- [Instructor] Now, let's go to the Azure Security Center, … and check what recommendations are being made for us … for the networking resources. … Let's click on Networking under our source security hygiene. … In the list, you see that in my demo lab environment, … I have a few major accommodations that have been suggested … for my Azure state. … Let's go and check each recommendation … on how we can provide solutions for each of them. … First, let's go and click on Add a Next Generation Firewall. … After clicking, we'll be provided with another window … and now in the next window, we see, … that there are two end points. … We've suggested Next Generation Firewall option. … The list provides vivid end point name, … the state and the severity level. … On the three dots at the end of the column, … if you click on it, you can pin it to the dashboard … and also dismiss the suggestion. … Now let's click on one of the end points … and now we're going forward with the … Next Generation Firewall option. …
Author
Released
3/7/2019- Azure Policy in action
- Logging and monitoring
- Managing data
- Protecting SQL resources
- Protecting virtual machines, identity, and access
- File integrity monitoring
- Azure data and SQL security best practices
- Network security best practices
Skill Level Intermediate
Duration
Views
Related Courses
-
Introduction
-
What you should know1m 17s
-
1. Getting Started with Azure Security Center (ASC)
-
Management groups1m 52s
-
Azure Policy and compliance4m 30s
-
Logging and monitoring6m 17s
-
Security threat alerts2m 14s
-
Alert validation2m 36s
-
Planning and operations4m 1s
-
Managing data in ASC2m 56s
-
2. Managing Security Solutions
-
SQL information protection3m 19s
-
Protecting SQL resources4m 22s
-
Protecting virtual machines4m 43s
-
-
3. Advanced Cloud Defense
-
Just-in-time VM access3m 54s
-
File integrity monitoring3m 58s
-
4. Azure Security Best Practices and Recommendations
-
IaaS security best practices2m 44s
-
Conclusion
-
Next steps41s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Network protection: Hardening network resources