You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security/fundamentals/end-to-end.md
+4-7Lines changed: 4 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,12 +7,12 @@ author: TerryLanfear
7
7
manager: rkarlin
8
8
9
9
ms.assetid: a5a7f60a-97e2-49b4-a8c5-7c010ff27ef8
10
-
ms.service: information-protection
11
-
ms.subservice: aiplabels
10
+
ms.service: security
11
+
ms.subservice: security-fundamentals
12
12
ms.topic: conceptual
13
13
ms.tgt_pltfrm: na
14
14
ms.workload: na
15
-
ms.date: 1/06/2022
15
+
ms.date: 01/29/2023
16
16
ms.author: terrylan
17
17
18
18
---
@@ -29,8 +29,6 @@ The security services map organizes services by the resources they protect (colu
29
29
- Detect threats – Services that identify suspicious activities and facilitate mitigating the threat.
30
30
- Investigate and respond – Services that pull logging data so you can assess a suspicious activity and respond.
31
31
32
-
The diagram includes the Microsoft cloud security benchmark, a collection of high-impact security recommendations you can use to help secure the services you use in Azure.
@@ -96,8 +94,7 @@ The [Microsoft cloud security benchmark](/security/benchmark/azure/introduction)
96
94
|[Azure Network Watcher](../../network-watcher/network-watcher-monitoring-overview.md)| Provides tools to monitor, diagnose, view metrics, and enable or disable logs for resources in an Azure virtual network. Network Watcher is designed to monitor and repair the network health of IaaS products which includes virtual machines, virtual networks, application gateways, and load balancers. |
97
95
|[Azure Policy](../../governance/policy/overview.md)| Helps to enforce organizational standards and to assess compliance at-scale. Azure Policy uses activity logs, which are automatically enabled to include event source, date, user, timestamp, source addresses, destination addresses, and other useful elements. |
98
96
|**Data & Application**||
99
-
|[Microsoft Defender for container registries](../../security-center/defender-for-container-registries-introduction.md)| Includes a vulnerability scanner to scan the images in your Azure Resource Manager-based Azure Container Registry registries and provide deeper visibility into your images' vulnerabilities. |
100
-
|[Microsoft Defender for Kubernetes](../../security-center/defender-for-kubernetes-introduction.md)| Provides cluster-level threat protection by monitoring your AKS-managed services through the logs retrieved by Azure Kubernetes Service (AKS). |
97
+
|[Microsoft Defender for Containers](../../defender-for-cloud/defender-for-containers-introduction.md)| A cloud-native solution that is used to secure your containers so you can improve, monitor, and maintain the security of your clusters, containers, and their applications. |
101
98
|[Microsoft Defender for Cloud Apps](/cloud-app-security/what-is-cloud-app-security)| A cloud access security broker (CASB) that operates on multiple clouds. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your cloud services. |
0 commit comments