Skip to content
Jussi Metso
Jussi Metso

It’s all about The Cloud and The Security

  • Posts
  • About the blog
  • Activity
  • Connect!
  • Privacy Policy
Jussi Metso

It’s all about The Cloud and The Security

June 22, 2024May 25, 2025

Defender for Cloud – Part 2: The Asset Inventory 

Table of Contents

Asset Inventory

The asset inventory page  shows the security posture of the resources you’ve connected to Defender for Cloud. Defender for Cloud periodically analyzes the security state of resources connected to your subscriptions to identify potential security issues and provides you with active recommendations. 

Use this view and its filters to address such questions as:

  • Which of my subscriptions with Defender plans enabled have outstanding recommendations?
  • Which of my machines with the tag ‘Production’ are missing the Log Analytics agent?
  • How many of my machines tagged with a specific tag have outstanding recommendations?
  • Which machines in a specific resource group have a known vulnerability (using a CVE number)?

The security recommendations on the asset inventory page are also shown in the Recommendations page, but here they’re shown according to the affected resource.

Also a new feature called Critical Assets are shown.

Key features

1. Inventory

Inventory shows ALL your Azure resources, your other connected resources like in my case Amazon Web Services -connected resources. It shows where they are located, recommedations for those resources. You can search for example installed applications and vulnerabilities to those. These features were in lot of use before the Cloud Security Explorer function. 

And if you like to drill in to resource you just click the resource like in this example of my ubuntu server:

2. Summaries

  • Total resources: The total number of resources connected to Defender for Cloud.
  • Unhealthy resources: Resources with active security recommendations that you can implement. Learn more about implementing security recommendations.
  • Unmonitored resources: Resources with agent monitoring issues – they have the Log Analytics agent deployed, but the agent isn’t sending data or has other health issues.
  • Unregistered subscriptions: Any subscription in the selected scope that hasn’t yet been connected to Microsoft Defender for Cloud.

3. Filters

With filters you can provide a quick way to refine the list of resources according to the question you’re trying to answer.

4. Export tools

Inventory includes an option to export the results of your selected filter options to a CSV file. You can also export the query itself to Azure Resource Graph Explorer to further refine, save, or modify the Kusto Query Language (KQL) query.

You can also add non-Azure servers to the inventory which actually means that you can install a log analytics agent to a non-Azure like on-prem windows/linux server.

So if you press that link above you end up this view:

and from there you finally end up this view if you do as instructions say:

1.You can see the summary of connected windows or linux servers and you can add Data Collection rules to that Azure monitor agent you are about to install:

2.Here you can have installers for a windows/linux machines and get the needed information to those installers:

  • Workspace ID
  • Primary key
  • Secondary key

It’s also possible download the Log Analytics Gateway to act as a proxy if you have machines without Internet connectivity

That was kind of all from the Asset inventory. Stay tuned. The next part is coming. 

The parts of the MDC blog series

 
  • Part 0: Microsoft Defender for Cloud – The EPIC blog series – introduction
  • Part 1: Getting started aka Setup 
  • Part 2: The Asset Inventory 
  • Part 3: Security posture
  • Part 4: Security recommendations
  • Part 5: Security alerts
  • Part 6: Attack path analysis
  • Part 7: Cloud security explorer
  • Part 8: Workbooks
  • Part 9: Regulatory compliance
  • Part 10: Workload protections
  • part 10.5: Advanced Workload protection
  • Part 11: Data and AI security – The end of the series
Picture of Jussi Metso

Jussi Metso

Author is a a lifelong IT enthusiast, Microsoft Security MVP and interested in Cloud Security, XDR, SIEM and AI. Motto: Learning is the key for your future.
Share on Social Media
x facebook linkedinwhatsapp

Discover more from Jussi Metso

Subscribe to get the latest posts sent to your email.

DEFENDER FOR CLOUD #cloudsecurity#mdcseries

Post navigation

Previous post
Next post

Related Posts

DEFENDER FOR CLOUD

Defender for Cloud – Part 1: Getting Started

January 25, 2024May 25, 2025

Let’s start with the Defender for Cloud’s UI. There are a lot of different functions which we are going to walk through.

Read More
DEFENDER FOR CLOUD

Defender for Cloud – Part 8: Workbooks

March 7, 2025May 25, 2025

Workbooks provide a flexible canvas for data analysis and the creation of rich visual reports within the Azure portal. They allow you to tap into multiple data sources from across Azure and combine them into unified interactive experiences. Workbooks let you combine multiple kinds of visualizations and analyses, making them great for freeform exploration.

Read More
CSPM

Cloud Security Posture Management (CSPM) and some of it’s features

January 11, 2023January 16, 2023

Table of Contents What is Cloud Security Posture Management in Azure? Cloud Security Posture Management…

Read More

Link to my MVP profile:

Join our Security User Group:

Subscribe my blog to get updates!

Join 36 other subscribers

Recent Posts

  • Malware automated remediation in Defender for Storage
  • Microsoft Sentinel Data lake (preview)
  • Azure Kubernetes Cluster update & security
  • Modernizing your on-prem SIEM with Microsoft Sentinel – part 2
  • Modernizing your on-prem SIEM with Microsoft Sentinel – part 1

Top posts:

Defender for Cloud – Part 10: Cloud Workload protection (CWP)
Defender for Cloud - Part 6: Attack Path Analysis
Defender for Cloud – Part 5: Security Alerts
Microsoft Cloud Attack and Defense Bootcamp
Defender for Cloud - Part 7: Cloud Security Explorer

Categories

Tags

#cloudsecurity #defenderforstorage #malwarescan #mdcseries #sentinel #siem #soc

Archives

Visits on my site

15,533 hits

©2022-2025 Jussi Metso. All rights reserved.