Skip to content

Commit 92f9798

Browse files
author
David Curwin
committed
Rename tutorial
1 parent b969b8a commit 92f9798

File tree

2 files changed

+9
-3
lines changed

2 files changed

+9
-3
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@
6464
- name: Planning and operations guide
6565
displayName: guide, planning, roles, policies, recommendations
6666
href: defender-for-cloud-planning-and-operations-guide.md
67-
- name: Protect your resources
67+
- name: Protect your VMs
6868
displayName: manage, access, harden
6969
href: tutorial-protect-resources.md
7070
- name: Investigate and respond to security alerts

articles/defender-for-cloud/tutorial-protect-resources.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,40 +1,46 @@
11
---
2-
title: Access & application controls tutorial - Microsoft Defender for Cloud
2+
title: Protect your VMs with Microsoft Defender for Servers
33
description: This tutorial shows you how to configure a just-in-time VM access policy and an application control policy.
44
ms.topic: tutorial
55
ms.custom: mvc
66
ms.date: 01/08/2023
77

88
---
9-
# Tutorial: Protect your resources with Microsoft Defender for Cloud
9+
# Tutorial: Protect your VMs with Microsoft Defender for Servers
1010

1111
Defender for Cloud limits your exposure to threats by using access and application controls to block malicious activity. Just-in-time (JIT) virtual machine (VM) access reduces your exposure to attacks by enabling you to deny persistent access to VMs. Instead, you provide controlled and audited access to VMs only when needed. Adaptive application controls help harden VMs against malware by controlling which applications can run on your VMs. Defender for Cloud uses machine learning to analyze the processes running in the VM and helps you apply allowlist rules using this intelligence.
1212

1313
In this tutorial you'll learn how to:
1414

1515
> [!div class="checklist"]
16+
>
1617
> * Configure a just-in-time VM access policy
1718
> * Configure an application control policy
1819
1920
## Prerequisites
21+
2022
To step through the features covered in this tutorial, you must have Defender for Cloud's enhanced security features enabled. A free trial is available. To upgrade, see [Enable enhanced protections](enable-enhanced-security.md).
2123

2224
## Manage VM access
25+
2326
JIT VM access can be used to lock down inbound traffic to your Azure VMs, reducing exposure to attacks while providing easy access to connect to VMs when needed.
2427

2528
Management ports don't need to be open always. They only need to be open while you're connected to the VM, for example to perform management or maintenance tasks. When just-in-time is enabled, Defender for Cloud uses Network Security Group (NSG) rules, which restrict access to management ports so they can't be targeted by attackers.
2629

2730
Follow the guidance in [Secure your management ports with just-in-time access](just-in-time-access-usage.md).
2831

2932
## Harden VMs against malware
33+
3034
Adaptive application controls help you define a set of applications that are allowed to run on configured resource groups, which among other benefits helps harden your VMs against malware. Defender for Cloud uses machine learning to analyze the processes running in the VM and helps you apply allowlist rules using this intelligence.
3135

3236
Follow the guidance in [Use adaptive application controls to reduce your machines' attack surfaces](adaptive-application-controls.md).
3337

3438
## Next steps
39+
3540
In this tutorial, you learned how to limit your exposure to threats by:
3641

3742
> [!div class="checklist"]
43+
>
3844
> * Configuring a just-in-time VM access policy to provide controlled and audited access to VMs only when needed
3945
> * Configuring an adaptive application controls policy to control which applications can run on your VMs
4046

0 commit comments

Comments
 (0)