Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Agenda

• Introductions
• Azure Security Center Briefing
• Engagement Schedule
• Engagement Deliverables
Introduction

• Name
• Department or Team
• Role
• Responsibilities
• Experience in this technology area​
• Goals for this workshop
Cloud Presents Unique Security Challenges

For CIOs and CISOs, it can be Cloud environments are more Enterprises bring on-premises
challenging to manage cloud risk, dynamic: resources are being security issues to the cloud:
protecting every layer of their spun up (and down) frequently, disconnected point solutions,
digital estate, and maintaining a it’s not just about VMs – there’s noisy alerts, and advanced
strong security posture across also PaaS to consider threats
hybrid cloud workloads
Introducing: Azure Security Center

Gain visibility Enable security Integrate partner Detect cyber


and control at cloud speed solutions threats
Engagement Schedule
TIME` Day 1 Day 2 Day 3 Day 4

Compliance Assessment
09:00-10:00 Kick Off and Intros Threat Protection Network Segmentation
Hands On

Azure Security Center Threat Protection


10:00-11:00 API Integration System Monitoring
Overview Hands On

Azure Security Center API Integration System Monitoring


11:00-12:00 Server Protection
Setup and Configuration Hands On Hands On

12:00-13:00 BREAK BREAK BREAK BREAK


Azure Security Center
Server Protection Workload
13:00-14:00 Setup and Configuration Risk Identification
Hands On Configuration
Hands On
Risk Identification
14:00–15:00 Operational Monitoring Application Whitelisting Log Analytics Overview
Hands On
Operational Monitoring Application Whitelisting
15:00-16:00 Policy Enforcement Troubleshooting
Hands On Hands On
Policy Enforcement
16:00-17:00 Compliance Assessment System Integrity Close Out Meeting
Engagement Deliverables
Azure Security Center Fundamentals Knowledge Transfer Modules
• Azure Security Center Overview
• Azure Security Center Setup and Configuration
• Operational Monitoring
• Compliance Assessment
• API Integration
• Risk Identification
• Policy Enforcement
• Threat Protection
• Server Protection
• Application Whitelisting
• System Integrity
• Network Segmentation
• System Monitoring
• Workload Configuration
• Log Analytics Overview
• Troubleshooting
Engagement Deliverables
Hands On
• ASC Onboarding
• Monitor Security Health
• Enable Just in time access
• Advanced threat protection for Azure Key Vault
• Log Analytics
• Simulate and detect attacks on Linux and Windows
• Automate Incident Response with Workflow Automation
• File Integrity Monitoring
• Adaptive Application Control
• Using PowerShell to get alerts
• Post-Breach Threat Detections
• Regulatory Compliance
• Security Policies
• Azure Policy
• Blueprints
• Explore Resource Graph
• Secure Score
Questions?
© 2019 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Hello are trademarks of the Microsoft group of companies. Other products mentioned that are not trademarks include Device Guard, Windows Defender Advanced Threat
Protection, Windows Defender Application Guard, Windows Information Protection, The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft
must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO
WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. Microsoft, Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

You might also like