Chapter 3
Capabilities of Microsoft security solutions
When designing a security solution using Microsoft technologies, it is important to consider the entire portfolio of options, so you have a complete approach for resources located in Azure, Microsoft 365, other clouds, on-premises IT, and operational technology (OT) and Internet of Things (IoT) devices. These workloads must be equally monitored and protected and provide a seamless experience to the user. To manage active attacks, data from these workloads should be ingested to Microsoft Sentinel to ensure that you have a single view across your entire environment, which will facilitate the work of your security operations analysts.
To head off potential attacks, it’s also important to focus ...
Get Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.