The Azure Security Center Workshop walks you through how you can use ASC to remediate security vulnerabilities and stay ahead of current and emerging threats with an integrated and analytics-driven approach. We go in-depth to detect actual threats earlier and explore methods to reduce false alarms. Synergy Advisors expert consultants will also talk about best practices from their years of experience working with Fortune 500 companies around this topic. In addition, there will be conversations around better together scenarios with other Microsoft products and services as well as possible areas for integration. After the workshop is completed Synergy Advisors can provide further information around Architecture Design Sessions or Proof of Concepts.
|Azure Security Center Introduction|
Overview of the session agenda and introduction to ASC integration points
|Azure Security Center Architecture pt. 1|
Learn about coverage, licensing, and onboarding with the security policy in ASC. Then review recommendations and secure score to see how to improve your security in your cloud infrastructure.
|ASC Lab pt. 1|
Explore your own environment in ASC, set your level of coverage for your subscription, set up your management groups, configure your security policies, and then review recommendations for your environment.
|Azure Security Center Architecture pt. 2|
Explore the recommendations further and the remediation process for these recommendations and how they affect your secure score. Learn how adaptive application controls restrict unauthorized applications on VMs. Review Just in time VM access and how this can provide access to VMs and harden them.
|ASC Lab pt. 2|
Take a deeper look at the recommendations section and each individual category. See what remediation steps ASC has with just a click and what scenarios have a more in-depth recommended remediation playbook. Configure JIT VM access for a VM in your environment.
|Azure Security Center Architecture pt. 3|
Review the Threat Protection aspects of ASC, specifically focusing on alerts, rules, and security maps that help detect malicious activity on your VMs.
|ASC Lab pt. 3|
Navigate the security alerts in your environment and experiment with generating alerts yourself with sign in activity or suspicious process execution.
|Close Out/Review Learnings/Q&A|
Recap on ASC and any outstanding questions