Security Center

Official Documentation

Service Description

Security Center helps you prevent, detect, and respond to threats with increased visibility into and control over the security of your Azure resources. It provides integrated security monitoring and policy management across your Azure subscriptions, helps detect threats that might otherwise go unnoticed, and works with a broad ecosystem of security solutions.

Getting Started

  1. Azure208x - Azure Security and Compliance
    5/31/2017, Mva



Latest Content

Subscribe to News about Security Center

Title  
Video
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
more...


Azure Documentation

1. Overview
     1.1. What is Azure Security Center?
     1.2. Data security
     1.3. Scenarios
          1.3.1. Incident response
          1.3.2. Use recommendations to enhance security
     1.4. Platform migration
          1.4.1. Platform migration FAQ
2. Get started
     2.1. Quick start
     2.2. Planning and operations
     2.3. Permissions
     2.4. Supported platforms
     2.5. FAQ
3. How to
     3.1. Security policy
          3.1.1. Data collection
          3.1.2. Security policy
          3.1.3. Security policy using Azure policy
          3.1.4. Email notifications
          3.1.5. Pricing tier
     3.2. Onboarding
     3.3. Events
     3.4. Search
     3.5. Prevent
          3.5.1. Security solutions
               3.5.1.1. Monitor connected solutions
               3.5.1.2. Connect Microsoft ATA
               3.5.1.3. Connect Azure AD Identity Protection
          3.5.2. Implement security recommendations
          3.5.3. Application recommendations
               3.5.3.1. Add a web application firewall
               3.5.3.2. Finalize application protection
          3.5.4. Network recommendations
               3.5.4.1. Add a next generation firewall
               3.5.4.2. Enable Network Security Groups
               3.5.4.3. Restrict access through Internet-facing endpoints
               3.5.4.4. Route traffic through NGFW only
          3.5.5. SQL service recommendations
               3.5.5.1. Enable auditing and threat detection on SQL databases
               3.5.5.2. Enable auditing and threat detection on SQL servers
               3.5.5.3. Enable Transparent Data Encryption
          3.5.6. Virtual machine recommendations
               3.5.6.1. Apply disk encryption
               3.5.6.2. Apply system updates
               3.5.6.3. Enable encryption for storage account
               3.5.6.4. Enable VM Agent
               3.5.6.5. Install Endpoint Protection
               3.5.6.6. Reboot after system updates
               3.5.6.7. Remediate OS vulnerabilities
               3.5.6.8. Update OS version
               3.5.6.9. Vulnerability assessment not installed
          3.5.7. Monitor security health
          3.5.8. Identity and Access
     3.6. Detect and Respond
          3.6.1. Detection capabilities
          3.6.2. Manage security alerts
          3.6.3. Types of security alerts
          3.6.4. Alert validation
          3.6.5. Manage security incidents
          3.6.6. Azure log integration
          3.6.7. Threat intelligence map
          3.6.8. Threat intelligence report
          3.6.9. Custom alerts
          3.6.10. Investigation
     3.7. Cloud defenses
          3.7.1. Just in time access
          3.7.2. Adaptive application controls
     3.8. Automation and Orchestration
          3.8.1. Playbooks
     3.9. Troubleshoot
          3.9.1. Troubleshooting guide
4. Reference
     4.1. REST
5. Related
     5.1. Azure Security
6. Resources
     6.1. Azure Roadmap
     6.2. Azure Security, Privacy, & Compliance blog
     6.3. Pricing calculator
     6.4. Service overview
     6.5. Service updates
     6.6. Videos

Online Training Content

Date Title
5/31/2017 Azure208x - Azure Security and Compliance
8/18/2016 Introduction to Azure Security Center

Tools

Tool Description
Free Tier Solution Based Billing Tracker This OMS Tracker Dashboard helps detect Security & Audit Solution related activities happening in the Azure Activity Log in an OMS workspace post 2017-06-19, and verifies if Solution Based Billing has been enabled for the Security & Audit Solution in that Free Tier OMS Workspace.

Videos

Date Title Length
11/21/2017 Cybersecurity Reference Architecture & Strategies: How to Plan for and Implement a Cybersecurity Strategy Cybersecurity Reference Architecture & Strategies: How to Plan for and Implement a Cybersecurity Strategy 0:33:49
11/3/2017 Azure Security Center Overview Azure Security Center Overview 0:40:00
10/27/2017 Azure Government Security Azure Government Security 0:09:03
10/26/2017 Azure Government Security Azure Government Security 0:09:02
10/13/2017 Azure Security Center Hybrid - Overview Azure Security Center Hybrid - Overview 0:04:27
10/10/2017 Managing enterprise applications, permissions, and consent in Azure Active Directory | THR2071 Managing enterprise applications, permissions, and consent in Azure Active Directory | THR2071 0:37:11
10/5/2017 Security and identity in ASP.NET Core | BRK3283 Security and identity in ASP.NET Core | BRK3283 1:12:55
10/5/2017 Enterprise-grade security for your cloud apps with Microsoft Cloud App Security | THR2197R Enterprise-grade security for your cloud apps with Microsoft Cloud App Security | THR2197R 0:17:00
10/5/2017 Defense against the dark (cloud) arts: Azure security deep dive (Repeat) | BRK3210R Defense against the dark (cloud) arts: Azure security deep dive (Repeat) | BRK3210R 1:18:04
10/5/2017 Secure Exchange on-premises as well as Microsoft secures Exchange Online | BRK3263 Secure Exchange on-premises as well as Microsoft secures Exchange Online | BRK3263 1:14:11

Page 1 of 13