Security Center

Official Documentation

Service Description

Security Center helps you prevent, detect, and respond to threats with increased visibility into and control over the security of your Azure resources. It provides integrated security monitoring and policy management across your Azure subscriptions, helps detect threats that might otherwise go unnoticed, and works with a broad ecosystem of security solutions.

Getting Started

  1. 5/31/2017, Mva
    Security is a top-level concern when it comes to cloud computing for organizations of all types. In this course, you will be introduced to Azure security and compliance. We...
  2. 1/18/2018, Mva
    Looking to enhance your organization’s security posture, especially these days, when threats seem to increase in volume and sophistication all the time? Azure Security Center...

Latest Content

Subscribe to News about Security Center


Web Content

Security Center Documentation

1. Overview
     1.1. About Security Center
     1.2. Security Center supported platforms & features
2. Quickstarts
     2.1. Azure subscriptions
     2.2. Windows computers
     2.3. Linux computers
     2.4. Security solutions
3. Tutorials
     3.1. Define security policies
     3.2. Protect your resources
     3.3. Respond to incidents
4. Concepts
     4.1. Permissions
     4.2. Data security
5. How-to guides
     5.1. Improve your secure score
     5.2. Upgrade to advanced security
     5.3. Server protection with Windows Defender ATP
     5.4. Set security policies
     5.5. Customize the information protection policy
     5.6. Security policy settings
          5.6.1. Data collection
          5.6.2. Policy definitions
          5.6.3. Email notifications
          5.6.4. Pricing tier
          5.6.5. Security configurations
          5.6.6. Tenant-wide visibility
     5.7. Implement security recommendations
     5.8. Monitor security health
          5.8.1. Compute & apps security
      VM and computer recommendations
           Apply disk encryption
           Apply system updates
           Enable encryption for storage account
           Enable VM Agent
           Install Endpoint Protection
           Reboot after system updates
           Remediate security configurations
           Update OS version
           Vulnerability assessment not installed
      App recommendations
           Add a web application firewall
           Finalize application protection
      Container recommendations
          5.8.2. Network security
      Add a next generation firewall
      Enable Network Security Groups
      Restrict access through Internet-facing endpoints
      Route traffic through NGFW only
          5.8.3. Data & storage security
      Enable auditing and threat detection on SQL databases
      Enable auditing and threat detection on SQL servers
      Enable Transparent Data Encryption
          5.8.4. Monitor identity and access
     5.9. Apply cloud defenses
          5.9.1. Manage just in time access
          5.9.2. Adaptive application controls
          5.9.3. File integrity monitoring
     5.10. Manage security solutions
          5.10.1. Connected solutions
          5.10.2. Discovered solutions
          5.10.3. Connect external solutions
          5.10.4. Connect Application Gateway
          5.10.5. Connect Microsoft ATA
          5.10.6. Connect Azure AD Identity Protection
          5.10.7. Data export to SIEM
     5.11. Investigate threats
          5.11.1. Security alerts
          5.11.2. Security incidents
          5.11.3. Threat reports
          5.11.4. Alert types
          5.11.5. Custom alerts
          5.11.6. Alert validation
          5.11.7. Alert confidence score
          5.11.8. Security alerts map and threat intelligence
          5.11.9. Investigation
          5.11.10. Manage investigation user data
          5.11.11. UEBA for Azure resources and users
     5.12. Automate security workflows
          5.12.1. Logic Apps playbooks
          5.12.2. View events
          5.12.3. Search
          5.12.4. Review compliance (REST)
          5.12.5. Assess subscriptions (REST)
          5.12.6. Automate onboarding using PowerShell
     5.13. Scenarios
          5.13.1. Incident response
          5.13.2. Use recommendations to enhance security
     5.14. Troubleshoot
6. Reference
     6.1. REST APIs
     6.2. Service updates
7. Resources
     7.1. Build your skills with Microsoft Learn
     7.2. Manage user data
     7.3. FAQ
     7.4. Planning and operations
     7.5. Azure Security
     7.6. Azure Roadmap
     7.7. Readiness Roadmap
     7.8. Azure Security, Privacy, & Compliance blog
     7.9. Stack Overflow
     7.10. Videos
     7.11. Pricing
     7.12. Service updates
     7.13. Regional availability

Online Training Content

Date Title
1/18/2018 Hybrid Cloud Workload Protection with Azure Security Center
5/31/2017 Azure208x - Azure Security and Compliance
8/18/2016 Introduction to Azure Security Center


Tool Description
Free Tier Solution Based Billing Tracker This OMS Tracker Dashboard helps detect Security & Audit Solution related activities happening in the Azure Activity Log in an OMS workspace post 2017-06-19, and verifies if Solution Based Billing has been enabled for the Security & Audit Solution in that Free Tier OMS Workspace.


Date Title Length
Practical guide for using Azure Security Center to protect hybrid cloud environment - BRK2368
Best in class Security and Compliance with SharePoint and OneDrive - BRK2100
Elevate the security for all your cloud apps and services with the Microsoft CASB - - BRK2158
Microsoft Graph: The API for Microsoft 365 - BRK3322
Security is important to SMBs too - THR1097
CYA (covering your assets) with security and threat detection in Azure - BRK2421
Azure Active Directory security insights with Conditional Access Identity Protection - BRK3401
Azure Administrator role-based exam prep: AZ-101 Integration & Security - BRK2439
Operationalizing an Azure environment - BRK3264
Beware ransomware! How to mitigate risk with Windows 10 and Microsoft 365 security - THR1096

Page 1 of 23