This eBook includes the following formats, accessible from your Account page after purchase:
EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
PDF The popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Also available in other formats.
Register your product to gain access to bonus material or receive a coupon.
The definitive practical guide to Microsoft Defender for Cloud covering new components and multi-cloud enhancements!
Microsoft Defender for Cloud offers comprehensive tools for hardening resources, tracking security posture, protecting against attacks, and streamlining security management all in one natively integrated toolset. Now, leading Microsoft security experts Yuri Diogenes and Tom Janetscheck help you apply its robust protection, detection, and response capabilities throughout your operations, protecting workloads running on all your cloud, hybrid, and on-premises platforms.
This guide shows how to make the most of new components, enhancements, and deployment scenarios, as you address today's latest threat vectors. Sharing best practices, expert tips, and optimizations only available from Microsoft's Defender for Cloud team, the authors walk through improving everything from policies and governance to incident response and risk management. Whatever your role or experience, they'll help you address new security challenges far more effectivelyand save hours, days, or even weeks.
Two of Microsoft's leading cloud security experts show how to:
About This Book
Download the sample pages (includes Chapter 2)
CHAPTER 1 The threat landscape
CHAPTER 2 Planning Microsoft Defender for Cloud adoption
CHAPTER 3 Onboarding Microsoft Defender for Cloud
CHAPTER 4 Policy management
CHAPTER 5 Strengthening your security posture
CHAPTER 6 Threat detection
CHAPTER 7 Better together
CHAPTER 8 Enhanced security capabilities
CHAPTER 9 Accessing Defender for Cloud from APIs
CHAPTER 10 Deploying Microsoft Defender for Cloud at scale
APPENDIX Microsoft Defender for DevOps