Book Image

Microsoft Defender for Cloud Cookbook

By : Sasha Kranjac
Book Image

Microsoft Defender for Cloud Cookbook

By: Sasha Kranjac

Overview of this book

Microsoft Defender for Cloud is a multi-cloud and hybrid cloud security posture management solution that enables security administrators to build cyber defense for their Azure and non-Azure resources by providing both recommendations and security protection capabilities. This book will start with a foundational overview of Microsoft Defender for Cloud and its core capabilities. Then, the reader is taken on a journey from enabling the service, selecting the correct tier, and configuring the data collection, to working on remediation. Next, we will continue with hands-on guidance on how to implement several security features of Microsoft Defender for Cloud, finishing with monitoring and maintenance-related topics, gaining visibility in advanced threat protection in distributed infrastructure and preventing security failures through automation. By the end of this book, you will know how to get a view of your security posture and where to optimize security protection in your environment as well as the ins and outs of Microsoft Defender for Cloud.
Table of Contents (12 chapters)

Chapter 9: Information Protection

Users and organizations work with ever-growing volumes and types of data, spread over various repositories, and security personnel and administrators have to protect an increasing number of resources. Not all resources are equal; some store more sensitive information than others, and to effectively protect their environments, security professionals have to know where to prioritize the protection.

Microsoft Defender for Cloud supports SQL information protection policies – a classification mechanism, and Microsoft Purview integration as well, which is a data governance service. With these capabilities and service integrations, Defender for Cloud can provide additional alerts and recommendations based on discovered and monitored data sensitivity types.

In this chapter, you will learn how to work with sensitivity labels and information types as well as how to work with data classification. This will provide valuable information to Defender...