#defenderforcloud

2024-07-16

Protect your Azure virtual machines from malware and other security threats with Microsoft Defender for Cloud, which provides endpoint protection and threat detection capabilities. #DefenderForCloud #EndpointProtection

2024-05-30

Monitor and protect your Azure SQL databases with Azure SQL Database Threat Detection, which identifies and alerts you to suspicious activities and potential security vulnerabilities. #AzureSQL #ThreatDetection #DefenderForCloud

2024-03-07

Implement multi-layered defenses in Defender For Cloud to safeguard your cloud infrastructure against evolving cyber threats and unauthorized access attempts. #DefenderForCloud #CyberDefense

2024-02-22

Leverage Defender for Cloud to automatically detect and respond to security threats across your Azure resources, ensuring continuous protection for your cloud workloads. #DefenderForCloud #AzureSecurity

2024-01-08

๐ˆ๐ง๐ญ๐ซ๐จ๐๐ฎ๐œ๐ข๐ง๐  ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐Ÿ๐จ๐ซ ๐‚๐ฅ๐จ๐ฎ๐ ๐‹๐š๐›๐ฌ

Our labs project help you get ramped up with Microsoft Defender for Cloud and provide hands-on practical experience for product features, capabilities, and scenarios. The labs are divided into 3 main tracks, a beginner (level 100/200) and an advanced (level 300+) track. The labs contain several modules cover different pillars such as Cloud Security Posture Management (CSPM) to Cloud Workload Protection (CWP). To start using our labs, you will need to create Azure Trial Subscription which provides you all capabilities for 30 days โ€“ so you have to finish this lab at this point to take advantage of the free trial.

github.com/Azure/Microsoft-Def

#defender #defenderforcloud #cnapp #cspm #cwp #cwpp #cloudsecurity #multicloud #azure #aws #gcp #microsoft #microsoftsecurity #soc #server #container #storage #dns #api #devops #database #api #github #arc #agentless #storageaccount #mde #vulnerability #mdvm #siem

Dimitar Grozdanovgrozdanovd@masto.ai
2023-12-11

I just completed "Secure #Azure services and workloads with Microsoft #DefenderForCloud regulatory compliance controls" #MicrosoftLearn #AppliedSkills assessment. #SecOps #NeverStopLearning #CloudSkills

learn.microsoft.com/en-us/user

kurtshkurtsh
2023-12-09

Security Tech Accelerator - On-demand Recordings mow available!

The Security, Compliance, and Identity Tech Community hosted a virtual "Tech Accelerator", an event consisting of over 12 deep dives & live AMAs for you to engage with Microsoft Product Experts and ask questions.

Event | Microsoft Security Tech Accelerator - December 6, 2023
techcommunity.microsoft.com/t5

2023-12-08

๐๐ž๐ฐ ๐ฎ๐ฌ๐ž ๐œ๐š๐ฌ๐ž๐ฌ ๐Ÿ๐จ๐ซ ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐‚๐จ๐ฉ๐ข๐ฅ๐จ๐ญ

๐Ÿ“ฃ The new use cases for Security Copilot now extend beyond investigations in your security operations center to support various security necessities for organizations seeking to strengthen their security against cyberthreats.

โžกDevice management

โžกIdentity management

โžกData security

โžกCloud security

โžกExternal attack surface management

๐Ÿ“ฃSecurity Copilot is expanding into embedded experiences across various Microsoft Security solutions!

microsoft.com/en-us/security/b

#copilot #security #securitycopilot #llm #ai #genai #openai #microsoft #microsoftsecurity #cybersecurity #intune #purview #entraid #soc #xdr #siem #soar #cloud #cloudnative #cloudsecurity #sentinel #microsoftsentinel #cnapp #defenderforcloud #defender #easm #threatintelligence

2023-12-07

๐๐ž๐ฐ ๐ฎ๐ฌ๐ž ๐œ๐š๐ฌ๐ž๐ฌ ๐Ÿ๐จ๐ซ ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐‚๐จ๐ฉ๐ข๐ฅ๐จ๐ญ

๐Ÿ“ฃ The new use cases for Security Copilot now extend beyond investigations in your security operations center to support various security necessities for organizations seeking to strengthen their security against cyberthreats.

โžกDevice management

โžกIdentity management

โžกData security

โžกCloud security

โžกExternal attack surface management

๐Ÿ“ฃSecurity Copilot is expanding into embedded experiences across various Microsoft Security solutions!

microsoft.com/en-us/security/b

#copilot #security #securitycopilot #llm #ai #genai #openai #microsoft #microsoftsecurity #cybersecurity #intune #purview #entraid #soc #xdr #siem #soar #cloud #cloudnative #cloudsecurity #sentinel #microsoftsentinel #cnapp #defenderforcloud #defender #easm #threatintelligence

2023-11-16

๐—”๐—ป๐—ป๐—ผ๐˜‚๐—ป๐—ฐ๐—ถ๐—ป๐—ด ๐—ป๐—ฒ๐˜„ ๐—–๐—ก๐—”๐—ฃ๐—ฃ ๐—ฐ๐—ฎ๐—ฝ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐—ถ๐—ฒ๐˜€ ๐—ถ๐—ป ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ ๐—ณ๐—ผ๐—ฟ ๐—–๐—น๐—ผ๐˜‚๐—ฑ

At Ignite 2023, we are excited to announce new innovations in Microsoft Defender for Cloud that will help security admins strengthen their CNAPP deployment, improve the cloud security posture through additional code to cloud insights, and protect cloud-native applications across multicloud environments in a unified solution:

โžก Unified insights from Microsoft Entra Permissions Management (CIEM) to enable comprehensive risk mitigation

โžกEnhanced attack path analysis engine to swiftly pinpoint critical risks across clouds

โžกAccelerated critical risk remediation with Microsoft Security Copilot integration

โžกIntegrated security across multiple DevOps platforms

Extended protection for cloud workloads

โžกImproved API Security Posture

โžกGo beyond workload protection โ€“ detect and respond to threats across the enterprise in a unified platform

More details:

techcommunity.microsoft.com/t5

#cnapp #devops #api #protection #ciem #cwp #cspm #defender #defenderforcloud #azure #gcp #aws #cloud #cloudnative #cloudprotection #cloudsecurity #multicloud #microsoft #microsoftsecurity #soc #ignite #microsoftignite #permissionmanagement #ai #mitre #copilot #securitycopilot #vulnerability

2023-10-10

๐—ฃ๐—ฟ๐—ฒ๐—ฑ๐—ถ๐—ฐ๐˜ ๐—ณ๐˜‚๐˜๐˜‚๐—ฟ๐—ฒ ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐˜€! ๐—–๐—น๐—ผ๐˜‚๐—ฑ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฃ๐—ผ๐˜€๐˜๐˜‚๐—ฟ๐—ฒ ๐— ๐—ฎ๐—ป๐—ฎ๐—ด๐—ฒ๐—บ๐—ฒ๐—ป๐˜ ๐˜„๐—ถ๐˜๐—ต ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ

Advanced cloud security protection goes beyond general security recommendations and provides predictive and future-facing defense, so users can prioritize security based on connected risks, visualize potential attack paths, and identify vulnerabilities and misconfigurations that attackers might exploit. Recommendations are ranked based on severity and potential impact, so users can focus on the most critical issues first.

techcommunity.microsoft.com/t5

#defendercspm #cspm #posturemanagement #defenderforcloud #cnapp #defender #microsoft #azure #cloud #multicloud #soc #cybersecurity #xdr

2023-10-04

๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ถ๐—ป๐—ด ๐—ป๐—ฒ๐˜„ ๐˜ƒ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€: ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—ฎ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€ ๐—ฎ๐˜๐˜๐—ฒ๐—บ๐—ฝ๐˜ ๐—ฆ๐—ค๐—Ÿ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ ๐˜๐—ผ ๐—ฐ๐—น๐—ผ๐˜‚๐—ฑ ๐—น๐—ฎ๐˜๐—ฒ๐—ฟ๐—ฎ๐—น ๐—บ๐—ผ๐˜ƒ๐—ฒ๐—บ๐—ฒ๐—ป๐˜

Nice write-up by Microsoft security researchers about new campaign where attackers attempted to move laterally to a cloud environment through a SQL Server instance.

Attackers are now attempting to move laterally into cloud environments via SQL Server instancesโ€”a method previously seen in VMs and Kubernetes clusters but not in SQL Server.

microsoft.com/en-us/security/b

#microsoft #microsoftsecurity #securityresearch #azure #SQL #cloudlateralmovement #lateralmovement #cloudsecurity #cloudnative #cybersecurity #soc #defenderforcloud #defenderforendpoint #mde #xdr #edr #defenderforsql #soc

2023-09-27

๐๐ž๐ฐ ๐ž๐ฑ๐ฉ๐š๐ง๐๐ž๐ ๐ฏ๐ข๐ฌ๐ข๐›๐ข๐ฅ๐ข๐ญ๐ฒ ๐ข๐ง๐ญ๐จ ๐ฆ๐ฎ๐ฅ๐ญ๐ข๐œ๐ฅ๐จ๐ฎ๐ ๐๐š๐ญ๐š ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ข๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐Ÿ๐จ๐ซ ๐‚๐ฅ๐จ๐ฎ๐

The data security dashboard provides a centralized, complete and current view of the state of your cloud data estate.

The data security dashboard helps you to:

โžก Discover your complete multicloud data estate across managed and hosted data resources

โžกUnderstand your Defender for Cloud protection coverage and gaps across data resources

โžกGain insight on which protected data resources contain sensitive data and the types of sensitive information they contain

โžกUse built-in data query templates to speed up cloud security explorer results

โžกFocus on sensitive data resources that require attention as a result of active threats or potential risks to your sensitive data

โžกView changing trends of resources with sensitive data that require attention to analyze improvement of data security posture over time

techcommunity.microsoft.com/t5

#microft #azure #defender #defenderforcloud #cnapp #aws #gcp #data #datasecurity #cloud #cloudsecurity #soc #cspm #posturemanagement

2023-08-24

๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐Ÿ๐จ๐ซ ๐€๐๐ˆ๐ฌ ๐๐ž๐ญ๐ญ๐ž๐ซ ๐“๐จ๐ ๐ž๐ญ๐ก๐ž๐ซ ๐ฐ๐ข๐ญ๐ก ๐€๐ณ๐ฎ๐ซ๐ž ๐–๐ž๐› ๐€๐ฉ๐ฉ๐ฅ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐…๐ข๐ซ๐ž๐ฐ๐š๐ฅ๐ฅ ๐š๐ง๐ ๐€๐ณ๐ฎ๐ซ๐ž ๐€๐๐ˆ ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ

The synergy of Microsoft Defender for APIs, Azure WAF, and Azure API Management forms a strong defense against API threats.

techcommunity.microsoft.com/t5

โœ”๏ธThe WAF on Application Gateway checks the request against WAF rules. If the request is valid, then it will proceed.

โœ”๏ธApplication Gateway directs the request to APIM.

โœ”๏ธAPIM accepts and properly maps the requests.

โœ”๏ธDefender for APIs inspects API endpoints and gives insight on whether the API is properly authenticated, inactive, and externally facing.

โœ”๏ธDefender for APIs monitors the traffic going to and from APIM to classify sensitive data and alert on exploits and anomalies.

๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐Ÿ๐จ๐ซ ๐€๐๐ˆ๐ฌ

Defender for APIs provides visibility into crucial APIs. It facilitates a deep dive into your API security, allowing prioritization of vulnerabilities and quick detection of active threats. Key features include a consolidated view of managed APIs with security insights on external, inactive, or unauthenticated APIs, data classifications of sensitive data in API interactions, and machine learning-driven detection of API threats in alignment with the OWASP API Top 10.

๐€๐ณ๐ฎ๐ซ๐ž ๐€๐๐ˆ ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ

Azure API Management caters to the entire API lifecycle. APIM includes an API gateway, management platform, and developer portal. The gateway manages requests, ensures authentication, transforms requests and responses, caches responses, enforces usage caps, emits logs, and more.

๐€๐ณ๐ฎ๐ซ๐ž ๐–๐ž๐› ๐€๐ฉ๐ฉ๐ฅ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐…๐ข๐ซ๐ž๐ฐ๐š๐ฅ๐ฅ

Azure WAF provides a centralized defense against web and API vulnerabilities like SQL injections and cross-site scripting attacks. With its rapid virtual patching, Azure WAF offers quick threat mitigation without needing to individually secure every web application.

#microsoft #azure #azurewaf #waf #api #defenderapi #sqlinjection #apim #apimanagement #defenderforapi #defenderforcloud #defender #cloud #cloudsecurity #cloudnative #soc #owasp #apithreats #cybersecurity

2023-08-20

In the realm of cybersecurity, preventing attackers' entry through misconfigurations is paramount. Cloud misconfigurations, particularly in AWS environments, can open doors to vulnerabilities. Microsoft Defender for Cloud steps in as a proactive guardian, identifying these misconfigurations and enabling swift remediation.

techcommunity.microsoft.com/t5

๐ŸŒ Why Misconfigurations Matter

Misconfigured cloud resources can expose sensitive data, grant unauthorized access, or leave unnecessary openings for exploitation. To maintain a strong security posture, proactive security management is essential.

๐Ÿ›ก๏ธ How Microsoft Defender for Cloud Helps

In this blog, I'll guide you through various scenarios of misconfigured AWS Cloud resources and showcase how Microsoft Defender for Cloud empowers security teams to identify, prevent, and remediate risks.

๐Ÿš€ Getting Started with Proactive Security

To begin safeguarding your AWS resources, set up the connection between your AWS account and Microsoft Defender for Cloud. The cloud security graph, attack path analysis, and the cloud security explorer are invaluable tools for contextual security assessment.

๐Ÿ” Scenario 1: Sensitive Data Exposure

Imagine Contoso Bank, using Amazon S3 to store sensitive information. Mistakenly replicating data to a public S3 bucket opens avenues for data exposure. Microsoft Defender CSPM's attack path analysis uncovers this misconfiguration, providing insights and remediation steps.

๐Ÿ” Scenario 2: Over-Permissioning via IAM Roles

Datum Corporation's IT Admins manage AWS EC2 instances and want automated backups. Misconfigured IAM roles can lead to over-permissioning, exposing the instance to more access than necessary. Defender CSPM's attack path capability highlights vulnerabilities, effective permissions, and potential risks.

๐Ÿ” Scenario 3: Compromising KMS Keys

Fabrikam Inc secures sensitive data on Amazon EC2 instances through a KMS key. However, a high-severity vulnerability on the instance poses a risk of unauthorized access to the KMS. Defender CSPM's attack path analysis identifies potential credential theft and suggests remediation steps.

๐Ÿ“š Continuous Monitoring and Stay Ahead

The battle against misconfigurations isn't a one-time effort. Incorporating attack path analysis into your security strategy empowers teams to monitor and address new misconfigurations introduced during environment changes.

Enhance your AWS security with Microsoft Defender for Cloud. Stay ahead of potential misconfigurations, safeguard sensitive data, and bolster your cloud security strategy.

#CloudSecurity #AWSProtection #MicrosoftDefender #ProactiveSecurity #CyberDefense #microsoft #cnapp #defenderforcloud #aws #azure #multicloud #cspm #bucket #cloud #cloudsecurity #cloudnative #soc #xdr

2023-08-20

๐Ÿ”’ ๐„๐ฆ๐›๐ซ๐š๐œ๐ข๐ง๐  ๐Œ๐ฎ๐ฅ๐ญ๐ข๐œ๐ฅ๐จ๐ฎ๐ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ: ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐Ÿ๐จ๐ซ ๐‚๐ฅ๐จ๐ฎ๐'๐ฌ ๐๐ž๐ฐ ๐ˆ๐ง๐ง๐จ๐ฏ๐š๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ”’

Find out recent news about Microsoft CNAPP platform.

๐Ÿ›ก๏ธ Enhanced Multicloud Posture Management for GCP ๐Ÿ›ก๏ธ

Microsoft Defender for Cloud has unveiled advanced posture management capabilities for Google Cloud Platform (GCP). Cloud Security Graph and Attack Path Analysis now support GCP resources. This empowers organizations to identify, prioritize, and address critical risks within their multicloud environment. Key features include attack path analysis, cloud security exploration, agentless scanning, and data-aware security posture.

๐ŸŒ Microsoft Cloud Security Benchmark Expands to GCP ๐ŸŒ

Microsoft Cloud Security Benchmark (MCSB) now includes Google Cloud Platform in its support, aligning with Azure and AWS. With over 120 built-in GCP-specific assessments, MCSB provides industry-best practices for GCP resource monitoring, enabling optimized cloud security across major providers.

๐Ÿฆ  Malware Scanning and Container Vulnerability Management ๐Ÿ“ฆ

Defender for Cloud takes runtime cloud data security to the next level. Malware Scanning in Defender for Storage will soon provide real-time protection against malware entry and distribution in Azure Blob storage accounts. Meanwhile, Defender for Cloud integrates with Microsoft Defender Vulnerability Management to offer agentless vulnerability assessments for containers, fostering secure software supply chains with real-time scans and exploitability insights.

๐Ÿš€ Elevate Your Cloud Security with Microsoft Defender for Cloud ๐Ÿš€

From code to cloud, Microsoft Defender for Cloud empowers you to embrace a proactive and advanced approach to multicloud security. With features like enhanced posture management, expanded benchmark coverage, malware scanning, and container vulnerability assessments, staying secure in multicloud environments has never been easier.

๐Ÿ’ก Ready to enhance your multicloud security? Learn more about these innovations in Microsoft Defender for Cloud and embark on a journey of fortified cloud protection today. ๐Ÿ’ก

techcommunity.microsoft.com/t5

#cnapp #microsoft #defender #defenderforcloud #azure #aws #gcp #multicoud #cloud #cloudnative #cloudsecurity #CloudSecurityBenchmark #MCSB #va #vulnerabilitymanagement #vulnerability #edr #xdr #microsoft #soc

2023-08-07

Malware Scanning in Defender for Storage will be generally available (GA) for Azure Blob Storage on September 1, 2023

Malware Scanning in Defender for Storage helps protect your Blob storage accounts from malicious content by performing a full, built-in, agentless malware scan on uploaded content in near real time, using Microsoft Defender Antivirus capabilities. It scans all file types and allows you to detect and prevent malware distribution events.

Find out relevant use cases: techcommunity.microsoft.com/t5

#defenderforcloud #defenderforstorage #defender #malware #malwarescanning #storage #azure #blob #blobstorage #agentless #av #azure #cloudsecurity #cloudnative #antivirus

2023-07-26

Malware Scanning in Defender for Storage will be generally available (GA) for Azure Blob Storage on September 1, 2023

Malware Scanning in Defender for Storage helps protect your Blob storage accounts from malicious content by performing a full, built-in, agentless malware scan on uploaded content in near real time, using Microsoft Defender Antivirus capabilities. It scans all file types and allows you to detect and prevent malware distribution events.

Find out relevant use cases: techcommunity.microsoft.com/t5

#defenderforcloud #defenderforstorage #defender #malware #malwarescanning #storage #azure #blob #blobstorage #agentless #av #azure #cloudsecurity #cloudnative #antivirus

Gisela Torres :verified_paw:0gis0@hachyderm.io
2023-07-25

En este vรญdeo, en menos de 20 minutos โฑ๏ธ, te cuento cรณmo configurar Microsoft Defender for DevOps con Azure DevOps.

youtu.be/vQjErb1T8WU

#azuredevops #devsecops #sast #defenderforcloud #defenderfordevops

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst