@@ -27,32 +27,58 @@ The following sections show Security Center features that are available for thei
27
27
28
28
## Virtual machine / server supported features <a name =" vm-server-features " ></a >
29
29
30
- > [ !div class="mx-tableFixed"]
31
-
32
- | Server| Windows||| Linux||| Pricing tier|
33
- | ----| ----| ----| ----| ----| ----| ----| ----|
34
- | ** Environment** | ** Azure** || ** Non-Azure** | ** Azure** || ** Non-Azure** ||
35
- || ** Virtual Machine** | ** Virtual Machine Scale Set** || ** Virtual Machine** | ** Virtual Machine Scale Set** |
36
- | [ Microsoft Defender ATP integration] ( https://docs.microsoft.com/azure/security-center/security-center-wdatp ) | ✔ (on supported versions)| ✔ (on supported versions)| ✔| -| -| -| Standard|
37
- | [ Virtual Machine Behavioral Analytics threat detection alerts] ( https://docs.microsoft.com/azure/security-center/security-center-alerts-iaas ) | ✔| ✔| ✔| ✔ (on supported versions)| ✔ (on supported versions)| ✔| Recommendations (Free)<br > Threat Detection (Standard)|
38
- | [ Fileless threat detection alerts] ( https://docs.microsoft.com/azure/security-center/security-center-alerts-iaas#fileless-attack-detection- ) | ✔| ✔| ✔| -| -| -| Standard|
39
- | [ Network-based threat detection alerts] ( https://docs.microsoft.com/azure/security-center/security-center-alerts-service-layer#azure-network-layer ) | ✔| ✔| -| ✔| ✔| -| Standard|
40
- | [ Just-In-Time VM access] ( https://docs.microsoft.com/azure/security-center/security-center-just-in-time ) | ✔| -| -| ✔| -| -| Standard|
41
- | [ File Integrity Monitoring] ( https://docs.microsoft.com/azure/security-center/security-center-file-integrity-monitoring ) | ✔| ✔| ✔| ✔| ✔| ✔| Standard|
42
- | [ Adaptive application controls] ( https://docs.microsoft.com/azure/security-center/security-center-adaptive-application ) | ✔| -| ✔| ✔| -| ✔| Standard|
43
- | [ Network map] ( https://docs.microsoft.com/azure/security-center/security-center-network-recommendations#network-map ) | ✔| ✔| -| ✔| ✔| -| Standard|
44
- | [ Adaptive network hardening] ( https://docs.microsoft.com/azure/security-center/security-center-adaptive-network-hardening ) | ✔| -| -| ✔| -| -| Standard|
45
- | Adaptive network controls| ✔| ✔| -| ✔| ✔| -| Standard|
46
- | [ Regulatory Compliance dashboard & reports] ( https://docs.microsoft.com/azure/security-center/security-center-compliance-dashboard ) | ✔| ✔| ✔| ✔| ✔| ✔| Standard|
47
- | Recommendations and threat detection on Docker-hosted IaaS containers| -| -| -| ✔| ✔| ✔| Standard|
48
- | Missing OS patches assessment| ✔| ✔| ✔| ✔| ✔| ✔| Free|
49
- | Security misconfigurations assessment| ✔| ✔| ✔| ✔| ✔| ✔| Free|
50
- | [ Endpoint protection assessment] ( https://docs.microsoft.com/azure/security-center/security-center-services#supported-endpoint-protection-solutions- ) | ✔| ✔| ✔| -| -| -| Free|
51
- | Disk encryption assessment| ✔| ✔| -| ✔| ✔| -| Free|
52
- | Third-party vulnerability assessment| ✔| -| -| ✔| -| -| Free|
53
- | [ Network security assessment] ( https://docs.microsoft.com/azure/security-center/security-center-network-recommendations ) | ✔| ✔| -| ✔| ✔| -| Free|
54
-
55
- ### Supported endpoint protection solutions <a name =" endpoint-supported " ></a >
30
+ ### [ Windows] ( #tab/features-windows )
31
+
32
+ |||||||||
33
+ | ----| :----:| :----:| :----:| :----:| :----:| :----:| :----:|
34
+ ||** Azure Virtual Machines** |** Azure Virtual Machine Scale Sets** |** Non-Azure Machines** |** Pricing**
35
+ | [ Microsoft Defender ATP integration] ( https://docs.microsoft.com/azure/security-center/security-center-wdatp ) | ✔ (on supported versions)| ✔ (on supported versions)| ✔| Standard|
36
+ | [ Virtual Machine Behavioral Analytics threat detection alerts] ( https://docs.microsoft.com/azure/security-center/security-center-alerts-iaas ) | ✔| ✔| ✔| Recommendations (Free) Threat Detection (Standard)|
37
+ | [ Fileless threat detection alerts] ( https://docs.microsoft.com/azure/security-center/security-center-alerts-iaas#fileless-attack-detection- ) | ✔| ✔| ✔| Standard|
38
+ | [ Network-based threat detection alerts] ( https://docs.microsoft.com/azure/security-center/security-center-alerts-service-layer#azure-network-layer ) | ✔| ✔| -| Standard|
39
+ | [ Just-In-Time VM access] ( https://docs.microsoft.com/azure/security-center/security-center-just-in-time ) | ✔| -| -| Standard|
40
+ | [ File Integrity Monitoring] ( https://docs.microsoft.com/azure/security-center/security-center-file-integrity-monitoring ) | ✔| ✔| ✔| Standard|
41
+ | [ Adaptive application controls] ( https://docs.microsoft.com/azure/security-center/security-center-adaptive-application ) | ✔| -| ✔| Standard|
42
+ | [ Network map] ( https://docs.microsoft.com/azure/security-center/security-center-network-recommendations#network-map ) | ✔| ✔| -| Standard|
43
+ | [ Adaptive network hardening] ( https://docs.microsoft.com/azure/security-center/security-center-adaptive-network-hardening ) | ✔| -| -| Standard|
44
+ | Adaptive network controls| ✔| ✔| -| Standard|
45
+ | [ Regulatory Compliance dashboard & reports] ( https://docs.microsoft.com/azure/security-center/security-center-compliance-dashboard ) | ✔| ✔| ✔| Standard|
46
+ | Recommendations and threat detection on Docker-hosted IaaS containers| -| -| -| Standard|
47
+ | Missing OS patches assessment| ✔| ✔| ✔| Free|
48
+ | Security misconfigurations assessment| ✔| ✔| ✔| Free|
49
+ | [ Endpoint protection assessment] ( https://docs.microsoft.com/azure/security-center/security-center-services#supported-endpoint-protection-solutions- ) | ✔| ✔| ✔| Free|
50
+ | Disk encryption assessment| ✔| ✔| -| Free|
51
+ | Third-party vulnerability assessment| ✔| -| -| Free|
52
+ | [ Network security assessment] ( https://docs.microsoft.com/azure/security-center/security-center-network-recommendations ) | ✔| ✔| -| Free|
53
+
54
+
55
+ ### [ Linux] ( #tab/features-linux )
56
+
57
+ |||||||||
58
+ | ----| :----:| :----:| :----:| :----:| :----:| :----:| :----:|
59
+ ||** Azure Virtual Machines** |** Azure Virtual Machine Scale Sets** |** Non-Azure Machines** |** Pricing**
60
+ | [ Microsoft Defender ATP integration] ( https://docs.microsoft.com/azure/security-center/security-center-wdatp ) | -| -| -| Standard|
61
+ | [ Virtual Machine Behavioral Analytics threat detection alerts] ( https://docs.microsoft.com/azure/security-center/security-center-alerts-iaas ) | ✔ (on supported versions)| ✔ (on supported versions)| ✔| Recommendations (Free) Threat Detection (Standard)|
62
+ | [ Fileless threat detection alerts] ( https://docs.microsoft.com/azure/security-center/security-center-alerts-iaas#fileless-attack-detection- ) | -| -| -| Standard|
63
+ | [ Network-based threat detection alerts] ( https://docs.microsoft.com/azure/security-center/security-center-alerts-service-layer#azure-network-layer ) | ✔| ✔| -| Standard|
64
+ | [ Just-In-Time VM access] ( https://docs.microsoft.com/azure/security-center/security-center-just-in-time ) | ✔| -| -| Standard|
65
+ | [ File Integrity Monitoring] ( https://docs.microsoft.com/azure/security-center/security-center-file-integrity-monitoring ) | ✔| ✔| ✔| Standard|
66
+ | [ Adaptive application controls] ( https://docs.microsoft.com/azure/security-center/security-center-adaptive-application ) | ✔| -| ✔| Standard|
67
+ | [ Network map] ( https://docs.microsoft.com/azure/security-center/security-center-network-recommendations#network-map ) | ✔| ✔| -| Standard|
68
+ | [ Adaptive network hardening] ( https://docs.microsoft.com/azure/security-center/security-center-adaptive-network-hardening ) | ✔| -| -| Standard|
69
+ | Adaptive network controls| ✔| ✔| -| Standard|
70
+ | [ Regulatory Compliance dashboard & reports] ( https://docs.microsoft.com/azure/security-center/security-center-compliance-dashboard ) | ✔| ✔| ✔| Standard|
71
+ | Recommendations and threat detection on Docker-hosted IaaS containers| ✔| ✔| ✔| Standard|
72
+ | Missing OS patches assessment| ✔| ✔| ✔| Free|
73
+ | Security misconfigurations assessment| ✔| ✔| ✔| Free|
74
+ | [ Endpoint protection assessment] ( https://docs.microsoft.com/azure/security-center/security-center-services#supported-endpoint-protection-solutions- ) | -| -| -| Free|
75
+ | Disk encryption assessment| ✔| ✔| -| Free|
76
+ | Third-party vulnerability assessment| ✔| -| -| Free|
77
+ | [ Network security assessment] ( https://docs.microsoft.com/azure/security-center/security-center-network-recommendations ) | ✔| ✔| -| Free|
78
+
79
+ ---
80
+
81
+ ## Supported endpoint protection solutions <a name =" endpoint-supported " ></a >
56
82
57
83
The following table provides a matrix of:
58
84
0 commit comments