Skip to content

Commit ede3bd9

Browse files
Merge pull request #249458 from ElazarK/WI149907-MDC-in-the-field-epsiode-37
created episode 37
2 parents b9309d7 + 6a3cbfb commit ede3bd9

File tree

4 files changed

+78
-3
lines changed

4 files changed

+78
-3
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -877,7 +877,11 @@
877877
- name: Understanding the DevOps Threat Matrix
878878
href: episode-thirty-four.md
879879
- name: Security alert correlation
880-
href: episode-thirty-five.md
880+
href: episode-thirty-five.md
881+
- name: Defender CSPM support for GCP and more updates
882+
href: episode-thirty-six.md
883+
- name: Capabilities to counter identity-based supply chain attacks
884+
href: episode-thirty-seven.md
881885
- name: Manage user data
882886
href: privacy.md
883887
- name: Microsoft Defender for IoT documentation

articles/defender-for-cloud/episode-thirty-five.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.date: 08/08/2023
77

88
# Security alert correlation
99

10-
**Episode description**: In this episode of Defender for Cloud in the Field, Daniel Davrayev joins Yuri Diogenes to talk about security alert correlation capability in Defender for Cloud. Daniel talks about the importance of have a built-in capability to correlate alerts in Defender for Cloud, how this saves time for SOC analysts to investigate alert and respond to potential threats. Daniel also explains how data correlation works and demonstrate how this correlation appears in Defender for Cloud dashboard as a security incident.
10+
**Episode description**: In this episode of Defender for Cloud in the Field, Daniel Davrayev joins Yuri Diogenes to talk about security alert correlation capability in Defender for Cloud. Daniel talks about the importance of have a built-in capability to correlate alerts in Defender for Cloud, how this capability saves time for SOC analysts to investigate alert and respond to potential threats. Daniel also explains how data correlation works and demonstrate how this correlation appears in Defender for Cloud dashboard as a security incident.
1111

1212
> [!VIDEO https://aka.ms/docs/player?id=6573561d-70a6-4b4c-ad16-9efe747c9a61]
1313
@@ -34,4 +34,4 @@ ms.date: 08/08/2023
3434
## Next steps
3535

3636
> [!div class="nextstepaction"]
37-
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)
37+
> [Defender CSPM support for GCP and more updates](episode-thirty-six.md)
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
title: Capabilities to counter identity-based supply chain attacks | Defender for Cloud in the Field
3+
description: Learn about Defender for Cloud's capability to counter identity-based supply chain attacks.
4+
ms.topic: reference
5+
ms.date: 08/29/2023
6+
---
7+
8+
# Capabilities to counter identity-based supply chain attacks
9+
10+
**Episode description**: In this episode of Defender for Cloud in the Field, Security Researcher, Hagai Kestenberg joins Yuri Diogenes to talk about Defender for Cloud capabilities to counter identity-based supply chain attacks. Hagai explains the different types of supply chain attacks and focuses on the risks of identity-based supply chain attacks. Hagai makes recommendations to mitigate this type of attack and explain the new capability in Defender for Resource Manager that can be used to identify this type of attack. Hagai also demonstrates the new alert generated by Defender for Resource Manager when this type of attack is identified.
11+
12+
> [!VIDEO https://aka.ms/docs/player?id=d69fb652-46a7-4f8c-8632-8cf2cbc3685a]
13+
14+
- [01:41](/shows/mdc-in-the-field/counter-identity-based-supply-chain-attacks#time=01m41s) - Intro
15+
- [04:04](/shows/mdc-in-the-field/counter-identity-based-supply-chain-attacks#time=04m04s) - Understanding identity-based supply chain attacks
16+
- [06:50](/shows/mdc-in-the-field/counter-identity-based-supply-chain-attacks#time=06m50s) - Identity-based supply chain attacks sample scenario
17+
- [08:26](/shows/mdc-in-the-field/counter-identity-based-supply-chain-attacks#time=08m26s) - Best practices to prevent identity-based supply chain attacks
18+
- [10:29](/shows/mdc-in-the-field/counter-identity-based-supply-chain-attacks#time=10m29s) - Demonstration
19+
20+
## Recommended resources
21+
22+
- [Learn more](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/announcing-microsoft-defender-for-cloud-capabilities-to-counter/ba-p/3876012)
23+
- Subscribe to [Microsoft Security on YouTube](https://www.youtube.com/playlist?list=PL3ZTgFEc7LysiX4PfHhdJPR7S8mGO14YS)
24+
- Learn more about [Microsoft Security](https://msft.it/6002T9HQY)
25+
26+
- Follow us on social media:
27+
28+
- [LinkedIn](https://www.linkedin.com/showcase/microsoft-security/)
29+
- [Twitter](https://twitter.com/msftsecurity)
30+
31+
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity)
32+
33+
## Next steps
34+
35+
> [!div class="nextstepaction"]
36+
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
---
2+
title: Defender CSPM support for GCP and more updates | Defender for Cloud in the Field
3+
description: Learn about Defender for CSPM's support for GCP and more updates for Defender for Cloud.
4+
ms.topic: reference
5+
ms.date: 08/29/2023
6+
---
7+
8+
# Defender CSPM support for GCP and more updates
9+
10+
**Episode description**: In this episode of Defender for Cloud in the Field, Amit Biton joins Yuri Diogenes to talk about the new Defender CSPM support for GCP. Amit talks about the recent investments in multicloud and the alignment with Microsoft CNAPP strategy. Amit covers the capabilities that were released in Defender CSPM to cover GCP, including the new Microsoft Cloud Security Benchmark for GCP. Amit also demonstrate the use of Attack Path and Cloud Security explorer in a multicloud environment.
11+
12+
> [!VIDEO https://aka.ms/docs/player?id=673a8d91-3b0e-4bfb-986c-888ae7532320]
13+
14+
- [01:23](/shows/mdc-in-the-field/support-gcp#time=01m23s) - Overview of the new announcements for multicloud
15+
- [05:09](/shows/mdc-in-the-field/support-gcp#time=05m09s) - Microsoft CNAPP strategy
16+
- [08:55](/shows/mdc-in-the-field/support-gcp#time=08m55s) - Agentless capability
17+
- [12:54](/shows/mdc-in-the-field/support-gcp#time=12m54s) - Demonstration
18+
19+
## Recommended resources
20+
21+
- [Learn more](/azure/defender-for-cloud/concept-cloud-security-posture-management)
22+
- Subscribe to [Microsoft Security on YouTube](https://www.youtube.com/playlist?list=PL3ZTgFEc7LysiX4PfHhdJPR7S8mGO14YS)
23+
- Learn more about [Microsoft Security](https://msft.it/6002T9HQY)
24+
25+
- Follow us on social media:
26+
27+
- [LinkedIn](https://www.linkedin.com/showcase/microsoft-security/)
28+
- [Twitter](https://twitter.com/msftsecurity)
29+
30+
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity)
31+
32+
## Next steps
33+
34+
> [!div class="nextstepaction"]
35+
> [Capabilities to counter identity-based supply chain attacks](episode-thirty-seven.md)

0 commit comments

Comments
 (0)