Chapter 8
Enhanced Security Capabilities
Now that you know how to address recommendations to enhance the security posture of your cloud workloads and you understand the importance of threat detection based on the different Defender for Server options, you need to ensure that you also apply security controls to reduce the attack surface. In this chapter, you will learn how to use just-in-time (JIT) virtual machine (VM) access to harden the access to Azure VMs and ensure that your VMs are not always exposed to the Internet.
You will learn how to track changes to your files and registry hives using file integrity monitoring (FIM). Also, you will learn how Microsoft Defender for Cloud uses machine learning to create a list of approved applications ...
Get Microsoft Defender for Cloud now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.