Azure Security Center
10 TopicsSecuring the Clouds: Achieving a Unified Security Stance and threat-based approach to Use Cases
Uncover the complexities of obtaining full observability for your complex multiple cloud environment by adopting a proven approach based on a Threat assessment. Stay ahead of adversaries with a threat-based approach able to contrast even the most tricky vulnerabilities, including Zero Days. Dive into strategies for creating the perfect system to detect attacks and respond to them. Authored by a team of experts, this series is your guide to establishing a comprehensive security posture in a multi-cloud environment. Explore now and transform your cloud security game! :briefcase::locked:3.8KViews2likes2CommentsSecuring the Clouds: Navigating Multi-Cloud Security with Advanced SIEM Strategies
Uncover the complexities of securing multiple clouds and the pitfalls of traditional SIEM tools in our latest blog series. Dive into strategies for achieving unified security with Microsoft's solutions, and gain strategic insights into the modern AI world. Stay ahead of adversaries with a threat-based approach. Authored by a team of experts, this series is your guide to establishing a comprehensive security posture in a multi-cloud environment. Explore now and transform your cloud security game! :briefcase::locked:4.7KViews2likes0CommentsNew Blog | Enhancing Your Azure Security: Azure DDoS Sentinel Solution and WAF Playbook Integration
In today's digital landscape, the rise of complex cyber threats poses a significant challenge for businesses relying on cloud-based services. Specifically, Distributed Denial of Service (DDoS) attacks are now often being used as a diversion in multi-layer attacks. To safeguard their applications and ensure uninterrupted service availability, organizations must deploy robust security solutions. Microsoft Azure offers powerful security solutions - Azure DDoS Protection, Azure Web Application Firewall (WAF) and Microsoft Sentinel - to help you proactively defend your assets against such attacks. In this blog, we will explore how to integrate the Azure DDoS Sentinel Solution with the Azure WAF Playbook to enable a powerful automated detection and response system. By combining these two solutions, you can ensure a secure and uninterrupted experience for users, protect your services, and minimize the risk of DDoS attacks. Read the full blog: Enhancing Your Azure Security: Azure DDoS Sentinel Solution and WAF Playbook Integration - Microsoft Community Hub877Views0likes0CommentsNew Blog Post | Azure Firewall: New Monitoring and Logging Updates
Contributors: Eliran Azulai and Yuval Pery Monitoring, management, and innovation are core pillars of Azure Firewall. With this in mind, we are delighted to share the following new capabilities: Resource Health is now in public preview Embedded Firewall Workbooks is now in public preview Latency Probe Metric is now in general availability When you monitor the firewall, it’s the end-to-end experience that we continuously strive to improve. Our aim is to empower you to make informed decisions quickly and maximize your organization's security demands. Understanding the importance of having visibility into your network, this release focuses on making it easier for you to monitor, manage, and troubleshoot your firewalls more efficiently. Read the full blog here: Azure Firewall: New Monitoring and Logging Updates - Microsoft Community Hub627Views0likes0CommentsNew Blog | Taking Azure Firewall IDPS on a Test Drive
Written by Gopikrishna Kannan (Head of Products: Azure Firewall and Firewall Manager) Intrusion detection and prevention (IDPS) is an advanced threat prevention mechanism supported by the Azure Firewall Premium SKU. Unlike simple network filtering, IDPS matches traffic patterns to a set of known malicious signatures. Azure Firewall supports more than 60,000 malicious signatures which are updated in real time. These signatures apply when malicious patterns are detected under the right conditions. The conditions include traffic direction (inbound or outbound) and network scope (private network or public network). Below are examples to validate IDPS configuration in your environment. Read the full blog here: Taking Azure Firewall IDPS on a Test Drive - Microsoft Community Hub887Views0likes0CommentsBuilding a Strong Foundation: Prioritizing Developer Security at Microsoft Build 2023
Join us at Microsoft Build 2023 as we shine a spotlight on Developer Security, an imperative in today's evolving threat landscape. Engage with our experts in informative sessions and discover how Azure's industry-leading defense in depth approach and the Secure Supply Chain Consumption Framework empower developers to build resilient applications. Don't miss this opportunity to enhance your knowledge, network with industry leaders, and elevate your understanding of secure software development. Register now for Microsoft Build and be part of the conversation.3.4KViews3likes2CommentsImproving Server Vulnerability Management Efforts
Discover a new way to transform vulnerability management with Microsoft Defender for Servers, Azure Automation Services, and Azure Arc. This blog post will guide you through moving pass the traditional vulnerability management approach toward implementing an automated and streamlined process for your servers on-premises and the cloud. Seamlessly integrate various tools in a 5-step solution that will make you rethink server vulnerability management. Don't miss the opportunity to add a new weapon to your cyber security strategy that aims at removing inefficiencies.4.8KViews1like1CommentIntroducing the Azure Threat Research Matrix
When performing a security assessment, it’s common to find the assessment team attribute their actions to the MITRE ATT&CK knowledge base so that high-level stakeholders can visually see what techniques were successful and defenders can understand the techniques that were performed. However, the commonly utilized MITRE knowledge base lacks formal documentation of Azure or AzureAD-related tactics, techniques, or procedures (TTPs) that assessment teams can attribute to. Over the past year, Microsoft has worked with some of the top Azure security researchers to create the Azure Threat Research Matrix (ATRM), a matrix that provides details around the tactics & techniques a potential adversary may use to compromise an Azure Resource or Azure Active Directory.27KViews7likes6CommentsAZ-500: Microsoft Azure Security Technologies Study Guide
The AZ-500 certification provides professionals with the skills and knowledge needed to secure Azure infrastructure, services, and data. The exam covers identity and access management, data protection, platform security, and governance in Azure. Learners can prepare for the exam with Microsoft's self-paced curriculum, instructor-led course, and documentation. The certification measures the learner’s knowledge of managing, monitoring, and implementing security for resources in Azure, multi-cloud, and hybrid environments. Azure Firewall, Key Vault, and Azure Active Directory are some of the topics covered in the exam.20KViews3likes2Comments