You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: unified-secops-platform/overview-plan.md
+31-7Lines changed: 31 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,10 +32,10 @@ Microsoft Defender XDR services include:
32
32
33
33
| Service | Description |
34
34
| ------- | ----------- |
35
-
|[**Microsoft Defender for Identity**](/defender-for-identity/what-is)| Identifies, detects, and investigates threats from both on-premises Active Directory and cloud identities like Microsoft Entra ID. |
36
35
|[**Microsoft Defender for Office 365**](/defender-office-365/mdo-about)| Protects against threats posed by email messages, URL links, and Office 365 collaboration tools. |
36
+
|[**Microsoft Defender for Identity**](/defender-for-identity/what-is)| Identifies, detects, and investigates threats from both on-premises Active Directory and cloud identities like Microsoft Entra ID. |
37
37
|[**Microsoft Defender for Endpoint**](/defender-endpoint/microsoft-defender-endpoint)| Monitors and protects endpoint devices, detects and investigates device breaches, and automatically responds to security threats. |
38
-
|**Enterprise IoT monitoring** from [Microsoft Defender for IoT](/defender-for-iot/microsoft-defender-iot)| Provides both IoT device discovery and security value for IoT devices. |
38
+
|[**Microsoft Defender for IoT**](/defender-for-iot/microsoft-defender-iot)| Provides both IoT device discovery and security value for IoT devices. |
39
39
|[**Microsoft Defender Vulnerability Management**](/defender-vulnerability-management/defender-vulnerability-management)| Identifies assets and software inventory, and assesses device posture to find security vulnerabilities. |
40
40
|[**Microsoft Defender for Cloud Apps**](/defender-cloud-apps/what-is-defender-for-cloud-apps)| Protects and controls access to SaaS cloud apps. |
41
41
@@ -51,17 +51,18 @@ Other services supported in the Microsoft Defender portal as part of Microsoft's
51
51
52
52
## Review service prerequisites
53
53
54
-
Before you deploy Microsoft's unified security operations platform, review the prerequisites for each service you plan to use. The following table lists the services and links to their prerequisites:
54
+
Before you deploy Microsoft's unified security operations platform, review the prerequisites for each service you plan to use. The following table lists the services and links for more information:
| Microsoft Defender XDR and Microsoft Defender for Office |[Microsoft Defender XDR prerequisites](/defender-xdr/prerequisites)|
59
+
| Microsoft Defender XDR |[Microsoft Defender XDR prerequisites](/defender-xdr/prerequisites)|
60
60
| Microsoft Sentinel |[Prerequisites to deploy Microsoft Sentinel](/azure/sentinel/prerequisites)|
61
61
|**Optional Microsoft Defender XDR services**||
62
+
| Microsoft Defender for Office |[Microsoft Defender XDR prerequisites](/defender-xdr/prerequisites)|
62
63
| Microsoft Defender for Identity |[Microsoft Defender for Identity prerequisites](/defender-for-identity/deploy/prerequisites)|
63
64
| Microsoft Defender for Endpoint |[Set up Microsoft Defender for Endpoint deployment](/defender-endpoint/production-deployment)|
64
-
| Enterprise monitoring with Microsoft Defender for IoT |[Prerequisites for Enterprise IoT security](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint#prerequisites)|
65
+
| Enterprise monitoring with Microsoft Defender for IoT |[Prerequisites for Defender for IoT in the Defender portal](/defender-for-iot/prerequisites)|
65
66
| Microsoft Defender Vulnerability Management |[Prerequisites & Permissions for Microsoft Defender Vulnerability Management](/defender-vulnerability-management/tvm-prerequisites)|
66
67
| Microsoft Defender for Cloud Apps |[Get started with Microsoft Defender for Cloud Apps](/defender-cloud-apps/get-started)|
67
68
|**Other services supported in the Microsoft Defender portal**||
@@ -71,6 +72,29 @@ Before you deploy Microsoft's unified security operations platform, review the p
71
72
| Microsoft Defender Threat Intelligence |[Prerequisites for Defender Threat Intelligence](/defender/threat-intelligence/learn-how-to-access-microsoft-defender-threat-intelligence-and-make-customizations-in-your-portal#prerequisites)|
72
73
| Microsoft Entra ID Protection |[Prerequisites for Microsoft Entra ID Protection](/entra/id-protection/how-to-deploy-identity-protection#prerequisites)|
73
74
75
+
## Review data security and privacy practices
76
+
77
+
Before you deploy Microsoft's unified security operations platform, make sure that you understand the data security and privacy practices for each service you plan to use. The following table lists the services and links for more information. Note that several services use the data security and retention practices for Microsoft Defender XDR instead of have separate practices of their own.
| Microsoft Defender XDR |[Data security and retention in Microsoft Defender XDR](/defender-xdr/data-privacy)|
83
+
| Microsoft Sentinel |[Geographical availability and data residency in Microsoft Sentinel](/azure/sentinel/geographical-availability-data-residency)|
84
+
|**Optional Microsoft Defender XDR services**||
85
+
| Microsoft Defender for Office |[Data security and retention in Microsoft Defender XDR](/defender-xdr/data-privacy)|
86
+
| Microsoft Defender for Identity |[Privacy with Microsoft Defender for Identity](/defender-for-identity/privacy-compliance)|
87
+
| Microsoft Defender for Endpoint |[Microsoft Defender for Endpoint data storage and privacy](/defender-endpoint/data-storage-privacy)|
88
+
| Enterprise monitoring with Microsoft Defender for IoT |[Data security and retention in Microsoft Defender XDR](/defender-xdr/data-privacy)|
89
+
| Microsoft Defender Vulnerability Management |[Microsoft Defender for Endpoint data storage and privacy](/defender-endpoint/data-storage-privacy)|
90
+
| Microsoft Defender for Cloud Apps |[Privacy with Microsoft Defender for Cloud Apps](/defender-cloud-apps/cas-compliance-trust)|
91
+
|**Other services supported in the Microsoft Defender portal**||
92
+
| Microsoft Security Exposure Management |[Data freshness, retention, and related functionality](/security-exposure-management/microsoft-security-exposure-management#data-freshness-retention-and-related-functionality)|
93
+
| Microsoft Security Copilot |[Privacy and data security in Microsoft Security Copilot](/copilot/security/privacy-data-security)|
94
+
| Microsoft Defender for Cloud |[Microsoft Defender for Cloud data security](/azure/defender-for-cloud/data-security)|
95
+
| Microsoft Defender Threat Intelligence |[Data security and retention in Microsoft Defender XDR](/defender-xdr/data-privacy)|
96
+
| Microsoft Entra ID Protection |[Microsoft Entra data retention](/entra/identity/monitoring-health/reference-reports-data-retention)|
97
+
74
98
## Plan your Log Analytics workspace architecture
75
99
76
100
To use Microsoft's unified SecOps platform, you need a Log Analytics workspace enabled for Microsoft Sentinel. A single Log Analytics workspace might be sufficient for many environments, but many organizations create multiple workspaces to optimize costs and better meet different business requirements. Microsoft's unified SecOps platform supports only a single workspace.
0 commit comments