Recent Blog ArticlesNewest TopicsMost LikesTagged:TagAutomated Remediation for Malware Detection - Defender for Storage Today, Defender for Storage released, in public preview for Commercial Cloud, the feature Automated Remediation for Malware Detection. This is for both On-upload and On-demand malware scanning. The f...Defender for Storage: Malware Scan Error Message Update Starting August 2025, Defender for Storage will update the format of error messages returned by malware scanning. The new messages will retain the SAM2592XX: codes, but use clearer, standardized word...New feature in Defender for Storage: Optional Index Tags If you’re using Microsoft Defender for Storage to protect your blobs from malware, you probably know that scan results are automatically written to blob index tags. These tags are helpful for queryin...Microsoft Defender for Cloud PoC Series – Microsoft Defender for Key Vault [Post updated on 06/27/2024] by Fernanda Vela Introduction This Microsoft Defender for Cloud PoC Series provides guidelines on how to perform a proof of concept for a specific Microsoft D...Microsoft Defender for Storage – Price Estimation Dashboard Blog post updated on April 17th, 2024. Blog post updated in September 2025 Estimate the cost of Microsoft Defender for Storage Microsoft Defender for Storage is an Azure-native layer of sec...Security Control: Apply System Updates As part of our recent Microsoft Defender for Cloud Blog Series, we are diving into the different controls within Secure Score. In this post we will be discussing the security control Apply System Up...Security Control: Enable audit and logging As part of our recent Microsoft Defender for Cloud Blog Series, we are diving into the different controls within Secure Score. In this post we will be discussing the control of Enable audit and logg...Secure Score by Groups Workbook Secure Score by Groups Workbook Scenario The Azure Resource Graph security baseline for Microsoft Defender for Cloud and the power of Azure Monitor bring you infinite possibilities to custom ...Security Control: Restrict Unauthorized Network Access As part of our recent Microsoft Defender for Cloud Blog Series, we are diving into the different controls within ASC’s Secure Score. In this post we will be discussing the control of “Restrict Unauth...Microsoft Defender for Cloud Data Flow