Skip to content
Jussi Metso
Jussi Metso

It’s all about The Cloud and The Security

  • Posts
  • About the blog
  • Activity
  • Connect!
  • Privacy Policy
Jussi Metso

It’s all about The Cloud and The Security

June 22, 2024May 25, 2025

Defender for Cloud – Part 2: The Asset Inventory 

Table of Contents

Asset Inventory

The asset inventory page  shows the security posture of the resources you’ve connected to Defender for Cloud. Defender for Cloud periodically analyzes the security state of resources connected to your subscriptions to identify potential security issues and provides you with active recommendations. 

Use this view and its filters to address such questions as:

  • Which of my subscriptions with Defender plans enabled have outstanding recommendations?
  • Which of my machines with the tag ‘Production’ are missing the Log Analytics agent?
  • How many of my machines tagged with a specific tag have outstanding recommendations?
  • Which machines in a specific resource group have a known vulnerability (using a CVE number)?

The security recommendations on the asset inventory page are also shown in the Recommendations page, but here they’re shown according to the affected resource.

Also a new feature called Critical Assets are shown.

Key features

1. Inventory

Inventory shows ALL your Azure resources, your other connected resources like in my case Amazon Web Services -connected resources. It shows where they are located, recommedations for those resources. You can search for example installed applications and vulnerabilities to those. These features were in lot of use before the Cloud Security Explorer function. 

And if you like to drill in to resource you just click the resource like in this example of my ubuntu server:

2. Summaries

  • Total resources: The total number of resources connected to Defender for Cloud.
  • Unhealthy resources: Resources with active security recommendations that you can implement. Learn more about implementing security recommendations.
  • Unmonitored resources: Resources with agent monitoring issues – they have the Log Analytics agent deployed, but the agent isn’t sending data or has other health issues.
  • Unregistered subscriptions: Any subscription in the selected scope that hasn’t yet been connected to Microsoft Defender for Cloud.

3. Filters

With filters you can provide a quick way to refine the list of resources according to the question you’re trying to answer.

4. Export tools

Inventory includes an option to export the results of your selected filter options to a CSV file. You can also export the query itself to Azure Resource Graph Explorer to further refine, save, or modify the Kusto Query Language (KQL) query.

You can also add non-Azure servers to the inventory which actually means that you can install a log analytics agent to a non-Azure like on-prem windows/linux server.

So if you press that link above you end up this view:

and from there you finally end up this view if you do as instructions say:

1.You can see the summary of connected windows or linux servers and you can add Data Collection rules to that Azure monitor agent you are about to install:

2.Here you can have installers for a windows/linux machines and get the needed information to those installers:

  • Workspace ID
  • Primary key
  • Secondary key

It’s also possible download the Log Analytics Gateway to act as a proxy if you have machines without Internet connectivity

That was kind of all from the Asset inventory. Stay tuned. The next part is coming. 

The parts of the MDC blog series

 
  • Part 0: Microsoft Defender for Cloud – The EPIC blog series – introduction
  • Part 1: Getting started aka Setup 
  • Part 2: The Asset Inventory 
  • Part 3: Security posture
  • Part 4: Security recommendations
  • Part 5: Security alerts
  • Part 6: Attack path analysis
  • Part 7: Cloud security explorer
  • Part 8: Workbooks
  • Part 9: Regulatory compliance
  • Part 10: Workload protections
  • part 10.5: Advanced Workload protection
  • Part 11: Data and AI security – The end of the series
Picture of Jussi Metso

Jussi Metso

Author is a a lifelong IT enthusiast, Microsoft Security MVP and interested in Cloud Security, XDR, SIEM and AI. Motto: Learning is the key for your future.
Share on Social Media
xfacebooklinkedinwhatsapp

Discover more from Jussi Metso

Subscribe to get the latest posts sent to your email.

DEFENDER FOR CLOUD #cloudsecurity#mdcseries

Post navigation

Previous post
Next post

Related Posts

DEFENDER FOR CLOUD

Defender for Cloud – Part 10: Cloud Workload protection (CWP)

April 24, 2025May 25, 2025

Cloud Workload Protection in Microsoft Defender for Cloud helps protect various cloud resources such as virtual machines, containers, databases, and applications from security threats, vulnerabilities, and misconfigurations.

Read More
DEFENDER FOR CLOUD

Defender for Cloud – Part 7: Cloud Security Explorer

February 22, 2025May 25, 2025

The Cloud Security Explorer allows you to run graph-based queries and proactively identify security risks in your cloud environment. You can query effective exposure to internet, permisisons, vulnerabilities, potential lateral movement and much more. Your security team can create and run different queries for different scenarios

Read More
DEFENDER FOR CLOUD

Defender for Cloud – Part 4: Security Recommendations

August 24, 2024May 25, 2025

Resources and workloads protected by Microsoft Defender for Cloud are assessed against built-in and custom security standards enabled in your Azure subscriptions, AWS accounts, and GCP projects. Based on those assessments, security recommendations provide practical steps to remediate security issues, and improve security posture.

Read More

Link to my MVP profile:

Join our Security User Group:

Subscribe my blog to get updates!

Join 40 other subscribers

Recent Posts

  • Red Tenant intro
  • Understanding Microsoft Zero Trust Assessment Tool
  • Book review of Microsoft Security Copilot for Security Operations
  • Book review of The Azure Cloud Native Architecture Mapbook – 2nd Edition
  • NextGen Defender for Cloud: Phase 1 – public preview

Top posts:

Defender for Cloud – Part 10: Cloud Workload protection (CWP)
NextGen Defender for Cloud: Phase 1 - public preview
Defender for Cloud - Part 6: Attack Path Analysis
Defender for Cloud – Part 5: Security Alerts
Microsoft Sentinel Data lake (preview)

Categories

Tags

#architecture #azure #bookreview #cloudsecurity #defenderforcloud #defenderforstorage #defenderxdr #entraid #security #governance #management #malwarescan #mdcseries #securitycopilot #sentinel #siem #soc

Archives

Visits on my site

21,726 hits

©2022-2026 Jussi Metso. All rights reserved.