenting CSPM and CNAPP insights to your executive leadership?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/how-are-you-presenting-cspm-and-cnapp-insights-to-your-executive/m-p/4406362#M2099</link>
      <description>&lt;P data-start="250" data-end="262"&gt;Hi everyone,&lt;/P&gt;
&lt;P data-start="264" data-end="495"&gt;I'm a Cloud Security Specialist at Microsoft, working closely with Microsoft Defender for Cloud, and I wanted to start a conversation with the community — partly out of curiosity, but also to learn from your real-world experiences.&lt;/P&gt;
&lt;P data-start="497" data-end="715"&gt;When it comes to reporting cloud security posture to your executive leadership (CISO, CTO, or broader security/tech leadership), how are you presenting insights from &lt;STRONG data-start="663" data-end="671"&gt;CSPM&lt;/STRONG&gt;, &lt;STRONG data-start="673" data-end="682"&gt;CNAPP&lt;/STRONG&gt;, or &lt;STRONG data-start="687" data-end="714"&gt;Defender for Containers&lt;/STRONG&gt;?&lt;/P&gt;
&lt;P data-start="717" data-end="771"&gt;Specifically, how do you communicate findings such as:&lt;/P&gt;
&lt;UL data-start="772" data-end="861"&gt;
&lt;LI data-start="772" data-end="793"&gt;Misconfigurations&lt;/LI&gt;
&lt;LI data-start="794" data-end="813"&gt;Vulnerabilities&lt;/LI&gt;
&lt;LI data-start="814" data-end="861"&gt;Risk exposure across your cloud environments?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="863" data-end="877"&gt;Are you using:&lt;/P&gt;
&lt;UL data-start="878" data-end="1099"&gt;
&lt;LI data-start="878" data-end="943"&gt;&lt;STRONG data-start="880" data-end="903"&gt;Power BI dashboards&lt;/STRONG&gt; to centralize and visualize the data?&lt;/LI&gt;
&lt;LI data-start="944" data-end="973"&gt;Manual &lt;STRONG data-start="953" data-end="970"&gt;Excel reports&lt;/STRONG&gt;?&lt;/LI&gt;
&lt;LI data-start="974" data-end="1019"&gt;The &lt;STRONG data-start="980" data-end="1016"&gt;native Defender for Cloud portal&lt;/STRONG&gt;?&lt;/LI&gt;
&lt;LI data-start="1020" data-end="1099"&gt;Or even exploring &lt;STRONG data-start="1040" data-end="1060"&gt;Microsoft Fabric&lt;/STRONG&gt; for more advanced reporting scenarios?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="1101" data-end="1271"&gt;I’d love to hear how you’re turning technical insights into executive-level narratives. Do you follow a particular structure, reporting cadence, or set of best practices?&lt;/P&gt;
&lt;P data-start="1273" data-end="1441"&gt;Looking forward to hearing how others in the community are approaching this challenge — and how you're bridging the gap between cloud security and business strategy.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2025 23:12:27 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/how-are-you-presenting-cspm-and-cnapp-insights-to-your-executive/m-p/4406362#M2099</guid>
      <dc:creator>PauloNicolas</dc:creator>
      <dc:date>2025-04-21T23:12:27Z</dc:date>
    </item>
    <item>
      <title>Defender for Servers</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-servers/m-p/4405792#M2098</link>
      <description>&lt;P&gt;Defender for servers is part of Defender for Cloud CWP. We do not use this product, however we have interest in logging Servers both on-premise and multi cloud tenants to Sentinel workspace.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Couple of ways to accomplish:&lt;/P&gt;&lt;P&gt;Defender for Servers in passive - Since we're currently not subscribed can we get data in with ARC + AMA + Defender extension across multi cloud tenant? Objective is to NOT pay for Defender for Servers p1/p2 instead log Events for detections&lt;/P&gt;&lt;P&gt;Azure Monitor Agent and Data Collection Rule with logging level (Common, Minimal, Custom)&lt;/P&gt;&lt;P&gt;I've ideas on both but I'm leaning towards Defender for Servers in passive with Defender Extension and AMA. Will this automatically get charge as part of Defender for Server CWP or it flat out won't work if not enabled?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can't get straight answer on this from anyone and I don't have full blown tenant owner permission to test this. When asked there is wait time to get response from other teams.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm interested getting data in via Defender in Passive relying and relaying partner as Defender Extension and ARC+AMA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know your thoughts!&lt;/P&gt;</description>
      <pubDate>Fri, 18 Apr 2025 18:55:26 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-servers/m-p/4405792#M2098</guid>
      <dc:creator>logger2115</dc:creator>
      <dc:date>2025-04-18T18:55:26Z</dc:date>
    </item>
    <item>
      <title>DevOps Security: MDC-ADO integration through Service account</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/devops-security-mdc-ado-integration-through-service-account/m-p/4403992#M2097</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;Is it possible to integrate MDC-ADO Integration with Service Account?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-olk-copy-source="MessageBody"&gt;When I attempted to authorize ADO in MDC during the integration process, it appears to only accept individual accounts. Does anyone have insights on how to utilize a Service Account for this integration?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Apr 2025 10:23:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/devops-security-mdc-ado-integration-through-service-account/m-p/4403992#M2097</guid>
      <dc:creator>Mazhar2017</dc:creator>
      <dc:date>2025-04-14T10:23:58Z</dc:date>
    </item>
    <item>
      <title>Cost Calculator for Defender for Cloud (Public Preview)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/cost-calculator-for-defender-for-cloud-public-preview/m-p/4395051#M2096</link>
      <description>&lt;P&gt;Did you know Microsoft Defender for Cloud has a built-in cost calculator to easily calculate the costs of protected resources in your cloud environment? No? Well, I didn’t either until I stumbled upon the button in the MDC portal myself. Apparently, Microsoft announced the preview for the MDC cost calculator last month, on February 19, 2025.&lt;/P&gt;&lt;P&gt;With this post, I’m sharing my experience with this new cost calculator for Microsoft Defender for Cloud, providing guidance and comparing available options to calculate the costs.&lt;BR /&gt;&lt;BR /&gt;&lt;A class="lia-external-url" href="https://myronhelgering.com/cost-calculator-for-defender-for-cloud/" target="_blank"&gt;https://myronhelgering.com/cost-calculator-for-defender-for-cloud/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2025 20:18:21 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/cost-calculator-for-defender-for-cloud-public-preview/m-p/4395051#M2096</guid>
      <dc:creator>MyronHelgering</dc:creator>
      <dc:date>2025-03-19T20:18:21Z</dc:date>
    </item>
  </channel>
</rss>

