0% found this document useful (0 votes)
1 views1 page

Microsoft Azure - Protecting Hybrid Cloud Workloads Using

The document provides a guide on using Azure Defender to protect hybrid cloud workloads, detailing its advanced threat analysis capabilities. It outlines the steps to onboard a non-Azure server, create a Log Analytics workspace, and connect a local computer for monitoring. Azure Defender offers intelligent security monitoring and detection for resources across various environments, including Azure and on-premises systems.

Uploaded by

animillasekhar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views1 page

Microsoft Azure - Protecting Hybrid Cloud Workloads Using

The document provides a guide on using Azure Defender to protect hybrid cloud workloads, detailing its advanced threat analysis capabilities. It outlines the steps to onboard a non-Azure server, create a Log Analytics workspace, and connect a local computer for monitoring. Azure Defender offers intelligent security monitoring and detection for resources across various environments, including Azure and on-premises systems.

Uploaded by

animillasekhar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Search...

DevOps Lifecycle DevOps Roadmap Docker Tutorial Kubernetes Tutorials Amazon Web Services [AWS] Tutorial AZURE Tutorials GCP Tutorials Docker Cheat sheet Kubernetes cheat sheet AWS interview q

Next Article: Microsoft Azure - Protecting Hybrid Cloud Workloads using


What are Azure Virtual Azure Defender
Machines?
Last Updated : 31 Mar, 2023

In this article, we will learn how to use Azure Defender to protect hybrid cloud workloads.
Azure Defender is a feature of the Security Center and provides advanced threat analysis
capabilities. It can also protect hybrid workloads. Let's try to have it monitor your local
computer.

There are several ways to onboard your computer, including onboarding it to Azure Arc. It
would show up in the inventory of the Security Center where it keeps track of things to
monitor and defend.

Configuring Azure Defender:

Follow the below steps to configure Azure Defender to protect Hybrid cloud applications:

Let's first add a non-Azure server. We will connect our local computer to a Log Analytics
workspace, which brings the logs into Security Center.

Then we will create a new log analytics workspace. First, select a resource group and now
fill in a name for the workspace.

Next, let's create the workspace. In the new workspace. We need to upgrade it so that it
has Azure Defender capabilities enabled on it.

Now we can add servers to the workspace. Here are the workspace details. We need these
to connect to it from our computer. Here, we have a Windows computer, so we will
download this Log Analytics agent, which is also available for Linux.

Now open it and get started. Next, we should read the entire agreement, and agree.

Next, we need to connect to Log Analytics, so click it.

Now we need to enter the details of the workspace, so the workspace ID and also the
workspace key. That's it.

Next, we do want updates and now install it. Our computer will be now connected.

It can take a while for the computer to show up in Security Center. We can drill down into it
to see recommendations. We get a lot of them because our computer is being monitored
and protected by Azure Defender.

The security recommendation comes with a quick fix. We just click "Fix" and confirm it and
the fix is applied.

Azure Defender is an advanced feature of Azure Security Center. It provides intelligent


security monitoring and detection capabilities and does this for resources in Azure, on-
premises, and in other clouds.

Comment More info Advertise with us Next Article


What are Azure Virtual Machines?

Similar Reads

Microsoft Azure Tutorial


Microsoft Azure is a cloud computing service that offers a variety of services such as computing, storage, networking, and
databases. It helps businesses and developers in building, deploying, and managing applications via Microsoft-Controlled data…
13 min read

Introduction

Storage

Network

What Are Azure Data Security Features?


Data security is a huge topic and it's one of the most important types of security in space today. Lots of hackers and world
governments are trying to break into databases because Data has got a lot of financial and other value. Azure has a multi-lay…
6 min read

Microsoft Azure - Virtual Network


Pre-requisite: Azure Whenever an organization moves from on-premises to a cloud-like Azure, they require the same
networking functionality as they had in on-premises deployment with some level of network isolation. Azure provides differe…
8 min read

Microsoft Azure - Find Orphaned Network Interface Cards(NICs)


In this article, you will see that how to find the unattached NICs also known as Azure Orphaned NICs. The main objective or
purpose of deleting the orphaned resources is to save the cost. When you delete a VM in Azure, the NIC attached to the VMs…
2 min read

What is Microsoft Azure Network Watcher?


Pre-Requisite: Azure In an on-premises network, it may happen that due to an error in configuration, there can be problems
that become difficult to identify and troubleshoot. Similarly, when we create a complex and flexible setup to meet our needs i…
5 min read

Microsoft Azure - Finding the Right Load Balancing Service


Pre-requisite: AZURE We can divide incoming application traffic among many targets, such as Virtual Machines (VMs),
containers, and IP addresses in our VPC, using Azure load balancer. The load balancer can increase the high availability of…
8 min read

Microsoft Azure - Application Security with Azure Active Directory


In this article, we will look into how to secure a Blazor WebAssembly app with Azure Active Directory. Azure Active Directory,
or AAD, provides an intelligent identity as a service that protects your application. In this article, we will use it to protect a…
2 min read

Microsoft Azure - Find and Delete Orphaned Public IP addresses in Azure Portal
Finding and Deleting un-used Public IP addresses will be a cost optimization solution. By deleting un-used/un-
associated/unattached Public IP addresses helps in saving the cost. In this article, we will look into the process of finding and…
2 min read

Microsoft Azure - Protecting Hybrid Cloud Workloads using Azure Defender


In this article, we will learn how to use Azure Defender to protect hybrid cloud workloads. Azure Defender is a feature of the
Security Center and provides advanced threat analysis capabilities. It can also protect hybrid workloads. Let's try to have it…
2 min read

Compute Virtual Machines

Compute Functions

Compute Monitoring

Azure Services

Resources

Cognitive Services

Company Languages DSA Data Science & ML Web Technologies Python Tutorial
About Us Python Data Structures Data Science With Python HTML Python Programming
Corporate & Communications Legal Java Algorithms Data Science For Beginner CSS Examples
Address:
Privacy Policy C++ DSA for Beginners Machine Learning JavaScript Python Projects
A-143, 7th Floor, Sovereign
Corporate Tower, Sector- 136, In Media PHP Basic DSA Problems ML Maths TypeScript Python Tkinter
Noida, Uttar Pradesh (201305) Contact Us GoLang DSA Roadmap Data Visualisation ReactJS Python Web Scraping
Advertise with us SQL Top 100 DSA Interview Pandas NextJS OpenCV Tutorial
Registered Address: GFG Corporate Solution R Language Problems NumPy Bootstrap Python Interview Question
K 061, Tower K, Gulshan Placement Training Program Android Tutorial DSA Roadmap by Sandeep NLP Web Design Django
Vivante Apartment, Sector 137, Tutorials Archive Jain Deep Learning
Noida, Gautam Buddh Nagar,
Uttar Pradesh, 201305 All Cheat Sheets

Computer Science DevOps System Design Inteview Preparation School Subjects GeeksforGeeks Videos
Operating Systems Git High Level Design Competitive Programming Mathematics DSA
Computer Network Linux Low Level Design Top DS or Algo for CP Physics Python
Database Management AWS UML Diagrams Company-Wise Recruitment Chemistry Java
System Docker Interview Guide Process Biology C++
Software Engineering Kubernetes Design Patterns Company-Wise Preparation Social Science Web Development
Digital Logic Design Azure OOAD Aptitude Preparation English Grammar Data Science
Advertise with us
Engineering Maths GCP System Design Bootcamp Puzzles Commerce CS Subjects
Software Development DevOps Roadmap Interview Questions World GK
Software Testing

@GeeksforGeeks, Sanchhaya Education Private Limited, All rights reserved

We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our Cookie Policy & Privacy Policy Got It !

You might also like