Security Center

Official Documentation

Service Description

Security Center helps you prevent, detect, and respond to threats with increased visibility into and control over the security of your Azure resources. It provides integrated security monitoring and policy management across your Azure subscriptions, helps detect threats that might otherwise go unnoticed, and works with a broad ecosystem of security solutions.

Getting Started

  1. 5/31/2017, Mva
    Security is a top-level concern when it comes to cloud computing for organizations of all types. In this course, you will be introduced to Azure security and compliance. We...
  2. 1/18/2018, Mva
    Looking to enhance your organization’s security posture, especially these days, when threats seem to increase in volume and sophistication all the time? Azure Security Center...



Latest Content

Subscribe to News about Security Center

Title  
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
more...


Web Content

Security Center Documentation

1. Overview
     1.1. About Security Center
2. Quickstarts
     2.1. Azure subscriptions
     2.2. Windows computers
     2.3. Linux computers
     2.4. Security solutions
3. Tutorials
     3.1. Define security policies
     3.2. Protect your resources
     3.3. Respond to incidents
4. Concepts
     4.1. Permissions
     4.2. Data security
5. How-to guides
     5.1. Upgrade to advanced security
     5.2. Set Security policy
          5.2.1. Data collection
          5.2.2. Policy definitions
          5.2.3. Email notifications
          5.2.4. Pricing tier
          5.2.5. Security configurations
          5.2.6. Security policy using Azure policy
          5.2.7. Tenant-wide visibility
     5.3. Implement security recommendations
     5.4. Monitor security health
          5.4.1. Compute & apps security
               5.4.1.1. Apply disk encryption
               5.4.1.2. Apply system updates
               5.4.1.3. Enable encryption for storage account
               5.4.1.4. Enable VM Agent
               5.4.1.5. Install Endpoint Protection
               5.4.1.6. Reboot after system updates
               5.4.1.7. Remediate security configurations
               5.4.1.8. Update OS version
               5.4.1.9. Vulnerability assessment not installed
               5.4.1.10. Add a web application firewall
               5.4.1.11. Finalize application protection
          5.4.2. Network security
               5.4.2.1. Add a next generation firewall
               5.4.2.2. Enable Network Security Groups
               5.4.2.3. Restrict access through Internet-facing endpoints
               5.4.2.4. Route traffic through NGFW only
          5.4.3. Storage & data security
               5.4.3.1. Enable auditing and threat detection on SQL databases
               5.4.3.2. Enable auditing and threat detection on SQL servers
               5.4.3.3. Enable Transparent Data Encryption
          5.4.4. Identity and Access
     5.5. Apply cloud defenses
          5.5.1. Just in time access
          5.5.2. Adaptive application controls
          5.5.3. File integrity monitoring
     5.6. Manage security solutions
          5.6.1. Connected solutions
          5.6.2. Discovered solutions
          5.6.3. Connect external solutions
          5.6.4. Connect Application Gateway
          5.6.5. Connect Microsoft ATA
          5.6.6. Connect Azure AD Identity Protection
          5.6.7. Data export to SIEM
     5.7. Investigate threats
          5.7.1. Security alerts
          5.7.2. Security incidents
          5.7.3. Threat reports
          5.7.4. Alert types
          5.7.5. Custom alerts
          5.7.6. Alert validation
          5.7.7. Threat intelligence map
          5.7.8. Investigation
          5.7.9. Manage investigation user data
     5.8. Automate security workflows
          5.8.1. Logic Apps playbooks
          5.8.2. View events
          5.8.3. Search
          5.8.4. Review compliance (REST)
     5.9. Scenarios
          5.9.1. Incident response
          5.9.2. Use recommendations to enhance security
     5.10. Troubleshoot
6. Reference
     6.1. REST APIs
     6.2. Service updates
7. Resources
     7.1. Manage user data
     7.2. FAQ
     7.3. Supported platforms
     7.4. Platform migration
     7.5. Platform migration FAQ
     7.6. Planning and operations
     7.7. Azure Security
     7.8. Azure Roadmap
     7.9. Readiness Roadmap
     7.10. Azure Security, Privacy, & Compliance blog
     7.11. Stack Overflow
     7.12. Videos
     7.13. Pricing
     7.14. Service updates
     7.15. Regional availability

Online Training Content

Date Title
1/18/2018 Hybrid Cloud Workload Protection with Azure Security Center
5/31/2017 Azure208x - Azure Security and Compliance
8/18/2016 Introduction to Azure Security Center

Tools

Tool Description
Free Tier Solution Based Billing Tracker This OMS Tracker Dashboard helps detect Security & Audit Solution related activities happening in the Azure Activity Log in an OMS workspace post 2017-06-19, and verifies if Solution Based Billing has been enabled for the Security & Audit Solution in that Free Tier OMS Workspace.

Videos

Date Title Length
7/17/2018
A Perspective on Industrial IoT Security by TrendMicro
0:14:55
5/9/2018
Find Security Flaws with AI using Microsoft Security Risk Detection, VSTS, and Azure
0:20:55
5/7/2018
Security APIs in Microsoft Graph
0:13:39
5/6/2018
Building secure cloud apps – lessons learned from Microsoft’s internal security and software engineering teams
1:33:22
5/6/2018
Removing Security Roadblocks to IoT Deployment Success
1:33:22
5/6/2018
Modernizing Mission-Critical Apps with SQL Server
1:33:22
5/6/2018
Secure and manage your Azure resources
1:33:22
5/2/2018
On the Road to Build: IoT Security
0:04:35
4/18/2018
How to configure VPN integration in Microsoft Advanced Threat Analytics
0:07:37
4/10/2018
Azure Security Center | Azure Friday
0:13:24

Page 1 of 17