Connect with experts and redefine what’s possible at work – join us at the Microsoft 365 Community Conference May 6-8. Learn more >
Recent Blog ArticlesMost RecentMost LikesMicrosoft Defender for Cloud PoC Series – Microsoft Defender for Key Vault [Post updated on 06/27/2024] by Fernanda Vela Introduction This Microsoft Defender for Cloud PoC Series provides guidelines on how to perform a proof of concept for a specific Microsoft D...Microsoft Defender for Storage – Price Estimation Dashboard Blog post updated on April 17th, 2024. Estimate the cost of Microsoft Defender for Storage Microsoft Defender for Storage is an Azure-native layer of security intelligence that detects potent...Microsoft Defender for Cloud Data Flow Re: Microsoft Defender for Cloud Data Flow Dean_Gross I changed the connections to GCP and AWS, added the K8s on prem, and the on prem server one. Security Control: Apply System Updates As part of our recent Microsoft Defender for Cloud Blog Series, we are diving into the different controls within Secure Score. In this post we will be discussing the security control Apply System Up...Security Control: Enable audit and logging As part of our recent Microsoft Defender for Cloud Blog Series, we are diving into the different controls within Secure Score. In this post we will be discussing the control of Enable audit and logg...Secure Score by Groups Workbook Secure Score by Groups Workbook Scenario The Azure Resource Graph security baseline for Microsoft Defender for Cloud and the power of Azure Monitor bring you infinite possibilities to custom ...Security Control: Restrict Unauthorized Network Access As part of our recent Microsoft Defender for Cloud Blog Series, we are diving into the different controls within ASC’s Secure Score. In this post we will be discussing the control of “Restrict Unauth...Re: Azure Security Center Data Flow chfrei Thank you so much for the awareness. I just updated it since the Log Analytics Agent (LA agent) firewall requirements changed and can be viewed here.