Chapter 3
Capabilities of Microsoft security solutions
When designing a security solution using Microsoft technologies, it is important to consider the entire portfolio of options to have a complete approach for resources in Azure, Microsoft 365, and on-premises. These workloads must be equally monitored and protected and provide a seamless experience to the users. To manage active attacks, data from these workloads should be ingested into Microsoft Sentinel to ensure that you have a single view across your entire environment, which will facilitate the work of your security operations analysts.
To head off potential attacks, it’s also important to focus on configuring and monitoring the security configuration of these workloads. To ensure that ...
Get Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.