Re: Deploy Microsoft Defender for Cloud via Terraform (2023)

Terraform is an Infrastructure as a Code tool created by Hashicorp. It’s used to manage your infrastructure in Azure, as well as other clouds. In this article, we’ll be showing you how to deploy Microsoft Defender for Cloud (MDC) using Terraform from scratch. This way if you use Terraform, it’s recommended that you stick entirely with Terraform and don’t use any other management methods such as the Azure Portal.

As part of using Terraform to manage MDC, you will need to setup the Terraform configuration in a workspace including the Azure Resource Manager (RM) provider which configures your Azure resources. In this workspace, you’ll have the following files:

  • Main.tf: The declarative configuration of the state of your MDC deployment. This is where all the updates for your Azure resources are performed, including the deployment of MDC.
  • Variables.tf: Contains different values per environment e.g., development vs production environment.
  • Outputs.tf: Declares information that you only determine after deployment

The following commands for Terraform are most crucial for you to know:

Terraform init
  • Summary: Initialize Terraform.
  • Typically run this once or just when adding in new providers or new versions
  • This will parse through all the workspace files to create an initial state of determining what is needed e.g., plugins referenced in the Main.tf file e.g., azure plugin.
  • Result: Once you run this file It will download these files to a terraform subfolder called .terraform subfolder where it will store the Azure RM provider.
Terraform plan
  • Summary: View the changes that will be applied.
  • Creates an execution plan of the actions needed to make the current state match the desired configuration in the terraform files.
  • No changes in Azure will be made with this command, it will just show you me what will be done but won’t do any of the changes.
Terraform apply
  • Summary: Applies the changes from main.tf to your Azure environment.
  1. Go to Downloads | Terraform by HashiCorp and download the Terraform file relevant to your device.
  2. Then move the downloaded Terraform application in a directory of your choice.
  3. You will need to add the path that Terraform is found in as an environment variable if you’re using Windows. If this still doesn’t work, then use the following command:
$env:PATH =$env:PATH+";'<path to Terraform installation directory>”"
  1. Go to the Microsoft Defender for Cloud GitHub repository and clone the Terraform configuration to the same directory.
  2. Open the directory that you just cloned in Visual Studio Code or your preferred source code editor.
  3. In the terminal of the editor, test that Terraform has been installed correctly by using the following command:
terraform -version

Now you have confirmed that Terraform has been correctly installed.

To manage Azure resources with Terraform, you need to use the Azure RM provider. In a providers.tf file, you will place the following Terraform declarations, which state you are going to work with a minimum Terraform and Azure RM version:

(Video) Managing Microsoft Defender for Cloud as Code

terraform { required_version = ">=0.12" required_providers { azurerm = { source = "hashicorp/azurerm" version = "~>2.0" }}provider "azurerm" { features {}}

This providers declaration will be used next by the Terraform initialization procedure to set itself up for Azure management. See more guidance on this provider in the Terraform resources for MDC section.

  1. First thing you need to do is logging in to Azure, using the following command (your web browser will open up a new tab asking you to sign in with your Azure credentials):
az login

2. You will need to initialize Terraform to prepare the current working directory to be used with Terraform and to install the required providers, using the following command:

terraform init
  1. Run the following command to determine what changes are required in Azure to match the Main.tf file:
terraform plan

This allows you to see what changes are different from your main.tf and what is in your Azure environment. All the Azure configuration should go in the main.tf file.

  1. When you’re satisfied with the proposed changes, then you run the following command to actually apply the changes:
terraform apply

You now have the configuration needed for MDC.

You can make further changes to your main.tf file which will be incorporated to your Azure environment when you run the terraform apply command again.

Note: Once you start using Terraform to deploy your Azure resources, it’s a best practise to continue using terraform for this. Try to avoid using the Azure Portal UI to make further changes as that may cause issues in your Terraform configuration.

There are many Terraform resources available for setting up MDfC. You can browse for them in the Azure RM Terraform provider documentation. You will notice they appear aggregated under “Security Center”, which was the previous brand for MDfC. In this section, you will learn which Terraform resources to use for each MDfC setup step, for a particular Azure subscription.

(Video) Getting Started with Microsoft Defender for Cloud

Many of the Terraform examples below are going to reference the current Azure subscription ID we are working with. This is done by means of a data declaration which stores the current Azure subscription properties:

data "azurerm_subscription" "current" {}

Note: The example code below should go into your main.tf file.

Enabling the default Azure Security Benchmark Policy initiative

After an Azure Subscription is registered for the Microsoft.Security resource provider – this should have at least happened automatically after you ran terraform init –, MDC will eventually enable the default Azure Policy initiative for Azure Security Benchmark, which fuels its Security Posture recommendations. As this will happen only after some hours, you may want to leverage Terraform to enable it yourself and speed things up.

resource "azurerm_subscription_policy_assignment" "asb_assignment" { name = "azuresecuritybenchmark" display_name = "Azure Security Benchmark" policy_definition_id = "/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8" subscription_id = data.azurerm_subscription.current.id}

We are using the Policy Assignment resource applied at the Subscription level and we are referring to the Azure Security Benchmark Policy Initiative ID. You will notice the use of the data.azurerm_subscription.current data resource we declared earlier, to populate the Subscription ID.

Enabling MDC Plans

Now that we’ve already set up Security Posture, let’s move on to Workload Protection. After choosing which Defender Plans you want to enable, you’ll declare a Terraform resource for each plan.

resource "azurerm_security_center_subscription_pricing" "mdc_arm" { tier = "Standard" resource_type = "Arm"}resource "azurerm_security_center_subscription_pricing" "mdc_servers" { tier = "Standard" resource_type = "VirtualMachines"}

In the examples above, we are enabling Defender for ARM and Defender for Servers. For other plans, check out the Terraform documentation.

Enabling integrations with MDE and MDCA

The integrations with Microsoft Defender for Endpoint and Microsoft Defender for Cloud Apps are enabled by default, but you may want to manage them as code.

(Video) Maximizing Microsoft Azure Security with Terraform

resource "azurerm_security_center_setting" "setting_mcas" { setting_name = "MCAS" enabled = false}resource "azurerm_security_center_setting" "setting_mde" { setting_name = "WDATP" enabled = true}

Again, there is a specific Terraform resource to enable MDC integrations. We are using the same resource for both integrations, just changing the setting name: MCAS for Microsoft Defender for Cloud Apps and WDATP for Microsoft Defender for Endpoint.

Setting up security contacts

If MDC needs to notify you about a security incident, it’s a good idea to have e-mail and phone contacts set up.

resource "azurerm_security_center_contact" "mdc_contact" { email = "john.doe@contoso.com" phone = "+351919191919" alert_notifications = true alerts_to_admins = true}

The phone property is the only optional one. The alert_notifications property enables/disables sending notifications to the security contact, while the alerts_to_admins is about sending notifications to the Azure Subscription administrators.

Enabling Log Analytics agent auto-provisioning

OK, now that we have set the basics up, let’s configure more advanced features, such as auto-provisioning Log Analytics agents, in the context of the Defender for Servers plan. This involves multiple steps and Azure resources. First, we must turn auto-provisioning on:

resource "azurerm_security_center_auto_provisioning" "auto-provisioning" { auto_provision = "On"}

There’s a specific resource for that and it’s very simple to deal with. It’s just an On/Off property. Next, we are going to associate Defender for Servers to a specific Log Analytics workspace.

resource "azurerm_security_center_workspace" "la_workspace" { scope = data.azurerm_subscription.current.id workspace_id = "/subscriptions/<subscription id>/resourcegroups/<resource group name>/providers/microsoft.operationalinsights/workspaces/<workspace name>"}

The declaration above will work for an existing Log Analytics workspace. If you want to create the Log Analytics workspace together with MDC, you will use a slightly different approach:

resource "azurerm_resource_group" "security_rg" { name = "security-rg" location = "West Europe"}resource "azurerm_log_analytics_workspace" "la_workspace" { name = "mdc-security-workspace" location = azurerm_resource_group.security_rg.location resource_group_name = azurerm_resource_group.security_rg.name sku = "PerGB2018"}resource "azurerm_security_center_workspace" "la_workspace" { scope = data.azurerm_subscription.current.id workspace_id = azurerm_log_analytics_workspace.la_workspace.id}

In the declarations above, we create a Resource Group and Log Analytics Workspace and then reference its ID it in the MDC workspace resource.

(Video) Microsoft Defender for Containers in a multi-cloud environment | Defender for Cloud in the Field #9

Enabling Vulnerability Assessment auto-provisioning

Unlike the Log Analytics counterpart, Vulnerability Assessment auto-provisioning is configured with the help of an Azure Policy assignment. The choice between leveraging Qualys or MDE vulnerability assessment is done as a Policy assignment parameter.

resource "azurerm_subscription_policy_assignment" "va-auto-provisioning" { name = "mdc-va-autoprovisioning" display_name = "Configure machines to receive a vulnerability assessment provider" policy_definition_id = "/providers/Microsoft.Authorization/policyDefinitions/13ce0167-8ca6-4048-8e6b-f996402e3c1b" subscription_id = data.azurerm_subscription.current.id identity { type = "SystemAssigned" } location = "West Europe" parameters = <<PARAMS{ "vaType": { "value": "mdeTvm" } }PARAMS}resource "azurerm_role_assignment" "va-auto-provisioning-identity-role" { scope = data.azurerm_subscription.current.id role_definition_id = "/providers/Microsoft.Authorization/roleDefinitions/fb1c8493-542b-48eb-b624-b4c8fea62acd" principal_id = azurerm_subscription_policy_assignment.va-auto-provisioning.identity[0].principal_id}

In the example above, we chose the MDE vulnerability assessment (mdeTvm value for the vaType Policy parameter). If you prefer to use Qualys, then you must specify default for the vaType parameter or simply remove the parameters block.

We are also assigning the Security Admin role to the Managed Identity that will be used to perform the automatic provisioning of the Vulnerability Assessment solution.

Configuring Continuous Export settings

The last Terraform resource for MDC we cover in this article is the one allowing you to configure Continuous Export settings. You have many configuration possibilities available. In the example below, we are exporting to a specific Log Analytics workspace High/Medium Security Alerts and all the Secure Score controls. We are referring to a Log Analytics workspace ID that was declared in the same Main.tf file.

resource "azurerm_security_center_automation" "la-exports" { name = "ExportToWorkspace" location = azurerm_resource_group.security_rg.location resource_group_name = azurerm_resource_group.security_rg.name action { type = "loganalytics" resource_id = azurerm_log_analytics_workspace.la_workspace.id } source { event_source = "Alerts" rule_set { rule { property_path = "Severity" operator = "Equals" expected_value = "High" property_type = "String" } rule { property_path = "Severity" operator = "Equals" expected_value = "Medium" property_type = "String" } } } source { event_source = "SecureScores" } source { event_source = "SecureScoreControls" } scopes = [ data.azurerm_subscription.current.id ]}

In summary, this article covered how to deploy Microsoft Defender for Cloud using Terraform.

Huge thanks to the reviewers of this post:

(Video) Shift-Left and Secure Your Code Using Microsoft Defender for DevOps

@Safeena Begum Lepakshi, Senior Program Manager, Microsoft Defender for Cloud

@Yuri Diogenes, Principal PM Manager, Microsoft Defender for Cloud

FAQs

How do I deploy Microsoft Defender to the cloud? ›

Search for and select Microsoft Defender for Cloud. In the Defender for Cloud menu, select Environment settings. Select the subscription or workspace that you want to protect. Select Enable all to enable all of the plans for Defender for Cloud.

Which Azure resource should you use to automate the response to a Microsoft Defender for Cloud security Alert? ›

Create a security automation for specific security alerts by using an Azure Resource Manager template (ARM template) or Bicep | Microsoft Learn.

How to enable Microsoft Defender for Cloud in Azure subscription? ›

Azure portal
  1. Sign in to the Azure portal.
  2. Navigate to your storage account.
  3. In the storage account menu, in the Security + networking section, select Microsoft Defender for Cloud.
  4. On-upload Malware Scanning and Sensitive data threat detection are enabled by default. ...
  5. Select Enable on storage account.
Mar 27, 2023

What is the first step when configuring the legacy AWS connector in Microsoft Defender for Cloud? ›

Navigate to Defender for Cloud > Environment settings. Select Add environment > Amazon Web Services. Enter the details of the AWS account, including the location where you'll store the connector resource. You can also scan specific AWS regions or all available regions (default).

What are the deployment modes of Defender for Cloud apps? ›

Microsoft Defender for Cloud Apps is a Cloud Access Security Broker (CASB) that supports various deployment modes including log collection, API connectors, and reverse proxy.

What is the difference between Defender for Cloud and Defender for Cloud apps? ›

Defender for Cloud is all about protecting workloads in Azure (and AWS & GCP, hence the name change from Azure Defender to Defender for Cloud), whereas Defender for Cloud Apps is all about spotting shadow IT, managing SaaS service access by your end-users, and applying policy.

Is Azure security Center now called Microsoft Defender for Cloud? ›

Azure Security Center and Azure Defender are now Microsoft Defender for Cloud.

How do I automate Azure resource deployment? ›

You can write an Automation PowerShell runbook that deploys an Azure resource by using an Azure Resource Manager template. Templates allow you to use Azure Automation to automate deployment of your Azure resources. You can maintain your Resource Manager templates in a central, secure location, such as Azure Storage.

How do I automate Azure deployment? ›

To automate your infrastructure, you can use Azure Bicep. To configure virtual machines (VMs), you can use cloud-init (for Linux VMs) or Azure Automation State Configuration (DSC). To automate application deployment, you can use Azure DevOps Services, GitHub, Jenkins, or other CI/CD solutions.

How does Microsoft Defender for Cloud apps work? ›

Microsoft Defender for Cloud Apps is a Cloud Access Security Broker (CASB) that operates on multiple clouds. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your cloud services.

What is the difference between Defender for Cloud basic and enhanced? ›

Defender for Cloud provides unified security management and threat protection across your hybrid and multicloud workloads. While the free features offer limited security for your Azure resources only, enabling enhanced security features extends these capabilities to on-premises and other clouds.

Why would you use Microsoft Defender for Cloud? ›

Microsoft Defender for Cloud is a unified cloud-native application protection platform that helps strengthen your security posture, enables protection against modern threats, and helps reduce risk throughout the cloud application lifecycle across multicloud and hybrid environments.

How to setup and deploy Microsoft Endpoint Management and Defender for Endpoint? ›

Create a conditional access policy
  1. Sign in to the Microsoft Intune admin center.
  2. Select Endpoint security > Conditional Access > New policy.
  3. Enter a policy Name and select Users and groups. ...
  4. Select Cloud apps, and then choose which apps to protect. ...
  5. Select Conditions > Client apps to apply the policy to apps and browsers.
Feb 28, 2023

What are the prerequisites for Microsoft Defender for Cloud Apps? ›

To set up Defender for Cloud Apps, you must be a Global Administrator or a Security Administrator in Azure Active Directory or Office 365. It's important to understand that a user who is assigned an admin role will have the same permissions across all of the cloud apps that your organization has subscribed to.

What is the AWS equivalent of Microsoft Defender? ›

Features: AWS GuardDuty monitors AWS accounts, and offers threat response and remediation features. Microsoft Defender for Cloud has hybrid/multi-cloud solutions, policy administration, network maps, and real-time assessment for remediation.

Where does Microsoft Defender for Cloud store data? ›

Microsoft Defender for Cloud Apps is now part of Microsoft 365 Defender and can be accessed through its portal at: https://security.microsoft.com.

How do I ensure that Microsoft Defender for Cloud apps integration with Microsoft Defender for Cloud is selected? ›

Under General, select Advanced features. Toggle the Microsoft Defender for Cloud Apps to On. Select Apply. It takes up to two hours after you enable the integration for the data to show up in Defender for Cloud Apps.

What are three uses of Microsoft Defender for Cloud? ›

Microsoft Defender for Cloud is a unified cloud-native application protection platform that helps strengthen your security posture, enables protection against modern threats, and helps reduce risk throughout the cloud application lifecycle across multicloud and hybrid environments.

Is Defender for endpoint part of Defender for Cloud? ›

Defender for Cloud automatically enables the Defender for Endpoint sensor on all supported machines connected to Defender for Cloud.

Is Microsoft Defender for Cloud a SIEM? ›

Microsoft Defender for Cloud can stream your security alerts into the most popular Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), and IT Service Management (ITSM) solutions.

What is the difference between Microsoft Defender and Microsoft Defender for Endpoint? ›

Key Differences to Note

One key difference between the two is that Office 365 does not include any endpoint security features, whereas Microsoft Defender for Endpoint is specifically designed to help protect your business against endpoint threats.

What is the old name for Microsoft Defender for cloud? ›

Microsoft Defender for Cloud (formerly known as Azure Security Center) is your tool for overall security posture management and threat protection.

What is the new name for Defender for Cloud? ›

Product Name Changes
Previous nameNew nameDate
Azure Defender for IoTMicrosoft Defender for IoTNovember 2021
Azure DefenderMicrosoft Defender for CloudNovember 2021
Azure Security CenterMicrosoft Defender for CloudNovember 2021
Azure SentinelMicrosoft SentinelNovember 2021
48 more rows

What is the old name for Microsoft Defender for cloud apps? ›

Azure Sentinel is now Microsoft Sentinel. Not a big deal you might think, but the second example is for Azure security center that has a new name called Microsoft Defender for Cloud.

How do I deploy Azure resources using terraform? ›

2. Create and apply the Terraform plan
  1. Browse to the Azure portal.
  2. Open Azure Cloud Shell. ...
  3. Change directories to the clouddrive directory. ...
  4. Create a directory named deploy . ...
  5. Create a directory named swap . ...
  6. Use the ls bash command to verify that you successfully created both directories.
Mar 19, 2023

How do you automate terraform deployments? ›

Automated Terraform CLI Workflow
  1. Initialize the Terraform working directory.
  2. Produce a plan for changing resources to match the current configuration.
  3. Have a human operator review that plan, to ensure it is acceptable.
  4. Apply the changes described by the plan.

Which tool is used to automate the deployment? ›

AWS CodeDeploy

It is a tool that is automated and works for deployment that is exclusively offered by Amazon. It is used for releasing new features without any Hassle. Cost price: Free for Amazon E2C instances. Chargeable for team-based on-premise instances.

How terraform works with Azure? ›

Terraform Azure providers enable you to manage all of your Azure infrastructure using the same declarative syntax and tooling. Using these providers you can: Provision core platform capabilities such as management groups, policies, users, groups, and policies.

How do I deploy automatically? ›

How to implement deployment automation
  1. Use the same deployment process for every environment, including production. ...
  2. Allow anyone with the necessary credentials to deploy any version of the artifact to any environment on demand in a fully automated fashion. ...
  3. Use the same packages for every environment.

How do I automate deployment process in Azure DevOps? ›

Azure DevOps Architecture:
  1. 1: The developer changes the application source code.
  2. 4: Continuous deployment within Azure Pipelines triggers an automated deployment of application artifacts with environment-specific configuration values.
  3. 5: The developer then deploys the artifacts to the Azure App Service.

How do I connect Defender for Cloud apps to Azure? ›

In the Microsoft 365 Defender portal, select Settings. Then choose Cloud Apps. Under Connected apps, select App Connectors. In the App connectors page, select +Connect an app, followed by Microsoft Azure.

Does Microsoft Defender works for both Cloud and on-premises? ›

Microsoft Defender for Servers extends protection to your Windows and Linux machines that run in Azure, Amazon Web Services (AWS), Google Cloud Platform (GCP), and on-premises.

Is Microsoft Defender for Cloud an antivirus? ›

Microsoft Defender Antivirus cloud protection helps protect against malware on your endpoints and across your network. We recommend keeping cloud protection turned on, because certain security features and capabilities in Microsoft Defender for Endpoint only work when cloud protection is enabled.

How does Defender for Cloud collect data? ›

Defender for Cloud collects data from your Azure virtual machines (VMs), Virtual Machine Scale Sets, IaaS containers, and non-Azure (including on-premises) machines to monitor for security vulnerabilities and threats. Some Defender plans require monitoring components to collect data from your workloads.

Can you use Defender for Endpoint without Intune? ›

With this capability, devices that aren't managed by Microsoft Intune or ConfigMgr can receive security configurations for Microsoft Defender directly from Endpoint Manager.

How do I deploy Microsoft Defender Endpoint? ›

Onboarding to Microsoft Defender for Endpoint is easy. From the navigation menu, select any item under the Endpoints section, or any Microsoft 365 Defender feature such as Incidents, Hunting, Action center, or Threat analytics to initiate the onboarding process.

Which deployment tool should be used to deploy Microsoft Defender for Endpoint for evaluation? ›

Step 2: Select deployment method
EndpointDeployment tool
Windows servers Linux serversIntegration with Microsoft Defender for Cloud
macOSLocal script Microsoft Intune JAMF Pro Mobile Device Management
Linux serversLocal script Puppet Ansible Chef Saltstack
AndroidMicrosoft Intune
2 more rows
Apr 5, 2023

How many hours will Microsoft Defender for Cloud apps display a status of disconnected for the SIEM? ›

The status shows as Disconnected if the connection is down for over 12 hours.

How do I grant access to Microsoft Defender for cloud apps? ›

To enable your app to access Defender for Cloud Apps and assign it 'Read all alerts' permission, on your application page, select API Permissions > Add permission > APIs my organization uses >, type Microsoft Cloud App Security, and then select Microsoft Cloud App Security.

What are the two versions of Microsoft Defender for Office 365 called? ›

Microsoft Defender for Office 365 Plan 1 is included in Microsoft 365 Business Premium. Microsoft Defender for Office 365 Plan 1 and Defender for Office 365 Plan 2 are each available as an add-on for certain subscriptions.

What are the two versions of Microsoft Defender for Office 365? ›

Microsoft Defender for Office 365 comes in two different Plan types. You can tell if you have Plan 1 if you have Real-time Detections, and Plan 2, if you have Threat Explorer (also called Explorer). The Plan you have influences the tools you see, so be sure that you're aware of your Plan as you learn.

Is Azure defender and Microsoft Defender same? ›

Microsoft Defender for Cloud (formerly known as Azure Security Center) gives you complete visibility and control over the security of hybrid cloud workloads, including compute, network, storage, identity, and application workloads.

Is part of Microsoft Defender for cloud? ›

Microsoft Defender for Cloud is a cloud security posture management (CSPM) and cloud workload protection solution that finds weak spots across your cloud configuration, helps strengthen the overall security posture of your environment, and helps protect workloads across multicloud and hybrid environments from evolving ...

How do I turn on Cloud delivered protection in Windows Defender? ›

Select the Virus & threat protection tile (or the shield icon on the left menu bar), and then, under Virus & threat protection settings, select Manage settings. Confirm that Cloud-based Protection and Automatic sample submission are switched to On.

How do I enable Defender for endpoint in Defender for Cloud? ›

From Defender for Cloud's menu, select Environment settings and select the subscription with the machines that you want to receive Defender for Endpoint. In the status of the Endpoint protection component, select On to enable the integration with Microsoft Defender for Endpoint.

Is Microsoft Defender for Cloud a CASB? ›

Microsoft Defender for Cloud Apps is a Cloud Access Security Broker (CASB) that operates on multiple clouds. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your cloud services.

Is Defender for Cloud an EDR? ›

The Defender for Endpoint – Defender for Cloud integration brings comprehensive Endpoint Detection and Response (EDR) capabilities to Microsoft Defender for Cloud.

Should you turn off Cloud delivered protection? ›

Cloud protection works together with Microsoft Defender Antivirus to deliver accurate, real-time, and intelligent protection. We recommend keeping cloud protection turned on. To learn more, see Why cloud protection should be turned on.

What is passive mode in Defender for Cloud? ›

In passive mode, Microsoft Defender Antivirus isn't used as the antivirus app, and threats are not remediated by Microsoft Defender Antivirus. However, threats can be remediated by Endpoint detection and response (EDR) in block mode.

How do I deploy Microsoft Defender endpoint? ›

Onboarding to Microsoft Defender for Endpoint is easy. From the navigation menu, select any item under the Endpoints section, or any Microsoft 365 Defender feature such as Incidents, Hunting, Action center, or Threat analytics to initiate the onboarding process.

Is Microsoft Defender for Endpoint the same as ATP? ›

it seems Microsoft Advanced Threat Protection is now Defender for Endpoint with Plan 1 and Plan 2. Defender for Microsoft Office 365 which seems to have replaced an ATP offering also has a Plan 1 and a Plan 2. We have a mix of Basic, Standard and Premium licenses.

How to allow Microsoft Defender for Endpoint to enforce Endpoint Security? ›

In the Microsoft Intune admin center (https://endpoint.microsoft.com), go to Endpoint security.
  1. Under Setup, choose Microsoft Defender for Endpoint.
  2. Under Endpoint Security Profile Settings, set the toggle for Allow Microsoft Defender for Endpoint to enforce Endpoint Security Configurations to On.
Apr 24, 2023

Videos

1. Configure Bicep code scanning in GitHub with Microsoft Defender for DevOps
(Will Velida)
2. Keep Calm and Deploy Defender for Servers
(Microsoft Security Community)
3. Start Secure and Stay Secure Across Your Multicloud Environments with Microsoft Defender for Cloud
(Microsoft Security Community)
4. Secure your Containers from Build to Runtime
(Microsoft Security Community)
5. Intro to Terraform - Deploy a Windows VM in Azure
(Trey Does Devops)
6. Enhance your CI/CD deployment with Azure Defender for ACR | Azure Security Center in the Field #26
(Microsoft Security)

References

Top Articles
Latest Posts
Article information

Author: Jerrold Considine

Last Updated: 08/27/2023

Views: 5937

Rating: 4.8 / 5 (58 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Jerrold Considine

Birthday: 1993-11-03

Address: Suite 447 3463 Marybelle Circles, New Marlin, AL 20765

Phone: +5816749283868

Job: Sales Executive

Hobby: Air sports, Sand art, Electronics, LARPing, Baseball, Book restoration, Puzzles

Introduction: My name is Jerrold Considine, I am a combative, cheerful, encouraging, happy, enthusiastic, funny, kind person who loves writing and wants to share my knowledge and understanding with you.