Virtual Machine [VM]

Vulnerability Assessment with Defender for Servers, Powered by Defender Vulnerability Management

 Microsoft Defender for Cloud is a comprehensive multicloud application protection platform (CNAPP) meticulously designed to safeguard your cloud-based applications from every angle, covering the entire journey from code to cloud. A pivotal aspect of cloud security involves the continuous monitoring and management of emerging vulnerabilities across your cloud workloads. By implementing strong vulnerability management practices, […]

Vulnerability Assessment with Defender for Servers, Powered by Defender Vulnerability Management Continue Reading

Azure Portal collapsed service menus #azure #portal #ui #ux

Recently the menu structure in Azure is changed into a collapsed and expanded menu, Don’t know who thought it was the best option to have all the blades in collapsed mode. one word #annoying for me Collapsing menus, also known as accordion menus, are a popular design choice in many web applications, including Microsoft Azure.

Azure Portal collapsed service menus #azure #portal #ui #ux Continue Reading

Secure your AI applications from code to runtime with Microsoft Defender for Cloud

Microsoft Defender for Cloud becomes the first CNAPP to protect enterprise-built AI applications across the application lifecycle The AI transformation has accelerated with the introduction of generative AI (GenAI), unlocking a wide range of innovations with intelligent applications. Organizations are choosing to develop new GenAI applications and embed AI into existing applications to increase business

Secure your AI applications from code to runtime with Microsoft Defender for Cloud Continue Reading

Protecting Containers: A Primer for Moving from an EDR-based Threat Approach

Many security teams are familiar with an EDR-based approach to security. However, container protection within their cloud ecosystem can seem much more challenging and complex.    Protecting containers requires an understanding of the complete attack surface that containers expose–whether you are running them using an orchestrator like Kubernetes or locally using Docker.   In this

Protecting Containers: A Primer for Moving from an EDR-based Threat Approach Continue Reading

Windows Server 2025 vs 2022: Detailed Overview

Windows Server 2025 represents the next evolution of Microsoft’s server operating system, aiming to enhance security, performance, scalability, and IT infrastructure management. This blog post will provide a detailed comparison of Windows Server 2025 and its predecessor, Windows Server 2022. Windows Server 2022: A Recap Windows Server 2022 is built on the strong foundation of

Windows Server 2025 vs 2022: Detailed Overview Continue Reading

Azure Firewall: Comprehensive Comparison & Best Practices

Azure Firewall, a managed, cloud-based network security service, is an essential component of Azure’s security offerings. It comes in three different versions – Basic, Standard, and Premium – each designed to cater to a wide range of customer use cases and preferences. This blog post will provide a comprehensive comparison of these versions, discuss best

Azure Firewall: Comprehensive Comparison & Best Practices Continue Reading

Unleashing the Power of Microsoft Defender for Cloud – Unique Capabilities for Robust Protection

Microsoft Defender for Cloud (MDC) is a cloud-native application protection platform (CNAPP) that is made up of security measures and practices that are designed to protect cloud-based applications from various cyber threats and vulnerabilities. In this article we make a case that the unique capabilities provided by MDC will be hard to replicate with a

Unleashing the Power of Microsoft Defender for Cloud – Unique Capabilities for Robust Protection Continue Reading

Secrets scanning for Cloud deployments

Over the past year, our CNAPP solution has gone through progressive enhancements, particularly around secret management. It all began with the ability to identify various secret types across virtual machines (VMs). Subsequently, we expanded our focus to include a wide range of metadata associated with these secrets, providing valuable context.  Today, we are excited to

Secrets scanning for Cloud deployments Continue Reading

Resource-level billing change for Defender for Servers Customers

Who does this change applies to: This update is relevant for users with Defender for Servers activated on their Workspaces (with agent installed) or those utilizing the AWS Connector with Defender for Servers enabled. What’s new:  Effective Friday, April 26th, only when Defender for Servers is enabled for the resources’ subscription or the subscription hosting

Resource-level billing change for Defender for Servers Customers Continue Reading

Prepare for upcoming transitions in Defender for Servers

Last summer, within the scope of the upcoming Log Analytics agent deprecation, we announced a new agent strategy for Defender for Servers with the goal to simplify the onboarding and reduce external dependencies in our offering while improving existing and adding new capabilities. As part of that new strategy, customers should enable, agentless scanning as

Prepare for upcoming transitions in Defender for Servers Continue Reading