SlideShare a Scribd company logo
Compute Security
Host Security
Hello!
I am Eng Teong Cheah
Microsoft MVP
2
Host Security
3
Endpoint Protection
4
◎ Endpoint systems interact directly with users
◎ Endpoints systems are typically vulnerable to security
attacks
◎ Azure Security Center provides the tools you need to
harden your services, and solidify your security
posture
Privileged Access Workstations
5
◎ Separate dedicated administrative accounts and
workstations
◎ Protects from internet attacks and threat vectors
phishing attacks, application and OS vulnerabilities,
and credential theft attack
◎ Appropriate for accounts with access to high value
assets – Administrators and High Sensitivity
Information Workers
Virtual Machine Templates
6
◎ Improves consistency
◎ Express complex deployments
◎ Reduce manual, error prone tasks
◎ Express requirements through code
◎ Promotes reuse
◎ Modular and can be linked
◎ Simplifies orchestration
◎ Enforces security concerns
Security Center Host Recommendations
7
◎ (OS) security settings with the recommended
configuration rules
◎ System security and critical updates that are missing
◎ Endpoint protection recommendations
◎ Disk encryption validation
◎ Vulnerability assessment and remediation
◎ Threat detection
Demostrations
Azure Firewall
8
Thanks!
Any questions?
You can find me at:
@walkercet
9
References
◎ https://docs.microsoft.com/en-us/
10

More Related Content

What's hot (19)

PDF
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017
Madhu Akula
 
PDF
[OWASP Poland Day] Security knowledge framework
OWASP
 
PDF
Node JS reverse shell
Madhu Akula
 
PPT
Implementing application security using the .net framework
Lalit Kale
 
PPTX
Sql server security in an insecure world
Gianluca Sartori
 
PPTX
SQL Server Security and Intrusion Prevention
Gabriel Villa
 
ODP
Dos and Don'ts of Android Application Security (Security Professional Perspec...
Bijay Senihang
 
PPTX
Importance of Azure infrastructure?-Microsoft Azure security infrastructure
Zabeel Institute
 
PPTX
[OWASP Poland Day] Saving private token
OWASP
 
PPTX
ASP.NET security vulnerabilities
Aleksandar Bozinovski
 
PPTX
Class Project: Security in Microsoft Azure
saitoserge
 
PPTX
Microservices Security
Aditi Anand
 
PPTX
Webinar: Creating a Single View: Securing Your Deployment
MongoDB
 
PPTX
Mod security
Shruthi Kamath
 
PDF
Browser Exploit Framework
n|u - The Open Security Community
 
PDF
Implementing ossec
Jeronimo Zucco
 
PPTX
Cloudbrew 2019 - Azure Security
Tom Janetscheck
 
KEY
mod_security introduction at study2study #3
Naoya Nakazawa
 
PPTX
Web Application firewall-Mod security
Romansh Yadav
 
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017
Madhu Akula
 
[OWASP Poland Day] Security knowledge framework
OWASP
 
Node JS reverse shell
Madhu Akula
 
Implementing application security using the .net framework
Lalit Kale
 
Sql server security in an insecure world
Gianluca Sartori
 
SQL Server Security and Intrusion Prevention
Gabriel Villa
 
Dos and Don'ts of Android Application Security (Security Professional Perspec...
Bijay Senihang
 
Importance of Azure infrastructure?-Microsoft Azure security infrastructure
Zabeel Institute
 
[OWASP Poland Day] Saving private token
OWASP
 
ASP.NET security vulnerabilities
Aleksandar Bozinovski
 
Class Project: Security in Microsoft Azure
saitoserge
 
Microservices Security
Aditi Anand
 
Webinar: Creating a Single View: Securing Your Deployment
MongoDB
 
Mod security
Shruthi Kamath
 
Browser Exploit Framework
n|u - The Open Security Community
 
Implementing ossec
Jeronimo Zucco
 
Cloudbrew 2019 - Azure Security
Tom Janetscheck
 
mod_security introduction at study2study #3
Naoya Nakazawa
 
Web Application firewall-Mod security
Romansh Yadav
 

Similar to Compute Security - Host Security (20)

PDF
656704621-Against-Threats-and-Secure-Cloud-Environments-Presentation-Slides-F...
mahadikamol123
 
PPTX
Securely Harden Microsoft 365 with Secure Score
Joel Oleson
 
PDF
CSS17: Houston - Azure Shared Security Model Overview
Alert Logic
 
PPTX
12 Crucial Windows Security Skills for 2018
Paula Januszkiewicz
 
PDF
Secure codingguide
David Kwak
 
PDF
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
BeyondTrust
 
PDF
" onclick="alert(1)
slideshareperson2
 
PDF
<marquee>html title testfsdjk34254</marquee>
slideshareperson2
 
PPTX
Security hardening and drown attack prevention for mobile backend developers
Jiri Danihelka
 
PPTX
SDL: Secure design principles
sluge
 
PPTX
Active Directory 2019 v2.pptx
Pradeep Kapkoti
 
PPTX
MD-102T00-ENU-PowerPoxxxxxxxxxint_05.pptx
mloga861
 
PDF
Drupal Security Basics for the DrupalJax January Meetup
Chris Hales
 
PDF
Windows Security Crash Course
UTD Computer Security Group
 
PPTX
Security Best Practices
Clint Edmonson
 
PDF
Security by Design: An Introduction to Drupal Security
Tara Arnold
 
PDF
Security by design: An Introduction to Drupal Security
Mediacurrent
 
PDF
withsecure-elements-epp-brochure-en.pdf
MdZabedHossain2
 
PDF
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
Symantec
 
PDF
Protecting microservices using secure design patterns 1.0
Trupti Shiralkar, CISSP
 
656704621-Against-Threats-and-Secure-Cloud-Environments-Presentation-Slides-F...
mahadikamol123
 
Securely Harden Microsoft 365 with Secure Score
Joel Oleson
 
CSS17: Houston - Azure Shared Security Model Overview
Alert Logic
 
12 Crucial Windows Security Skills for 2018
Paula Januszkiewicz
 
Secure codingguide
David Kwak
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
BeyondTrust
 
" onclick="alert(1)
slideshareperson2
 
<marquee>html title testfsdjk34254</marquee>
slideshareperson2
 
Security hardening and drown attack prevention for mobile backend developers
Jiri Danihelka
 
SDL: Secure design principles
sluge
 
Active Directory 2019 v2.pptx
Pradeep Kapkoti
 
MD-102T00-ENU-PowerPoxxxxxxxxxint_05.pptx
mloga861
 
Drupal Security Basics for the DrupalJax January Meetup
Chris Hales
 
Windows Security Crash Course
UTD Computer Security Group
 
Security Best Practices
Clint Edmonson
 
Security by Design: An Introduction to Drupal Security
Tara Arnold
 
Security by design: An Introduction to Drupal Security
Mediacurrent
 
withsecure-elements-epp-brochure-en.pdf
MdZabedHossain2
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
Symantec
 
Protecting microservices using secure design patterns 1.0
Trupti Shiralkar, CISSP
 
Ad

More from Eng Teong Cheah (20)

PDF
Modern Cross-Platform Apps with .NET MAUI
Eng Teong Cheah
 
PDF
Efficiently Removing Duplicates from a Sorted Array
Eng Teong Cheah
 
PDF
Monitoring Models
Eng Teong Cheah
 
PDF
Responsible Machine Learning
Eng Teong Cheah
 
PDF
Training Optimal Models
Eng Teong Cheah
 
PDF
Deploying Models
Eng Teong Cheah
 
PDF
Machine Learning Workflows
Eng Teong Cheah
 
PDF
Working with Compute
Eng Teong Cheah
 
PDF
Working with Data
Eng Teong Cheah
 
PDF
Experiments & TrainingModels
Eng Teong Cheah
 
PDF
Automated Machine Learning
Eng Teong Cheah
 
PDF
Getting Started with Azure Machine Learning
Eng Teong Cheah
 
PDF
Hacking Containers - Container Storage
Eng Teong Cheah
 
PDF
Hacking Containers - Looking at Cgroups
Eng Teong Cheah
 
PDF
Hacking Containers - Linux Containers
Eng Teong Cheah
 
PDF
Data Security - Storage Security
Eng Teong Cheah
 
PDF
Application Security- App security
Eng Teong Cheah
 
PDF
Application Security - Key Vault
Eng Teong Cheah
 
PDF
Compute Security - Container Security
Eng Teong Cheah
 
PDF
Access Security - Hybrid Identity
Eng Teong Cheah
 
Modern Cross-Platform Apps with .NET MAUI
Eng Teong Cheah
 
Efficiently Removing Duplicates from a Sorted Array
Eng Teong Cheah
 
Monitoring Models
Eng Teong Cheah
 
Responsible Machine Learning
Eng Teong Cheah
 
Training Optimal Models
Eng Teong Cheah
 
Deploying Models
Eng Teong Cheah
 
Machine Learning Workflows
Eng Teong Cheah
 
Working with Compute
Eng Teong Cheah
 
Working with Data
Eng Teong Cheah
 
Experiments & TrainingModels
Eng Teong Cheah
 
Automated Machine Learning
Eng Teong Cheah
 
Getting Started with Azure Machine Learning
Eng Teong Cheah
 
Hacking Containers - Container Storage
Eng Teong Cheah
 
Hacking Containers - Looking at Cgroups
Eng Teong Cheah
 
Hacking Containers - Linux Containers
Eng Teong Cheah
 
Data Security - Storage Security
Eng Teong Cheah
 
Application Security- App security
Eng Teong Cheah
 
Application Security - Key Vault
Eng Teong Cheah
 
Compute Security - Container Security
Eng Teong Cheah
 
Access Security - Hybrid Identity
Eng Teong Cheah
 
Ad

Recently uploaded (20)

PPTX
Distribution reservoir and service storage pptx
dhanashree78
 
PPTX
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 
PPTX
What is Shot Peening | Shot Peening is a Surface Treatment Process
Vibra Finish
 
PDF
20ES1152 Programming for Problem Solving Lab Manual VRSEC.pdf
Ashutosh Satapathy
 
PPTX
Water Resources Engineering (CVE 728)--Slide 4.pptx
mohammedado3
 
PPTX
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 
PDF
MODULE-5 notes [BCG402-CG&V] PART-B.pdf
Alvas Institute of Engineering and technology, Moodabidri
 
PPT
Testing and final inspection of a solar PV system
MuhammadSanni2
 
PPTX
Knowledge Representation : Semantic Networks
Amity University, Patna
 
PPTX
Final Major project a b c d e f g h i j k l m
bharathpsnab
 
PPTX
Worm gear strength and wear calculation as per standard VB Bhandari Databook.
shahveer210504
 
PDF
Electrical Engineer operation Supervisor
ssaruntatapower143
 
PPTX
Biosensors, BioDevices, Biomediccal.pptx
AsimovRiyaz
 
PPTX
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
PDF
3rd International Conference on Machine Learning and IoT (MLIoT 2025)
ClaraZara1
 
PDF
Halide Perovskites’ Multifunctional Properties: Coordination Engineering, Coo...
TaameBerhe2
 
PPTX
How Industrial Project Management Differs From Construction.pptx
jamespit799
 
PDF
Digital water marking system project report
Kamal Acharya
 
PDF
AI TECHNIQUES FOR IDENTIFYING ALTERATIONS IN THE HUMAN GUT MICROBIOME IN MULT...
vidyalalltv1
 
PPTX
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
Distribution reservoir and service storage pptx
dhanashree78
 
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 
What is Shot Peening | Shot Peening is a Surface Treatment Process
Vibra Finish
 
20ES1152 Programming for Problem Solving Lab Manual VRSEC.pdf
Ashutosh Satapathy
 
Water Resources Engineering (CVE 728)--Slide 4.pptx
mohammedado3
 
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 
MODULE-5 notes [BCG402-CG&V] PART-B.pdf
Alvas Institute of Engineering and technology, Moodabidri
 
Testing and final inspection of a solar PV system
MuhammadSanni2
 
Knowledge Representation : Semantic Networks
Amity University, Patna
 
Final Major project a b c d e f g h i j k l m
bharathpsnab
 
Worm gear strength and wear calculation as per standard VB Bhandari Databook.
shahveer210504
 
Electrical Engineer operation Supervisor
ssaruntatapower143
 
Biosensors, BioDevices, Biomediccal.pptx
AsimovRiyaz
 
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
3rd International Conference on Machine Learning and IoT (MLIoT 2025)
ClaraZara1
 
Halide Perovskites’ Multifunctional Properties: Coordination Engineering, Coo...
TaameBerhe2
 
How Industrial Project Management Differs From Construction.pptx
jamespit799
 
Digital water marking system project report
Kamal Acharya
 
AI TECHNIQUES FOR IDENTIFYING ALTERATIONS IN THE HUMAN GUT MICROBIOME IN MULT...
vidyalalltv1
 
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 

Compute Security - Host Security