Skip to content

Commit 7d2116b

Browse files
authored
Merge pull request #271874 from ElazarK/WI241105-241104-and-241103
episode 45-47
2 parents 4b44f56 + dbef04e commit 7d2116b

File tree

5 files changed

+117
-2
lines changed

5 files changed

+117
-2
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1004,7 +1004,13 @@
10041004
- name: Unified insights from Microsoft Entra permissions management
10051005
href: episode-forty-three.md
10061006
- name: Agentless malware detection
1007-
href: episode-forty-four.md
1007+
href: episode-forty-four.md
1008+
- name: Risk prioritization
1009+
href: episode-forty-five.md
1010+
- name: DevOps Security Capabilities in Defender CSPM
1011+
href: episode-forty-six.md
1012+
- name: Vulnerability management in Defender CSPM
1013+
href: episode-forty-seven.md
10081014
- name: Manage user data
10091015
href: privacy.md
10101016
- name: Microsoft Defender for IoT documentation
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
title: Risk prioritization | Defender for Cloud in the field
3+
description: Learn about risk prioritization in Defender for Cloud.
4+
ms.topic: reference
5+
ms.date: 04/11/2024
6+
---
7+
8+
# Risk prioritization in Defender for Cloud
9+
10+
**Episode description**: In this episode of Defender for Cloud in the Field, Aviram Yitzhak joins Yuri Diogenes to talk about recommendation prioritization in Microsoft Defender for Cloud. Aviram explains the correlation between recommendation prioritization and attack path, and when to use each dashboard. Aviram also demonstrates the user experience when using recommendation prioritization dashboard to triage recommendations based on risk factors.
11+
12+
> [!VIDEO https://aka.ms/docs/player?id=a6d91bc3-2b57-4365-8fc9-35214d6ffb15]
13+
14+
- [01:54](/shows/mdc-in-the-field/risk-prioritization#time=01m54s) - What is recommendation prioritization
15+
- [03:51](/shows/mdc-in-the-field/risk-prioritization#time=04m25s) - How recommendations are listed in this new format
16+
- [04:38](/shows/mdc-in-the-field/risk-prioritization#time=06m25s) - When to use recommendation prioritization
17+
- [07:58](/shows/mdc-in-the-field/risk-prioritization#time=09m45s) - Correlation with secure score
18+
- [08:17](/shows/mdc-in-the-field/risk-prioritization#time=11m15s) - Demonstration
19+
20+
## Recommended resources
21+
22+
- Learn more about [Risk prioritization](risk-prioritization.md).
23+
- Learn more about [Microsoft Security](https://msft.it/6002T9HQY).
24+
- Subscribe to [Microsoft Security on YouTube](https://www.youtube.com/playlist?list=PL3ZTgFEc7LysiX4PfHhdJPR7S8mGO14YS).
25+
26+
- Follow us on social media:
27+
28+
- [LinkedIn](https://www.linkedin.com/showcase/microsoft-security/)
29+
- [Twitter](https://twitter.com/msftsecurity)
30+
31+
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity).
32+
33+
## Next steps
34+
35+
> [!div class="nextstepaction"]
36+
> [DevOps security capabilities in Defender CSPM](episode-forty-six.md)

articles/defender-for-cloud/episode-forty-four.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,4 +33,4 @@ ms.date: 01/28/2024
3333
## Next steps
3434

3535
> [!div class="nextstepaction"]
36-
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)
36+
> [Risk prioritization](episode-forty-five.md)
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
---
2+
title: Vulnerability management in Defender CSPM | Defender for Cloud in the field
3+
description: Learn about vulnerability management in Defender CSPM in Defender for Cloud.
4+
ms.topic: reference
5+
ms.date: 04/11/2024
6+
---
7+
8+
# Vulnerability management in Defender CSPM
9+
10+
**Episode description**: In this episode of Defender for Cloud in the Field, Shahar Bahat joins Yuri Diogenes to talk about some updates in vulnerability management in Defender for Cloud. Shahar talks about the different aspects of vulnerability management in Defender for Cloud, how to use attack path to identify the effect of a vulnerability and how to use Cloud Security Explorer to gain visualization of CVEs at scale across all your subscriptions. Shahar also demonstrates how to utilize these capabilities in Defender for Cloud.
11+
12+
13+
> [!VIDEO https://aka.ms/docs/player?id=1827b0e1-dd27-4e83-a2b5-6adfea3f8ed5]
14+
15+
- [01:15](/shows/mdc-in-the-field/vulnerability-management#time=01m15s) - Overview of Vulnerability Management solution in Defender for Cloud
16+
- [02:31](/shows/mdc-in-the-field/vulnerability-management#time=02m31s) - Insights available as a result of the vulnerability scanning
17+
- [03:41](/shows/mdc-in-the-field/vulnerability-management#time=03m41s) - Integration with Microsoft Threat Vulnerability Management
18+
- [04:52](/shows/mdc-in-the-field/vulnerability-management#time=04m52s) - Querying vulnerability scan results at scale
19+
- [06:53](/shows/mdc-in-the-field/vulnerability-management#time=06m53s) - Demonstration
20+
21+
## Recommended resources
22+
23+
- Learn more about [vulnerability management](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-cloud-unified-vulnerability-assessment-powered-by/ba-p/3990112).
24+
- Learn more about [Microsoft Security](https://msft.it/6002T9HQY).
25+
- Subscribe to [Microsoft Security on YouTube](https://www.youtube.com/playlist?list=PL3ZTgFEc7LysiX4PfHhdJPR7S8mGO14YS).
26+
27+
- Follow us on social media:
28+
29+
- [LinkedIn](https://www.linkedin.com/showcase/microsoft-security/)
30+
- [Twitter](https://twitter.com/msftsecurity)
31+
32+
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity).
33+
34+
## Next steps
35+
36+
> [!div class="nextstepaction"]
37+
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
title: DevOps Security Capabilities in Defender CSPM | Defender for Cloud in the field
3+
description: Learn about DevOps security capabilities in Defender for Cloud.
4+
ms.topic: reference
5+
ms.date: 04/11/2024
6+
---
7+
8+
# DevOps security capabilities in Defender CSPM
9+
10+
**Episode description**: In this episode of Defender for Cloud in the Field, Charles Oxyer joins Yuri Diogenes to talk about DevOps security capabilities in Defender CSPM. Charles explains the importance of DevOps security in Microsoft CNAPP solution, what are the free capabilities available as part of Foundational CSPM, and what are the advanced DevOps security features included in Defender CSPM. Charles demonstrates how to improve the DevOps security posture by remediating recommendations, and how to use code to cloud contextualization with Cloud Security Explorer.
11+
12+
> [!VIDEO https://aka.ms/docs/player?id=386a8435-8154-4c1d-90cc-324e8d41b95f]
13+
14+
- [01:47](/shows/mdc-in-the-field/devops-security#time=01m54s) - What role does DevOps Security plays in a CNAPP solution?
15+
- [04:40](/shows/mdc-in-the-field/devops-security#time=04m40s) - What's new in Defender for Cloud DevOps Security GA?
16+
- [07:08](/shows/mdc-in-the-field/devops-security#time=07m08s) - How Defenders for Cloud DevOps Security capabilities help customers to identify risk across devops state?
17+
- [09:38](/shows/mdc-in-the-field/devops-security#time=09m38s) - Code to cloud contextualization
18+
- [13:44](/shows/mdc-in-the-field/devops-security#time=13m44s) - Demonstration
19+
20+
## Recommended resources
21+
22+
- Learn more about [Overview of Microsoft Defender for Cloud DevOps security](defender-for-devops-introduction.md).
23+
- Learn more about [Microsoft Security](https://msft.it/6002T9HQY).
24+
- Subscribe to [Microsoft Security on YouTube](https://www.youtube.com/playlist?list=PL3ZTgFEc7LysiX4PfHhdJPR7S8mGO14YS).
25+
26+
- Follow us on social media:
27+
28+
- [LinkedIn](https://www.linkedin.com/showcase/microsoft-security/)
29+
- [Twitter](https://twitter.com/msftsecurity)
30+
31+
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity).
32+
33+
## Next steps
34+
35+
> [!div class="nextstepaction"]
36+
> [Vulnerability anagement in Defender CSPM](episode-forty-seven.md)

0 commit comments

Comments
 (0)