0% found this document useful (0 votes)
52 views

MicrosoftDefender MindMap-1

The document discusses Microsoft's cloud security posture management (CSPM) capabilities including attack path analysis, recommendations, and agentless scanning for machines and containers. It also mentions extending these capabilities to non-Microsoft security information and event management (SIEM) data starting with SAP.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views

MicrosoftDefender MindMap-1

The document discusses Microsoft's cloud security posture management (CSPM) capabilities including attack path analysis, recommendations, and agentless scanning for machines and containers. It also mentions extending these capabilities to non-Microsoft security information and event management (SIEM) data starting with SAP.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Free (Secure Score) 

Foundational CSPM - Free 


Recommendations 

Attack Path Analysis 

Unified Platform with M365D + Sentinel Cloud Security Explorer 


Compare CSPM
Embedded Security Copilot Agentless Scanning for machines  
plans

Now, we are extending these XDR CSPM - Cloud Security Posture Management CSPM Plan  Governance & Compliance 
capabilities to non-Microsoft data brought in Automatic Attack Disruption Features
through the SIEM, starting with SAP. Agentless Container Posture (Preview) 

Tailored recommendations  EASM insights in network exposure

Blog  Data-aware security posture (preview) 


Ignite 2023 annoucements
Solution Landing Page  2023 CSPM Leadership Compass -

KuppingerCole

Maps the entire internet to expose threat


actors and their infrastructure Defender for Servers P1
Defender Threat Intelligence (MDTI)  Compare P1 x P2 
Defender for Servers  Defender for Servers P2

Discover unknown and unmanaged resources Former RiskIQ FAQ 


that are visible and accessible from the internet
(outside-in view) Defender External Attack Surface Defender for App Services 

Management (EASM)
Defender for Azure SQL 

Defender for SQL servers 


Augment your SOC team with leading end-to-
end protection, threat intelligence, and
Defender for open-source relational
expertise. Defender for Databases  
Microsoft Defender Experts for Hunting  databases

MXDR - Give your SOC team coverage with Defender for Azure Cosmos DB 
leading end-to-end protection and expertise.
Microsoft Defender CWP - Cloud Workload Protection Defender for Storage  Malware Scanning add-on 
Defender Experts for XDR also includes the Services
proactive threat hunting offered by Defender Microsoft Defender Experts for XDR 
Defender for Containers 
Experts for Hunting
Defender for Key Vault 
Note: Not a Defender brand but it's part of the
Defender for Resource Manager 
service and I am adding to the context here.
Microsoft Incident Response Retainer 
As of August 1, customers with an existing
subscription to Defender for DNS can
continue to use the service, but new
App Governance  Microsoft Defender for Cloud Apps (MDA)  Defender for DNS  subscribers will receive alerts about
suspicious DNS activity as part of Defender
Add-on - Microsoft Defender Vulnerability Microsoft Defender for for Servers P2.
 
Management Cloud (MDC)
Security Alerts  Security alerts - a reference guide 
MDE P1  Microsoft Defender for Endpoint (MDE) 
Compare P1xP2 
MDE P2  MICROSOFT MDC, a Cloud-Native Application Protection

Platform (CNAPP) - Blog Post
Security Alerts in MDI  Microsoft Defender for Identity (MDI)  DEFENDER
CNAPP + DevSecOps  Defender for DevOps 
MDO P1
Mind Map
Defender for APIs 
Compare P1xP2  Microsoft Defender for Office (MDO) 
MDO P2 Microsoft Defender Automation
 
XDR
Secure Score  Workbooks 

XDR Automatic Attack disruption  Microsoft Cloud Security benchmark 

Interactive Guide  Other Features & Integrations Azure Policies integration 

Security Copilot in M365 XDR  SIEM integration 

Documentation  External Attack Surface Management 

Entra Permissions Management 


Overview 
Azure 
Architecture 
AWS 
OT sensor cloud connection  Multi-Cloud Protection
GCP 
Enterprise IoT Network Security  Defender for IoT 
Non-Azure VMs (Arc) 
Defender for IOT Solution for Microsoft

Sentinel Pricing 

M365 Defender XDR  How to Effectively Perform a MDC PoC 

Defender for IoT  Labs 

Defender for Cloud  Microsoft Security Copilot in Defender for


Cloud
Defender for Identity 

Defender for Endpoint  Defender Ninja Trainings


Defender for Office 365 

Defender for Cloud Apps 

Defender Threat Intelligence


Note: This mind map aims to be a tool for clarifying the Microsoft Defender product family only. This is

not an official Microsoft document. Don't forget to click on the LINKS to access the contents.
Defender EASM  Author: Tiago Souza - https://cybergeeks.cloud Revision date: November, 2023 (post Ignite event)

You might also like