Appendix B Customizing your operating system security baseline assessment

In Chapter 4, you learned how to remediate operating (OS) system vulnerabilities based on Common Configuration Enumeration (CCE) recommendations. Azure Security Center monitors security configurations by applying a set of recommended rules for hardening the OS. Although these recommendations are important, in some scenarios organizations might want to create their own set of security configurations to validate that their servers are compliant with it. In this appendix, you will learn how to customize the OS security configuration in Security Center.

NOTE

At the time of this writing, this feature is in preview (released in January 2018) and the only supported Operating ...

Get Microsoft Azure Security Center, First Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.