Book Image

Azure Architecture Explained

By : David Rendón, Brett Hargreaves
Book Image

Azure Architecture Explained

By: David Rendón, Brett Hargreaves

Overview of this book

Azure is a sophisticated technology that requires a detailed understanding to reap its full potential and employ its advanced features. This book provides you with a clear path to designing optimal cloud-based solutions in Azure, by delving into the platform's intricacies. You’ll begin by understanding the effective and efficient security management and operation techniques in Azure to implement the appropriate configurations in Microsoft Entra ID. Next, you’ll explore how to modernize your applications for the cloud, examining the different computation and storage options, as well as using Azure data solutions to help migrate and monitor workloads. You’ll also find out how to build your solutions, including containers, networking components, security principles, governance, and advanced observability. With practical examples and step-by-step instructions, you’ll be empowered to work on infrastructure-as-code to effectively deploy and manage resources in your environment. By the end of this book, you’ll be well-equipped to navigate the world of cloud computing confidently.
Table of Contents (20 chapters)
1
Part 1 – Effective and Efficient Security Management and Operations in Azure
5
Part 2 – Architecting Compute and Network Solutions
12
Part 3 – Making the Most of Infrastructure-as-Code for Azure

Using Microsoft Sentinel to Mitigate Lateral Movement Paths

This chapter explains Microsoft Sentinel’s capabilities to detect and investigate advanced security threats, compromised identities, and potentially malicious actions in our organization.

Lateral movement is a technique used by cyber attackers to move across a network once they have gained access to one device. Microsoft Sentinel is a tool that helps to detect and respond to cyber threats.

In this chapter, we will review how organizations can identify suspicious activity and prevent lateral movement by setting up alerts and automated responses to potential threats using Microsoft Sentinel, helping to protect a network from cyberattacks and keep sensitive information safe.

By using Microsoft Sentinel to mitigate lateral movement paths, you can detect and prevent attackers from moving from one device to another within a network. This is important because once an attacker gains access to one device, they can use...