Skip to content

Commit 83c8944

Browse files
committed
convert html to markdown
1 parent 015d892 commit 83c8944

10 files changed

+33
-49
lines changed

articles/defender-for-cloud/episode-six.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,7 @@ ms.date: 04/27/2023
1111

1212
Carlos also covers how Microsoft Defender for Cloud is used to fill the gap between cloud security posture management and cloud workload protection, and demonstrates some features related to this scenario.
1313

14-
<br>
15-
<br>
16-
<iframe src="https://aka.ms/docs/player?id=3811455b-cc20-4ee0-b1bf-9d4df5ee4eaf" width="1080" height="530" allowFullScreen="true" frameBorder="0"></iframe>
14+
> [!VIDEO https://aka.ms/docs/player?id=3811455b-cc20-4ee0-b1bf-9d4df5ee4eaf]
1715
1816
- [1:30](/shows/mdc-in-the-field/lessons-from-the-field#time=01m30s) - Why Microsoft Defender for Cloud is a unique solution when compared with other competitors?
1917

articles/defender-for-cloud/episode-sixteen.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,7 @@ ms.date: 04/27/2023
1010

1111
**Episode description**: In this episode of Defender for Cloud in the Field, Erel Hansav joins Yuri Diogenes to talk about the latest updates regarding the Defender for Servers integration with Microsoft Defender for Endpoint. Erel explains the architecture of this integration for the different versions of Windows Servers, how this integration takes place in the backend, the deployment options for Windows and Linux and the deployment at scale using Azure Policy.
1212

13-
14-
<iframe src="https://aka.ms/docs/player?id=aaf5dbcd-9a29-40c2-b355-8c832b27baa5" width="1080" height="530" allowFullScreen="true" frameBorder="0"></iframe>
13+
> [!VIDEO https://aka.ms/docs/player?id=aaf5dbcd-9a29-40c2-b355-8c832b27baa5]
1514
1615
- [00:0](/shows/mdc-in-the-field/servers-med-integration#time=00m00s) - Introduction
1716

@@ -38,4 +37,4 @@ ms.date: 04/27/2023
3837
## Next steps
3938

4039
> [!div class="nextstepaction"]
41-
> [Defender for Cloud integration with Microsoft Entra | Defender for Cloud in the Field](episode-seventeen.md)
40+
> [Defender for Cloud integration with Microsoft Entra | Defender for Cloud in the Field](episode-seventeen.md)

articles/defender-for-cloud/episode-ten.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,10 @@ ms.date: 04/27/2023
88
# Protecting containers in GCP with Defender for Containers
99

1010
**Episode description**: In this episode of Defender for Cloud in the field, Nadav Wolfin joins Yuri Diogenes to talk about how to use Defender for Containers to protect Containers that are located at Google Cloud (GCP).
11-
12-
Nadav gives insights about workload protection for GKE and how to obtain visibility of this type of workload across Azure and AWS. Nadav also demonstrates the overall onboarding experience and provides an overview of the architecture of this solution.
1311

14-
<br>
15-
<br>
16-
<iframe src="https://aka.ms/docs/player?id=078af1f2-1f12-4030-bd3f-3e7616150562" width="1080" height="530" allowFullScreen="true" frameBorder="0"></iframe>
12+
Nadav gives insights about workload protection for GKE and how to obtain visibility of this type of workload across Azure and AWS. Nadav also demonstrates the overall onboarding experience and provides an overview of the architecture of this solution.
13+
14+
> [!VIDEO https://aka.ms/docs/player?id=078af1f2-1f12-4030-bd3f-3e7616150562]
1715
1816
- [00:55](/shows/mdc-in-the-field/gcp-containers#time=00m55s) - Architecture solution for Defender for Containers and support for GKE
1917

@@ -40,4 +38,4 @@ Learn how to [Enable Microsoft Defender for Containers](defender-for-containers-
4038
## Next steps
4139

4240
> [!div class="nextstepaction"]
43-
> [Threat landscape for Containers](episode-eleven.md)
41+
> [Threat landscape for Containers](episode-eleven.md)

articles/defender-for-cloud/episode-thirteen.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,10 @@ ms.date: 04/27/2023
88
# Defender for Storage
99

1010
**Episode description**: In this episode of Defender for Cloud in the Field, Eitan Shteinberg joins Yuri Diogenes to talk about the threat landscape for Azure Storage and how Defender for Storage can help detect and mitigate these threats.
11-
12-
Eitan talks about different use case scenarios, best practices to deploy Defender for Storage and he also demonstrates how to investigate an alert generated by Defender for Storage.
1311

14-
<br>
15-
<br>
16-
<iframe src="https://aka.ms/docs/player?id=79f69cee-ae56-4ce3-9443-0f45e5c3ccf4" width="1080" height="530" allowFullScreen="true" frameBorder="0"></iframe>
12+
Eitan talks about different use case scenarios, best practices to deploy Defender for Storage and he also demonstrates how to investigate an alert generated by Defender for Storage.
13+
14+
> [!VIDEO https://aka.ms/docs/player?id=79f69cee-ae56-4ce3-9443-0f45e5c3ccf4]
1715
1816
- [01:00](/shows/mdc-in-the-field/defender-for-storage#time=01m00s) - Current threats for Cloud Storage workloads
1917

@@ -28,7 +26,7 @@ ms.date: 04/27/2023
2826
- [32:15](/shows/mdc-in-the-field/defender-for-storage#time=32m15s) - What's coming next
2927

3028
## Recommended resources
31-
29+
3230
[Introduction to Microsoft Defender for Storage](defender-for-storage-introduction.md).
3331

3432
- Subscribe to [Microsoft Security on YouTube](https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa0ZoTml2Qm9kZ2pjRzNMUXFqVUwyNl80YVNtd3xBQ3Jtc0trVm9QM2Z0NlpOeC1KSUE2UEd1cVJ5aHQ0MTN6WjJEYmNlOG9rWC1KZ1ZqaTNmcHdOOHMtWXRLSGhUTVBhQlhhYzlUc2xmTHZtaUpkd1c4LUQzLWt1YmRTbkVQVE5EcTJIM0Foc042SGdQZU5acVRJbw&q=https%3A%2F%2Faka.ms%2FSubscribeMicrosoftSecurity)
@@ -44,4 +42,4 @@ ms.date: 04/27/2023
4442
## Next steps
4543

4644
> [!div class="nextstepaction"]
47-
> [Defender for Servers deployment in AWS and GCP](episode-fourteen.md)
45+
> [Defender for Servers deployment in AWS and GCP](episode-fourteen.md)

articles/defender-for-cloud/episode-thirty-five.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,7 @@ ms.date: 08/08/2023
99

1010
**Episode description**: In this episode of Defender for Cloud in the Field, Daniel Davrayev joins Yuri Diogenes to talk about security alert correlation capability in Defender for Cloud. Daniel talks about the importance of have a built-in capability to correlate alerts in Defender for Cloud, how this saves time for SOC analysts to investigate alert and respond to potential threats. Daniel also explains how data correlation works and demonstrate how this correlation appears in Defender for Cloud dashboard as a security incident.
1111

12-
<br>
13-
<br>
14-
<iframe src="https://aka.ms/docs/player?id=6573561d-70a6-4b4c-ad16-9efe747c9a61" width="1080" height="530" allowFullScreen="true" frameBorder="0"></iframe>
12+
> [!VIDEO https://aka.ms/docs/player?id=6573561d-70a6-4b4c-ad16-9efe747c9a61]
1513
1614
- [00:00](/shows/mdc-in-the-field/security-alert-correlation#time=00m00s) - Intro
1715
- [02:15](/shows/mdc-in-the-field/security-alert-correlation#time=02m15s) - How Defender for Cloud handles alert prioritization
@@ -36,4 +34,4 @@ ms.date: 08/08/2023
3634
## Next steps
3735

3836
> [!div class="nextstepaction"]
39-
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)
37+
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)

articles/defender-for-cloud/episode-thirty-four.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,7 @@ ms.date: 06/21/2023
1010

1111
**Episode description**: In this episode of Defender for Cloud in the Field, Ariel Brukman joins Yuri Diogenes to talk about the DevOps Threat Matrix. Ariel talks about the process of creating a new threat matrix for a very complex domain such as DevOps, what it was found during the research process and how the research evolved to create this threat matrix. Ariel also talks about how to use the threat matrix to improve your DevOps defenses, and he gives examples of some common attacks against DevOps environments.
1212

13-
<br>
14-
<br>
15-
<iframe src="https://aka.ms/docs/player?id=20631aa4-501c-4fa6-bd9c-eadab45887af" width="1080" height="530" allowFullScreen="true" frameBorder="0"></iframe>
13+
> [!VIDEO https://aka.ms/docs/player?id=20631aa4-501c-4fa6-bd9c-eadab45887af]
1614
1715
- [02:49](/shows/mdc-in-the-field/devops-threat-matrix#time=02m49s) - The research leading to DevOps Matrix publication
1816
- [05:35](/shows/mdc-in-the-field/devops-threat-matrix#time=05m35s) - Threats in the execution phase
@@ -36,4 +34,4 @@ ms.date: 06/21/2023
3634
## Next steps
3735

3836
> [!div class="nextstepaction"]
39-
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)
37+
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)
Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Understanding data aware security posture capability | Defender for Cloud in the field
2+
title: Understanding data aware security posture capability | Defender for Cloud in the field
33

44
description: Learn about data aware security posture capabilities in Defender CSPM
55
ms.topic: reference
@@ -9,30 +9,29 @@ ms.date: 05/16/2023
99
# Understanding data aware security posture capability
1010

1111
**Episode description**: In this episode of Defender for Cloud in the Field, Tzach Kaufmann joins Yuri Diogenes to talk about data aware security posture capability as part of Defender CSPM. Tzach explains the importance of having data aware security posture capability to help security admins with risk prioritization. Tzach also demonstrates the step-by-step process to onboard this capability and demonstrates how to obtain the insights using Attack Path.
12-
<br>
13-
<br>
14-
<iframe src="https://aka.ms/docs/player?id=dd11ab78-d945-4727-a4e4-cf19eb1922f2" width="1080" height="530" allowFullScreen="true" frameBorder="0"></iframe>
12+
13+
> [!VIDEO https://aka.ms/docs/player?id=dd11ab78-d945-4727-a4e4-cf19eb1922f2]
1514
1615
- [00:00](/shows/mdc-in-the-field/data-aware-security-posture#time=00m00s) - Intro
1716
- [02:00](/shows/mdc-in-the-field/data-aware-security-posture#time=02m00s) - What is Data Aware Security Posture?
1817
- [03:38](/shows/mdc-in-the-field/data-aware-security-posture#time=03m38s) - Understanding the onboarding process
1918
- [05:00](/shows/mdc-in-the-field/data-aware-security-posture#time=05m00s) - Sensitive labels discovery process
2019
- [07:05](/shows/mdc-in-the-field/data-aware-security-posture#time=07m05s) - What's the difference between Data Aware Security Posture and Microsoft Purview?
2120
- [11:35](/shows/mdc-in-the-field/data-aware-security-posture#time=11m35s) - Demonstration
22-
21+
2322
## Recommended resources
24-
- Learn more about [Data Aware Security Posture](concept-data-security-posture.md)
23+
- Learn more about [Data Aware Security Posture](concept-data-security-posture.md)
2524
- Subscribe to [Microsoft Security on YouTube](https://www.youtube.com/playlist?list=PL3ZTgFEc7LysiX4PfHhdJPR7S8mGO14YS)
2625
- Learn more about [Microsoft Security](https://msft.it/6002T9HQY)
2726

2827
- Follow us on social media:
2928

30-
- [LinkedIn](https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbFk5TXZuQld2NlpBRV9BQlJqMktYSm95WWhCZ3xBQ3Jtc0tsQU13MkNPWGNFZzVuem5zc05wcnp0VGxybHprVTkwS2todWw0b0VCWUl4a2ZKYVktNGM1TVFHTXpmajVLcjRKX0cwVFNJaDlzTld4MnhyenBuUGRCVmdoYzRZTjFmYXRTVlhpZGc4MHhoa3N6ZDhFMA&q=https%3A%2F%2Fwww.linkedin.com%2Fshowcase%2Fmicrosoft-security%2F)
29+
- [LinkedIn](https://www.linkedin.com/showcase/microsoft-security/)
3130
- [Twitter](https://twitter.com/msftsecurity)
3231

3332
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity)
3433

3534
## Next steps
3635

3736
> [!div class="nextstepaction"]
38-
> [API Security with Defender for APIs](episode-thirty-two.md)
37+
> [API Security with Defender for APIs](episode-thirty-two.md)

articles/defender-for-cloud/episode-thirty-three.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,7 @@ ms.date: 06/13/2023
99

1010
**Episode description**: In this episode of Defender for Cloud in the Field, Shani Freund Menscher joins Yuri Diogenes to talk about a new capability in Defender CSPM called Agentless Container Posture Management. Shani explains how Agentless Container Posture Management works, how to onboard, and how to leverage this feature to obtain more insights into the container's security. Shani also demonstrates how to visualize this information using Attack Path and Cloud Security Explorer.
1111

12-
<br>
13-
<br>
14-
<iframe src="https://aka.ms/docs/player?id=abceb157-b850-42f0-8b83-92cbef16c893" width="1080" height="530" allowFullScreen="true" frameBorder="0"></iframe>
12+
> [!VIDEO https://aka.ms/docs/player?id=abceb157-b850-42f0-8b83-92cbef16c893]
1513
1614
- [01:48](/shows/mdc-in-the-field/agentless-container-posture-management#time=01m48s) - Overview of Defender CSPM
1715
- [03:06](/shows/mdc-in-the-field/agentless-container-posture-management#time=03m06s) - What container capabilities are included in Defender CSPM
@@ -36,4 +34,4 @@ ms.date: 06/13/2023
3634
## Next steps
3735

3836
> [!div class="nextstepaction"]
39-
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)
37+
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)

articles/defender-for-cloud/episode-thirty-two.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,16 +9,15 @@ ms.date: 06/08/2023
99
# API Security with Defender for APIs
1010

1111
**Episode description**: In this episode of Defender for Cloud in the Field, Preetham Naik joins Yuri Diogenes to talk about API security with Defender for APIs. Preetham explains the importance of API security and why the threats in this area are growing. Preetham introduces the new Defender for APIs plan released in public preview and gives an overview of all its capabilities. Preetham also demonstrates the step-by-step process to onboard this plan and demonstrates how to address API security recommendations.
12-
<br>
13-
<br>
14-
<iframe src="https://aka.ms/docs/player?id=657f8b1b-8072-4075-a244-07c93ecf6556" width="1080" height="530" allowFullScreen="true" frameBorder="0"></iframe>
12+
13+
> [!VIDEO https://aka.ms/docs/player?id=657f8b1b-8072-4075-a244-07c93ecf6556]
1514
1615
- [02:15](/shows/mdc-in-the-field/api-security#time=02m15s) - Why is API Security important?
1716
- [05:15](/shows/mdc-in-the-field/api-security#time=05m15s) - The state of the API Security Market
1817
- [07:06](/shows/mdc-in-the-field/api-security#time=07m06s) - What are the risks associated with API?
1918
- [11:25](/shows/mdc-in-the-field/api-security#time=11m25s) - What you should expect from Defender for APIs
2019
- [15:53](/shows/mdc-in-the-field/api-security#time=15m53s) - Demonstration
21-
-
20+
2221
## Recommended resources
2322
- Learn more about [Defender for APIs](defender-for-apis-introduction.md)
2423
- Subscribe to [Microsoft Security on YouTube](https://www.youtube.com/playlist?list=PL3ZTgFEc7LysiX4PfHhdJPR7S8mGO14YS)
@@ -34,4 +33,4 @@ ms.date: 06/08/2023
3433
## Next steps
3534

3635
> [!div class="nextstepaction"]
37-
> [Agentless Container Posture Management in Defender for Cloud](episode-thirty-three.md)
36+
> [Agentless Container Posture Management in Defender for Cloud](episode-thirty-three.md)

articles/defender-for-cloud/episode-thirty.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,8 @@ ms.date: 05/14/2023
99
# New Custom Recommendations for AWS and GCP in Defender for Cloud
1010

1111
**Episode description**: In this episode of Defender for Cloud in the Field, Yael Genut joins Yuri Diogenes to talk about the new custom recommendations for AWS and GCP. Yael explains the importance of creating custom recommendations in a multicloud environment and how to use Kusto Query Language to create these customizations. Yael also demonstrates the step-by-step process to create custom recommendations using this new capability and how these custom recommendations appear in the Defender for Cloud dashboard.
12-
<br>
13-
<br>
14-
<iframe src="https://aka.ms/docs/player?id=41612fbe-4c9c-4cd2-9a99-3fbd94d31bec" width="1080" height="530" allowFullScreen="true" frameBorder="0"></iframe>
12+
13+
> [!VIDEO https://aka.ms/docs/player?id=41612fbe-4c9c-4cd2-9a99-3fbd94d31bec]
1514
1615
- [01:44](/shows/mdc-in-the-field/new-custom-recommendations#time=01m44s) - Understanding custom recommendations
1716
- [03:15](/shows/mdc-in-the-field/new-custom-recommendations#time=03m15s) - Creating a custom recommendation based on a template
@@ -28,12 +27,12 @@ ms.date: 05/14/2023
2827

2928
- Follow us on social media:
3029

31-
- [LinkedIn](https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbFk5TXZuQld2NlpBRV9BQlJqMktYSm95WWhCZ3xBQ3Jtc0tsQU13MkNPWGNFZzVuem5zc05wcnp0VGxybHprVTkwS2todWw0b0VCWUl4a2ZKYVktNGM1TVFHTXpmajVLcjRKX0cwVFNJaDlzTld4MnhyenBuUGRCVmdoYzRZTjFmYXRTVlhpZGc4MHhoa3N6ZDhFMA&q=https%3A%2F%2Fwww.linkedin.com%2Fshowcase%2Fmicrosoft-security%2F)
30+
- [LinkedIn](https://www.linkedin.com/showcase/microsoft-security/)
3231
- [Twitter](https://twitter.com/msftsecurity)
3332

3433
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity)
3534

3635
## Next steps
3736

3837
> [!div class="nextstepaction"]
39-
> [Understanding data aware security posture capability](episode-thirty-one.md)
38+
> [Understanding data aware security posture capability](episode-thirty-one.md)

0 commit comments

Comments
 (0)