Skip to content

Commit ffc44b4

Browse files
episode-twenty
added episode twenty, updated ep. 19 next steps
1 parent 137dfdf commit ffc44b4

File tree

2 files changed

+48
-1
lines changed

2 files changed

+48
-1
lines changed

articles/defender-for-cloud/episode-nineteen.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,4 +45,4 @@ ms.date: 11/03/2022
4545
## Next steps
4646

4747
> [!div class="nextstepaction"]
48-
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)
48+
> [Cloud security explorer and Attack path analysis](episode-twenty.md)
Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
---
2+
title: Cloud security explorer and Attack path analysis | Defender for Cloud in the Field
3+
titleSuffix: Microsoft Defender for Cloud
4+
description: Learn about cloud security explorer and attack path analysis.
5+
ms.topic: reference
6+
ms.date: 11/06/2022
7+
---
8+
9+
# Cloud security explorer and Attack path analysis | Defender for Cloud in the Field
10+
11+
**Episode description**: In this episode of Defender for Cloud in the Field, Tal Rosler joins Yuri Diogenes to talk about Cloud security explorer and Attack path analysis, two new capabilities in Defender for CSPM that were released at Ignite. The talk explains the rationale behind creating these features and how to use these features to prioritize what is more important to keep your environment more secure. Tal also demonstrates how to use these capabilities to quickly identify vulnerabilities and misconfigurations in cloud workloads.
12+
<br>
13+
<br>
14+
<iframe src="https://aka.ms/docs/player?id=ce442350-7fab-40c0-b934-d93027b00853" width="1080" height="530" allowFullScreen="true" frameBorder="0"></iframe>
15+
16+
- [01:27](/shows/mdc-in-the-field/defender-for-devops#time=01m16s) - The busines case for Cloud Security Graph
17+
18+
- [03:00](/shows/mdc-in-the-field/defender-for-devops) - What is Cloud Security Graph
19+
20+
- [05:06](/shows/mdc-in-the-field/defender-for-devops)- Demonstration
21+
22+
- [09:30](/shows/mdc-in-the-field/defender-for-devops) - How paths are created under attack path
23+
24+
- [12:00](/shows/mdc-in-the-field/defender-for-devops) - Cloud Security explorer demonstration
25+
26+
- [19:25](/shows/mdc-in-the-field/defender-for-devops) - Saving Cloud Security Explorer queries
27+
28+
29+
## Recommended resources
30+
- [Learn more](/defender-for-cloud/concept-attack-path.md) about Attack path.
31+
- Subscribe to [Microsoft Security on YouTube](https://www.youtube.com/playlist?list=PL3ZTgFEc7LysiX4PfHhdJPR7S8mGO14YS)
32+
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity)
33+
- For more about [Microsoft Security](https://msft.it/6002T9HQY)
34+
35+
- Follow us on social media:
36+
37+
- [LinkedIn](https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbFk5TXZuQld2NlpBRV9BQlJqMktYSm95WWhCZ3xBQ3Jtc0tsQU13MkNPWGNFZzVuem5zc05wcnp0VGxybHprVTkwS2todWw0b0VCWUl4a2ZKYVktNGM1TVFHTXpmajVLcjRKX0cwVFNJaDlzTld4MnhyenBuUGRCVmdoYzRZTjFmYXRTVlhpZGc4MHhoa3N6ZDhFMA&q=https%3A%2F%2Fwww.linkedin.com%2Fshowcase%2Fmicrosoft-security%2F)
38+
- [Twitter](https://twitter.com/msftsecurity)
39+
40+
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity)
41+
42+
- Learn more about [Microsoft Security](https://msft.it/6002T9HQY)
43+
44+
## Next steps
45+
46+
> [!div class="nextstepaction"]
47+
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)

0 commit comments

Comments
 (0)