Professional Documents
Culture Documents
Zero Trust Mind Map v1
Zero Trust Mind Map v1
jads.blog
Multi-Factor Authentication FIDO2 security key
SMS
Voice call
User Risk
Data Classfication
Risk based policies (Integration with AAD Identity Protection)
Sign In Risk
MyApps
Self Service portals
MyAccount
Sensitive info types as condition MyAccess (Integration with Azure AD Access Packages)
External Identities
Endpoint DLP
Prevent Data Loss Azure AD B2B Cross tenant Settings
Integration with Defender for Endpoint
Microsoft 365 Zero Trust External Identities
Azure AD B2C
DLP for Teams Chat and channel messages Group based licensing
Application assignments
eDiscovery
Content search Azure AD PIM for Azure AD Roles (Just in time access)
Secure and protect your cloud assets Discover and control the use of shadow IT
Perimeter Control
VPN Gateway Protect your sensitive information anywhere in the cloud (File policies and Threat protection policies)
Azure DDoS Protection Real-time control an (Session policies, Integration with Conditional Access) Native Integration with Microsoft Sentinel using connectors
Applications Defender for Cloud Apps
Azure Front Door Cloud Security Posture
Azure Firewall
Network Security Groups/ASGs Protect your Cloud Workloads Detect and Respond to Threats Protection against advanced attacks (phishing, malware, spam, etc.)
Emails and documents Defender for Office 365
Protection beyond email (Microsoft Teams, SharePoint, OneDrive, and Office apps)
UDRs
Subnets Virtual Networks Internal email protection
Inboud/Outbound Control
Managed Identities
Syslog
Key auto-rotation
Microsoft Sentinel Data Collector API
Custom Log format (Log Analytics Agent)
Scheduled rules
Microsoft Defender for Azure Cosmos DB Cosmos Environments
Near Real time rules
Detect Threats
Microsoft Defender for DNS DNS
Incident breakdown
Microsoft Defender for Containers Containers
Investigation
Notebooks
Entity Pages
Microsoft Defender for Resource Manager Resource deployment
Triggers
Workbooks
Azure Databricks/Apache Spark
Diagnosis
Audit
Custom Initiaties
Policy enforcement
Security Recommendations
Remedation steps
Azure
Security Posture
Google Cloud Platform (GCP)