Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls

Microsoft via Microsoft Learn

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
  • Learn how to use Microsoft Defender for Cloud to streamline regulatory compliance by identifying and addressing issues that hinder meeting compliance standards and achieving certifications.

    By the end of this training module, participants will:

    • Understand how to use Microsoft Defender for Cloud’s compliance management dashboard.

    • Identify and interpret key regulatory compliance standards applicable to your industry.

    • Implement and manage compliance controls within Microsoft Defender for Cloud.

    • Conduct regular compliance assessments and generate comprehensive compliance reports.

  • Learn how to connect your Azure subscriptions to Microsoft Defender for Cloud, enabling enhanced security monitoring, compliance management, and the implementation of best practices for threat protection.

    By the end of this training module, participants will:

    • Learn how to connect your Azure subscriptions to Microsoft Defender for Cloud.

    • Understand the benefits of integrating Azure subscriptions for enhanced security monitoring.

    • Explore methods to manage and ensure compliance across connected Azure subscriptions.

    • Gain skills to implement best practices for threat protection within your Azure environment.

  • Learn to regulate network traffic to your Azure resources by configuring and applying network security groups in the Azure portal, improving your network's security posture.

    By the end of this training module, participants will:

    • Understand the purpose and benefits of using Azure NSG to filter network traffic.

    • Learn how to create and configure NSGs to enforce access controls for Azure resources.

    • Gain insights into how NSGs can be used to allow or deny specific types of traffic based on source, destination, and port.

    • Understand how to prioritize NSG rules and leverage Azure NSG flow logs for monitoring and troubleshooting.

    • Recognize the role of NSGs in implementing network security best practices in Azure.

  • Discover how to set up and integrate a Log Analytics agent with a workspace in Defender for Cloud using the Azure portal, enhancing security data analysis capabilities.

    By the end of this training module, participants will:

    • Understand the importance of a centralized log collection and analysis solution in Microsoft Defender for Cloud.

    • Learn how to configure and deploy the Log Analytics agent in Azure.

    • Gain insights into creating and configuring a Log Analytics workspace for Defender for Cloud.

    • Understand how to integrate the Log Analytics workspace with Defender for Cloud to collect and analyze security logs.

    • Recognize the benefits of leveraging centralized log analytics for proactive security monitoring and threat detection.

  • Discover how to use Microsoft Defender for Cloud through the Azure portal to ensure the security of your Azure services and workloads, offering continuous threat detection and prevention.

    By the end of this training module, participants will:

    • Understand the risks associated with open management ports on virtual machines.
    • Learn how to implement JIT VM access using Microsoft Defender for Cloud.
    • Explore how JIT VM access reduces attack surfaces in Azure and AWS environments.
    • Gain skills to configure and manage temporary, controlled access to VMs for authorized users.
  • Learn to configure Azure Key Vault networking settings via the Azure portal, enabling secure access control to your vault, protecting sensitive keys and secrets.

    By the end of this training module, participants will:

    • Understand the importance of configuring networking settings for Azure Key Vault in ensuring secure access and communication.

    • Learn how to configure network access control for Azure Key Vault using virtual network service endpoints and private endpoints.

    • Gain insights into configuring firewall rules and virtual network service endpoints to restrict access to Key Vault.

    • Understand the process of configuring private endpoints to securely access Key Vault from virtual networks.

    • Recognize the benefits of properly configuring networking settings for Azure Key Vault in enhancing overall security.

  • Learn how to securely connect an Azure SQL server using an Azure Private Endpoint via the Azure portal, ensuring private and safe communication with your SQL server.

    By the end of this training module, participants will:

    • Understand the importance of using Azure Private Endpoint to establish secure connections to Azure SQL Server.

    • Learn how to configure and create an Azure Private Endpoint for Azure SQL Server in the Azure portal.

    • Gain insights into the network architecture and components involved in setting up an Azure Private Endpoint.

    • Understand how to validate and test the connection between the Azure Private Endpoint and Azure SQL Server.

    • Recognize the benefits of using Azure Private Endpoint for securing database connections and isolating network traffic.

Syllabus

  • Examine Defender for Cloud regulatory compliance standards
    • Introduction
    • Regulatory compliance standards in Defender for Cloud
    • Microsoft cloud security benchmark in Defender for Cloud
    • Improve your regulatory compliance in Defender for Cloud
    • Module assessment
    • Summary
  • Enable Defender for Cloud on your Azure subscription
    • Introduction
    • Connect your Azure subscriptions
    • Exercise - Configuring Microsoft Defender for Cloud for Enhanced Protection
    • Module assessment
    • Summary
  • Filter network traffic with a network security group using the Azure portal
    • Introduction
    • Azure resource group
    • Azure Virtual Network
    • How network security groups filter network traffic
    • Application security groups
    • Exercise - Create a virtual network infrastructure
    • Module assessment
    • Summary
  • Collect guest operating system monitoring data from Azure and hybrid virtual machines using Azure Monitor Agent
    • Introduction
    • Deploy the Azure Monitor Agent
    • Collect data with Azure Monitor Agent
    • Exercise - Create a data collection rule and install the Azure Monitor Agent
    • Module assessment
    • Summary
  • Explore just-in-time virtual machine access
    • Introduction
    • Understand just-in-time virtual machine access
    • Enable just-in-time access on virtual machines
    • Exercise - Enable just-in-time access on virtual machines
    • Module assessment
    • Summary
  • Configure Azure Key Vault networking settings
    • Introduction
    • Azure Key Vault basic concepts
    • Best practices for Azure Key Vault
    • Azure Key Vault network security
    • Configure Azure Key Vault firewalls and virtual networks
    • Exercise - Configure Key Vault networking settings
    • Azure Key Vault soft delete overview
    • Virtual network service endpoints for Azure Key Vault
    • Exercise - Enable soft delete in Azure Key Vault
    • Module assessment
    • Summary
  • Connect an Azure SQL server using an Azure Private Endpoint using the Azure portal
    • Introduction
    • Azure Private Endpoint
    • Azure Private Link
    • Exercise - Connect to an Azure SQL server using an Azure Private Endpoint using the Azure portal
    • Module assessment
    • Summary

Reviews

Start your review of Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.