Security Center

Official Documentation

Service Description

Security Center helps you prevent, detect, and respond to threats with increased visibility into and control over the security of your Azure resources. It provides integrated security monitoring and policy management across your Azure subscriptions, helps detect threats that might otherwise go unnoticed, and works with a broad ecosystem of security solutions.

Getting Started

  1. 5/31/2017, Mva
    Security is a top-level concern when it comes to cloud computing for organizations of all types. In this course, you will be introduced to Azure security and compliance. We...
  2. 1/18/2018, Mva
    Looking to enhance your organization’s security posture, especially these days, when threats seem to increase in volume and sophistication all the time? Azure Security Center...



Latest Content

Subscribe to News about Security Center

Title  
Blog
Video
Video
Video
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
more...


Web Content

Security Center Documentation

1. Overview
     1.1. About Security Center
     1.2. Security Center supported platforms & features
2. Quickstarts
     2.1. Azure subscriptions
     2.2. Windows computers
     2.3. Linux computers
     2.4. Security solutions
3. Tutorials
     3.1. Define security policies
     3.2. Protect your resources
     3.3. Respond to incidents
4. Concepts
     4.1. Permissions
     4.2. Data security
5. How-to guides
     5.1. Improve your secure score
     5.2. Upgrade to advanced security
     5.3. Server protection with Windows Defender ATP
     5.4. Set security policies
     5.5. Customize the information protection policy
     5.6. Security policy settings
          5.6.1. Data collection
          5.6.2. Policy definitions
          5.6.3. Email notifications
          5.6.4. Pricing tier
          5.6.5. Security configurations
          5.6.6. Tenant-wide visibility
     5.7. Implement security recommendations
     5.8. Monitor security health
          5.8.1. Compute & apps security
               5.8.1.1. VM and computer recommendations
                    5.8.1.1.1. Apply disk encryption
                    5.8.1.1.2. Apply system updates
                    5.8.1.1.3. Enable encryption for storage account
                    5.8.1.1.4. Enable VM Agent
                    5.8.1.1.5. Install Endpoint Protection
                    5.8.1.1.6. Reboot after system updates
                    5.8.1.1.7. Remediate security configurations
                    5.8.1.1.8. Update OS version
                    5.8.1.1.9. Vulnerability assessment not installed
               5.8.1.2. App recommendations
                    5.8.1.2.1. Add a web application firewall
                    5.8.1.2.2. Finalize application protection
               5.8.1.3. Container recommendations
          5.8.2. Network security
               5.8.2.1. Add a next generation firewall
               5.8.2.2. Enable Network Security Groups
               5.8.2.3. Restrict access through Internet-facing endpoints
               5.8.2.4. Route traffic through NGFW only
          5.8.3. Data & storage security
               5.8.3.1. Enable auditing and threat detection on SQL databases
               5.8.3.2. Enable auditing and threat detection on SQL servers
               5.8.3.3. Enable Transparent Data Encryption
          5.8.4. Monitor identity and access
     5.9. Apply cloud defenses
          5.9.1. Manage just in time access
          5.9.2. Adaptive application controls
          5.9.3. File integrity monitoring
     5.10. Manage security solutions
          5.10.1. Connected solutions
          5.10.2. Discovered solutions
          5.10.3. Connect external solutions
          5.10.4. Connect Application Gateway
          5.10.5. Connect Microsoft ATA
          5.10.6. Connect Azure AD Identity Protection
          5.10.7. Data export to SIEM
     5.11. Investigate threats
          5.11.1. Security alerts
          5.11.2. Security incidents
          5.11.3. Threat reports
          5.11.4. Alert types
          5.11.5. Custom alerts
          5.11.6. Alert validation
          5.11.7. Alert confidence score
          5.11.8. Security alerts map and threat intelligence
          5.11.9. Investigation
          5.11.10. Manage investigation user data
          5.11.11. UEBA for Azure resources and users
     5.12. Automate security workflows
          5.12.1. Logic Apps playbooks
          5.12.2. View events
          5.12.3. Search
          5.12.4. Review compliance (REST)
          5.12.5. Assess subscriptions (REST)
          5.12.6. Automate onboarding using PowerShell
     5.13. Scenarios
          5.13.1. Incident response
          5.13.2. Use recommendations to enhance security
     5.14. Troubleshoot
6. Reference
     6.1. REST APIs
     6.2. Service updates
7. Resources
     7.1. Build your skills with Microsoft Learn
     7.2. Manage user data
     7.3. FAQ
     7.4. Planning and operations
     7.5. Azure Security
     7.6. Azure Roadmap
     7.7. Readiness Roadmap
     7.8. Azure Security, Privacy, & Compliance blog
     7.9. Stack Overflow
     7.10. Videos
     7.11. Pricing
     7.12. Service updates
     7.13. Regional availability

Online Training Content

Date Title
1/18/2018 Hybrid Cloud Workload Protection with Azure Security Center
5/31/2017 Azure208x - Azure Security and Compliance
8/18/2016 Introduction to Azure Security Center

Tools

Tool Description
Free Tier Solution Based Billing Tracker This OMS Tracker Dashboard helps detect Security & Audit Solution related activities happening in the Azure Activity Log in an OMS workspace post 2017-06-19, and verifies if Solution Based Billing has been enabled for the Security & Audit Solution in that Free Tier OMS Workspace.

Videos

Date Title Length
10/19/2018
Practical guide for using Azure Security Center to protect hybrid cloud environment - BRK2368
0:39:31
10/19/2018
Best in class Security and Compliance with SharePoint and OneDrive - BRK2100
1:21:44
10/19/2018
Elevate the security for all your cloud apps and services with the Microsoft CASB - - BRK2158
1:12:10
10/3/2018
Microsoft Graph: The API for Microsoft 365 - BRK3322
1:15:51
10/3/2018
Security is important to SMBs too - THR1097
0:20:38
10/2/2018
CYA (covering your assets) with security and threat detection in Azure - BRK2421
1:02:12
10/2/2018
Azure Active Directory security insights with Conditional Access Identity Protection - BRK3401
0:38:28
10/2/2018
Azure Administrator role-based exam prep: AZ-101 Integration & Security - BRK2439
1:15:31
10/2/2018
Operationalizing an Azure environment - BRK3264
0:45:29
10/2/2018
Beware ransomware! How to mitigate risk with Windows 10 and Microsoft 365 security - THR1096
0:25:28

Page 1 of 23