This eBook includes the following formats, accessible from your Account page after purchase:
EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.
PDF The popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Also available in other formats.
Register your product to gain access to bonus material or receive a coupon.
Microsoft Azure Security Center presents comprehensive techniques for using Azure Security Center to protect cloud and hybrid environments. Leading Microsoft security and cloud experts Dr. Thomas Shinder and Yuri Diogenes thoroughly introduce the full spectrum of security features and capabilities available in Azure Security Center, and demonstrate how to apply them in key operational scenarios to address all elements of protection, detection, and response.
The authors’ step-by-step coverage includes: securing Azure virtual machines and virtual networks, Azure SQL, and Azure websites and apps; logging, auditing, storage, integration of third-party security solutions, and much more.
Shinder and Diogenes write for everyone concerned with safeguarding Azure environments, regardless of their experience managing security or cloud environments. They show how to save hours, days, or even weeks by eliminating trial-and-error -- so you can reliably solve security problems in the most efficient ways possible.
Chapter 1: Threat Landscape
Chapter 2: Azure Security Center
Chapter 3: Policy Management
Chapter 4: Mitigating Security Issues
Chapter 5: Using Security Center for Incident Response
Chapter 6: Advanced Cloud Defense
Chapter 7: Azure Monitor
Chapter 8: Monitoring Identity and Access
Chapter 9: Using Threat Intelligence to Identity Security Issues
Appendix A: Using multiple workspaces in Security Center
Appendix B: Customizing your Operating System Security Baseline Assessment