BOOK-CHAPTER

Azure Security Center Extensions

Abstract

In Chapter 5 , you learned how Azure Secure Center provides recommendations to help your layered security design after analyzing your Azure infrastructure. You gained hands-on knowledge in the exercises when you installed endpoint protection on an Azure VM and resolved OS vulnerabilities based on your current configurations. Recommendations to improve your security posture were based on the security health and included hardening the IP subnets with network security groups (NSGs), with different rules for trusted and untrusted networks.

Keywords:
Computer security Computer science Network security Center (category theory)

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.14
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Software System Performance and Reliability
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

BOOK-CHAPTER

Azure Security Center

Peter De TenderDavid RendónSamuel Erskine

Apress eBooks Year: 2019 Pages: 101-179
BOOK-CHAPTER

Azure Security Center and Azure Sentinel

Marshall CopelandMatthew Jacobs

Apress eBooks Year: 2020 Pages: 153-196
BOOK-CHAPTER

Azure Security Center Configuration

Marshall Copeland

Apress eBooks Year: 2017 Pages: 75-104
BOOK-CHAPTER

Azure Security Center Scenarios

Marshall Copeland

Apress eBooks Year: 2017 Pages: 105-130
BOOK-CHAPTER

Azure Security Center Cost Model

Marshall Copeland

Apress eBooks Year: 2017 Pages: 33-52
© 2026 ScienceGate Book Chapters — All rights reserved.