SlideShare a Scribd company logo
Compute Security
Host Security
Hello!
I am Eng Teong Cheah
Microsoft MVP
2
Host Security
3
Endpoint Protection
4
◎ Endpoint systems interact directly with users
◎ Endpoints systems are typically vulnerable to security
attacks
◎ Azure Security Center provides the tools you need to
harden your services, and solidify your security
posture
Privileged Access Workstations
5
◎ Separate dedicated administrative accounts and
workstations
◎ Protects from internet attacks and threat vectors
phishing attacks, application and OS vulnerabilities,
and credential theft attack
◎ Appropriate for accounts with access to high value
assets – Administrators and High Sensitivity
Information Workers
Virtual Machine Templates
6
◎ Improves consistency
◎ Express complex deployments
◎ Reduce manual, error prone tasks
◎ Express requirements through code
◎ Promotes reuse
◎ Modular and can be linked
◎ Simplifies orchestration
◎ Enforces security concerns
Security Center Host Recommendations
7
◎ (OS) security settings with the recommended
configuration rules
◎ System security and critical updates that are missing
◎ Endpoint protection recommendations
◎ Disk encryption validation
◎ Vulnerability assessment and remediation
◎ Threat detection
Demostrations
Azure Firewall
8
Thanks!
Any questions?
You can find me at:
@walkercet
9
References
◎ https://docs.microsoft.com/en-us/
10

More Related Content

What's hot (19)

PDF
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017
Madhu Akula
 
PDF
[OWASP Poland Day] Security knowledge framework
OWASP
 
PDF
Node JS reverse shell
Madhu Akula
 
PPT
Implementing application security using the .net framework
Lalit Kale
 
PPTX
Sql server security in an insecure world
Gianluca Sartori
 
PPTX
SQL Server Security and Intrusion Prevention
Gabriel Villa
 
ODP
Dos and Don'ts of Android Application Security (Security Professional Perspec...
Bijay Senihang
 
PPTX
Importance of Azure infrastructure?-Microsoft Azure security infrastructure
Zabeel Institute
 
PPTX
[OWASP Poland Day] Saving private token
OWASP
 
PPTX
ASP.NET security vulnerabilities
Aleksandar Bozinovski
 
PPTX
Class Project: Security in Microsoft Azure
saitoserge
 
PPTX
Microservices Security
Aditi Anand
 
PPTX
Webinar: Creating a Single View: Securing Your Deployment
MongoDB
 
PPTX
Mod security
Shruthi Kamath
 
PDF
Browser Exploit Framework
n|u - The Open Security Community
 
PDF
Implementing ossec
Jeronimo Zucco
 
PPTX
Cloudbrew 2019 - Azure Security
Tom Janetscheck
 
KEY
mod_security introduction at study2study #3
Naoya Nakazawa
 
PPTX
Web Application firewall-Mod security
Romansh Yadav
 
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017
Madhu Akula
 
[OWASP Poland Day] Security knowledge framework
OWASP
 
Node JS reverse shell
Madhu Akula
 
Implementing application security using the .net framework
Lalit Kale
 
Sql server security in an insecure world
Gianluca Sartori
 
SQL Server Security and Intrusion Prevention
Gabriel Villa
 
Dos and Don'ts of Android Application Security (Security Professional Perspec...
Bijay Senihang
 
Importance of Azure infrastructure?-Microsoft Azure security infrastructure
Zabeel Institute
 
[OWASP Poland Day] Saving private token
OWASP
 
ASP.NET security vulnerabilities
Aleksandar Bozinovski
 
Class Project: Security in Microsoft Azure
saitoserge
 
Microservices Security
Aditi Anand
 
Webinar: Creating a Single View: Securing Your Deployment
MongoDB
 
Mod security
Shruthi Kamath
 
Browser Exploit Framework
n|u - The Open Security Community
 
Implementing ossec
Jeronimo Zucco
 
Cloudbrew 2019 - Azure Security
Tom Janetscheck
 
mod_security introduction at study2study #3
Naoya Nakazawa
 
Web Application firewall-Mod security
Romansh Yadav
 

Similar to Compute Security - Host Security (20)

PDF
Microsoft threat protection + wdatp+ aatp overview
Allessandra Negri
 
PPTX
SC-900 Capabilities of Microsoft Security Solutions
FredBrandonAuthorMCP
 
PPTX
Enter The Matrix Securing Azure’s Assets
BizTalk360
 
PPTX
Azure Security Center- Zero to Hero
Kasun Rajapakse
 
PDF
Global Azure Bootcamp 2018 - Azure Security Center
Scott Hoag
 
PDF
Tour to Azure Security Center
Lalit Rawat
 
PDF
Azure Security Overview
David J Rosenthal
 
PDF
Microsoft Azure Security Overview
Alert Logic
 
PDF
366864108 azure-security
ober64
 
PDF
Cloud summit demystifying cloud security
David De Vos
 
PDF
03_Azure Security Center_GAB2019
Kumton Suttiraksiri
 
PDF
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
MSHOWTO Bilisim Toplulugu
 
PPTX
4 Modern Security - Integrated SecOps and incident response with MTP
Andrew Bettany
 
PDF
Nicholas DiCola | Secure your IT resources with Azure Security Center
Microsoft Österreich
 
PPTX
Shared Security Responsibility for the Azure Cloud
Alert Logic
 
PPTX
Azure Security Overview
Allen Brokken
 
PDF
azure-security-overview-slideshare-180419183626.pdf
BenAissaTaher1
 
PDF
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
MSAdvAnalytics
 
PPTX
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
European Collaboration Summit
 
PPTX
Secure hybrid workload with azure
Mohit Chhabra
 
Microsoft threat protection + wdatp+ aatp overview
Allessandra Negri
 
SC-900 Capabilities of Microsoft Security Solutions
FredBrandonAuthorMCP
 
Enter The Matrix Securing Azure’s Assets
BizTalk360
 
Azure Security Center- Zero to Hero
Kasun Rajapakse
 
Global Azure Bootcamp 2018 - Azure Security Center
Scott Hoag
 
Tour to Azure Security Center
Lalit Rawat
 
Azure Security Overview
David J Rosenthal
 
Microsoft Azure Security Overview
Alert Logic
 
366864108 azure-security
ober64
 
Cloud summit demystifying cloud security
David De Vos
 
03_Azure Security Center_GAB2019
Kumton Suttiraksiri
 
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
MSHOWTO Bilisim Toplulugu
 
4 Modern Security - Integrated SecOps and incident response with MTP
Andrew Bettany
 
Nicholas DiCola | Secure your IT resources with Azure Security Center
Microsoft Österreich
 
Shared Security Responsibility for the Azure Cloud
Alert Logic
 
Azure Security Overview
Allen Brokken
 
azure-security-overview-slideshare-180419183626.pdf
BenAissaTaher1
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
MSAdvAnalytics
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
European Collaboration Summit
 
Secure hybrid workload with azure
Mohit Chhabra
 
Ad

More from Eng Teong Cheah (20)

PDF
Modern Cross-Platform Apps with .NET MAUI
Eng Teong Cheah
 
PDF
Efficiently Removing Duplicates from a Sorted Array
Eng Teong Cheah
 
PDF
Monitoring Models
Eng Teong Cheah
 
PDF
Responsible Machine Learning
Eng Teong Cheah
 
PDF
Training Optimal Models
Eng Teong Cheah
 
PDF
Deploying Models
Eng Teong Cheah
 
PDF
Machine Learning Workflows
Eng Teong Cheah
 
PDF
Working with Compute
Eng Teong Cheah
 
PDF
Working with Data
Eng Teong Cheah
 
PDF
Experiments & TrainingModels
Eng Teong Cheah
 
PDF
Automated Machine Learning
Eng Teong Cheah
 
PDF
Getting Started with Azure Machine Learning
Eng Teong Cheah
 
PDF
Hacking Containers - Container Storage
Eng Teong Cheah
 
PDF
Hacking Containers - Looking at Cgroups
Eng Teong Cheah
 
PDF
Hacking Containers - Linux Containers
Eng Teong Cheah
 
PDF
Data Security - Storage Security
Eng Teong Cheah
 
PDF
Application Security- App security
Eng Teong Cheah
 
PDF
Application Security - Key Vault
Eng Teong Cheah
 
PDF
Compute Security - Container Security
Eng Teong Cheah
 
PDF
Access Security - Hybrid Identity
Eng Teong Cheah
 
Modern Cross-Platform Apps with .NET MAUI
Eng Teong Cheah
 
Efficiently Removing Duplicates from a Sorted Array
Eng Teong Cheah
 
Monitoring Models
Eng Teong Cheah
 
Responsible Machine Learning
Eng Teong Cheah
 
Training Optimal Models
Eng Teong Cheah
 
Deploying Models
Eng Teong Cheah
 
Machine Learning Workflows
Eng Teong Cheah
 
Working with Compute
Eng Teong Cheah
 
Working with Data
Eng Teong Cheah
 
Experiments & TrainingModels
Eng Teong Cheah
 
Automated Machine Learning
Eng Teong Cheah
 
Getting Started with Azure Machine Learning
Eng Teong Cheah
 
Hacking Containers - Container Storage
Eng Teong Cheah
 
Hacking Containers - Looking at Cgroups
Eng Teong Cheah
 
Hacking Containers - Linux Containers
Eng Teong Cheah
 
Data Security - Storage Security
Eng Teong Cheah
 
Application Security- App security
Eng Teong Cheah
 
Application Security - Key Vault
Eng Teong Cheah
 
Compute Security - Container Security
Eng Teong Cheah
 
Access Security - Hybrid Identity
Eng Teong Cheah
 
Ad

Recently uploaded (20)

PDF
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
PPTX
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 
PDF
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
PDF
Design Thinking basics for Engineers.pdf
CMR University
 
PPTX
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
PPTX
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
PDF
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
PDF
AI TECHNIQUES FOR IDENTIFYING ALTERATIONS IN THE HUMAN GUT MICROBIOME IN MULT...
vidyalalltv1
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
PPTX
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
PPTX
2025 CGI Congres - Surviving agile v05.pptx
Derk-Jan de Grood
 
PPTX
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 
PDF
Water Industry Process Automation & Control Monthly July 2025
Water Industry Process Automation & Control
 
PPTX
Introduction to Basic Renewable Energy.pptx
examcoordinatormesu
 
PDF
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
PPTX
What is Shot Peening | Shot Peening is a Surface Treatment Process
Vibra Finish
 
PDF
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
PDF
Halide Perovskites’ Multifunctional Properties: Coordination Engineering, Coo...
TaameBerhe2
 
PPTX
Damage of stability of a ship and how its change .pptx
ehamadulhaque
 
PPTX
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
Design Thinking basics for Engineers.pdf
CMR University
 
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
AI TECHNIQUES FOR IDENTIFYING ALTERATIONS IN THE HUMAN GUT MICROBIOME IN MULT...
vidyalalltv1
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
2025 CGI Congres - Surviving agile v05.pptx
Derk-Jan de Grood
 
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 
Water Industry Process Automation & Control Monthly July 2025
Water Industry Process Automation & Control
 
Introduction to Basic Renewable Energy.pptx
examcoordinatormesu
 
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
What is Shot Peening | Shot Peening is a Surface Treatment Process
Vibra Finish
 
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
Halide Perovskites’ Multifunctional Properties: Coordination Engineering, Coo...
TaameBerhe2
 
Damage of stability of a ship and how its change .pptx
ehamadulhaque
 
Arduino Based Gas Leakage Detector Project
CircuitDigest
 

Compute Security - Host Security