Académique Documents
Professionnel Documents
Culture Documents
90%
Identity Compute Storage Networking
>67%
Enterprises adopting
hybrid cloud in 20171
Preview
BUILT ON CLOUD LOG ANALYTICS PLATFORM
Prescriptive
application
whitelisting
learns
application
patterns and
recommends
whitelists
Preview
Use advanced analytics and Microsoft Intelligent
Security Graph to rapidly detect and respond to
evolving cyber threats
Prioritized security
alerts provide
details about the
threat detected
and suggests steps
to remediate
Alerts that
conform to kill
chain patterns
are fused into a
single incident
Explore notable
links between
alerts, computers,
and users to
triage alerts,
determine the
scope, and find
the root cause
Use predefined or
ad hoc queries for
deeper
examination of
security and
operational events
RUN & MANAGE
Use Security Center to Enable standard tier for Onboard on-premises
manage security for advanced threat and other cloud
Azure resources protection workloads