Describe Microsoft Defender for Cloud

Completed

To address the unique security challenges that a hybrid environment presents, such as rapidly changing services, sophisticated attacks, and increased workload, Contoso IT staff need tools to help assess their security posture and identify risks. Ideally, they want to deploy those tools with minimal effort. Microsoft Defender for Cloud can help them meet all these requirements.

What is Microsoft Defender for Cloud

Microsoft Defender for Cloud is a cloud-based tool for managing the security of your cloud and on-premises infrastructure. With Microsoft Defender for Cloud capabilities, you can:

  • Improve your security position. Use Microsoft Defender for Cloud to implement security best practices across your IaaS, platform as a service (PaaS), data, and on-premises resources. In addition to security best practices, you can also track compliance against regulatory standards.
  • Protect your environment. Monitor for security threats to your cloud and on-premises servers, including identifying misconfigurations and providing server Endpoint Detection and Response (EDR) with Microsoft Defender for Endpoint.
  • Protect your data. Identify suspicious activity such as potential data breaches within your servers, files, databases, data warehouses, and storage accounts. Microsoft Defender for Cloud can also perform automatic data classification in your Azure SQL databases.

How Microsoft Defender for Cloud works in hybrid environments

In addition to Microsoft Defender for Cloud capabilities for monitoring and protecting Azure IaaS, PaaS, and data resources, Microsoft Defender for Cloud also helps protect servers outside of Azure. From the Azure portal, you can install the Log Analytics agent on your on-premises Windows Server and Linux server VMs and non–Azure cloud VMs. The agent then collects the data that Microsoft Defender for Cloud needs for monitoring and managing those resources.

Microsoft Defender for Cloud collects event log events and Event Tracing for Windows events from the agents. It then scans security-related configurations, and native events in Azure. The Log Analytics agent also collects crash dumps when applications fail, and it enables command-line auditing. It analyzes these data sources and generates a custom list of hardening tasks that it recommends you perform, and it generates security alerts that can be sent to your SIEM solution.

Note

In addition to the Log Analytics agent, the Microsoft Defender for Endpoint sensor is automatically enabled on Windows Server computers that are onboarded to Microsoft Defender for Cloud.

Notifications

One of the first things to do when onboarding to Microsoft Defender for Cloud is to provide contact information so Microsoft Defender for Cloud can notify you when it detects compromised resources. In Microsoft Defender for Cloud, select Email notifications on the Pricing & settings page and then provide an email address and phone number. Choose whether to get alerts for high-severity events and if all users with an Owner role in the subscription should receive notifications.

Microsoft Defender for Cloud feature coverage for VMs

Microsoft Defender for Cloud provides a wide variety of features, some of which are available for Azure VMs and PaaS services as part of the Free service tier, and some are available only as part of the Standard tier.

Note

Only some features apply to on-premises servers and VMs, and those that do apply require the Standard tier.

Some common Microsoft Defender for Cloud features include:

  • Microsoft Intune Endpoint Protection assessment
  • Missing operating system patches assessment
  • Security misconfigurations assessment
  • Disk encryption assessment
  • Network security assessment
  • Third-party vulnerability assessment
  • VM behavioral analytics and security alerts
  • Adaptive application controls
  • File integrity monitoring
  • Fileless security alerts
  • Defender for Endpoint
  • Regulatory compliance dashboard and reports
  • Adaptive network controls
  • Adaptive network hardening
  • Just-in-time (JIT) VM access
  • Native vulnerability assessment
  • Network map
  • Network-based security alerts

You can find out which Microsoft Defender for Cloud features are included with which pricing tier, and learn more about what they do by reviewing Feature coverage for machines.