Skip to content
Jussi Metso
Jussi Metso

It’s all about The Cloud and The Security

  • Posts
  • About the blog
  • Activity
  • Connect!
  • Privacy Policy
Jussi Metso

It’s all about The Cloud and The Security

February 22, 2025May 25, 2025

Defender for Cloud – Part 7: Cloud Security Explorer

Table of Contents

The Cloud Security Explorer -feature was introduced to Public Preview on January 2023.

What is Cloud Security Explorer?

Note: You need Defender CSPM plan to use Cloud Security Explorer

With cloud security explorer, you can proactively identify security risks in your multicloud environment by running graph-based queries on the cloud security graph. Your security team can use the query builder to search for and locate risks, while taking your organization’s specific contextual and conventional information into account.

Cloud security explorer provides you with the ability to perform proactive exploration features. You can search for security risks within your organization by running graph-based path-finding queries on top the contextual security data that is already provided by Defender for Cloud, such as cloud misconfigurations, vulnerabilities, resource context, lateral movement possibilities between resources and more.

It is based on cloud security graph which is a graph-based context engine within Defender for Cloud.

It has ready made templates and  a query builder where you can “build” your query based on the options you select. 

For a more in-depth understanding and a visual demonstration of Cloud Security Explorer and its features (and of attack path analysis which was my previous post,) you might watch the following video with Yuri Diogenes and Tal Rosler:

Query templates

Query templates in Cloud Security Explorer are predefined sets of filters and parameters that target specific security scenarios. They serve as starting points for users to quickly generate insights without the need to construct queries from scratch. These templates can be used as-is or customized further to meet the unique security requirements of an organization.

Templates page. Click to enlarge

How to Use Query Templates

  • Accessing Cloud Security Explorer:

    • Sign in to the Azure portal.
    • Navigate to Microsoft Defender for Cloud > Cloud Security Explorer.
  • Selecting a Query Template:

    • On the right side of Cloud Security Explorer page, you’ll find a list of available query templates.
    • Browse through the templates to find one that aligns with your security investigation needs.
    • Click on Open query next to the desired template to load it.
  • Customizing the Query:

    • Once the template is loaded, you can modify the filters and parameters to better suit your environment.
    • Adjust resource types, severity levels, or specific conditions as needed.
  • Running the Query:

    • After customization, click on Search to execute the query.
    • Review the results to identify and assess potential security risks.
  • Sharing and Collaboration:

    • If you wish to share the query with colleagues, select Share query link to copy a direct link to the query configuration.
    • This facilitates collaboration and ensures that all stakeholders are aligned in their security assessments.
    • You can also Download CSV report and use like to want.

The share query link content includes:

				
					"https://portal.azure.com#view/Microsoft_Azure_Security/SecurityGraph.ReactView/query/<the rest of query includes all properties you have selected to find>"
				
			

While the full list of templates can be accessed within the Cloud Security Explorer, here are a few examples:

  • Internet-Exposed Storage Containers with Sensitive Data: Identifies storage containers that are publicly accessible and contain sensitive information.
  • Virtual Machines with High-Severity Vulnerabilities: Finds VMs that have critical vulnerabilities and are potentially exposed to threats.
  • Kubernetes Clusters with Misconfigurations: Detects Kubernetes clusters that may be improperly configured, leading to security risks.

These templates are designed to address common security concerns and can be tailored to fit the specific context of your cloud infrastructure.

Query editor

The Query Editor in Microsoft Defender for Cloud’s Cloud Security Explorer is a dynamic tool designed to help security teams proactively identify and mitigate risks within their cloud environments. It enables users to construct and execute graph-based queries on the cloud security graph, providing deep insights into assets, configurations, vulnerabilities, and more.

Here you can first select the category which to look for issues. The main categories are:

  • Popular
  • Compute
  • Networking
  • Data
  • AI & ML
  • Containers
  • Keys & Secrets
  • APIs
  • DevOps

Those have lot’s of sub categories which will be showed when you click the main category so you can drill-in to those.

Below is an image of the Query builder. 

The query builder. Click to enlarge.

How to Use Query Templates​

  • Accessing the Cloud Security Explorer:

    • Sign in to the Azure portal.
    • Navigate to Microsoft Defender for Cloud > Cloud Security Explorer.
  • Building a Custom Query:

    • Select a resource type from the dropdown menu to define the scope of your query.
    • Click the “+” icon to add additional filters, such as specific subscriptions, resource groups, or security statuses.
    • Adjust subfilters as needed to refine your query parameters.
  • Executing the Query:

    • After configuring your filters, click Search to run the query.
    • Review the generated results to identify potential security risks or compliance issues.
  • Utilizing Query Templates:

    • At the bottom of the Cloud Security Explorer page, browse through available query templates.
    • Select a template that aligns with your investigation needs and click Open query.
    • Modify the pre-populated filters as necessary, then execute the query to obtain tailored insights.
  • Sharing Queries:

    • After constructing a query, click Share query link to copy a direct link to your clipboard.
    • Share this link with colleagues to facilitate collaboration and ensure consistent security evaluations.

Watch my video how to make a query:

After making a query you can press Search to get the results if there’s a possibility to find any assets.

Click to enlarge

View details link opens the panel to the right side of the screen

Results details. Click to enlarge

What you can see as general details:

Asset name, Subscription, Resource group, Cloud provider, Tags.

Vulnerability Insights from the asset:

CVE-ID, Description summary, Severity, CVSS vectors, CVSS score.

And if you press the Open vulnerability page link the Azure opens the normal details page which can see from e.g. recommendations:

 
 
Click to enlarge

Here was the Cloud Security Explorer features explained. The next one is Workbooks.

The parts of the MDC blog series

 
  • Part 0: Microsoft Defender for Cloud – The EPIC blog series – introduction
  • Part 1: Getting started aka Setup 
  • Part 2: The Asset Inventory 
  • Part 3: Security posture
  • Part 4: Security recommendations
  • Part 5: Security alerts
  • Part 6: Attack path analysis
  • Part 7: Cloud security explorer
  • Part 8: Workbooks
  • Part 9: Regulatory compliance
  • Part 10: Workload protections
  • part 10.5: Advanced Workload protection
  • Part 11: Data and AI security – The end of the series
Picture of Jussi Metso
Jussi Metso

Author is a a lifelong IT enthusiast, Microsoft Security MVP and interested in Cloud Security, XDR, SIEM and AI. Motto: Learning is the key for your future.

Share on Social Media
x facebook linkedinwhatsapp

Discover more from Jussi Metso

Subscribe to get the latest posts sent to your email.

DEFENDER FOR CLOUD #cloudsecurity#mdcseries

Post navigation

Previous post
Next post

Related Posts

CSPM

Cloud Security Posture Management (CSPM) and some of it’s features

January 11, 2023January 16, 2023

Table of Contents What is Cloud Security Posture Management in Azure? Cloud Security Posture Management…

Read More
DEFENDER FOR CLOUD

Defender for Cloud – Part 4: Security Recommendations

August 24, 2024May 25, 2025

Resources and workloads protected by Microsoft Defender for Cloud are assessed against built-in and custom security standards enabled in your Azure subscriptions, AWS accounts, and GCP projects. Based on those assessments, security recommendations provide practical steps to remediate security issues, and improve security posture.

Read More
DEFENDER FOR CLOUD

Defender for Cloud – Part 10.5: CWP Advanced protection

May 10, 2025May 25, 2025

Advanced Threat Protection provides a new layer of security, which enables customers to detect and respond to potential threats as they occur by providing security alerts on anomalous activities.

Read More

Link to my MVP profile:

Join our Security User Group:

My Sessionize profile:

Subscribe my blog to get updates!

Join 36 other subscribers

Recent Posts

  • Malware automated remediation in Defender for Storage
  • Microsoft Sentinel Data lake (preview)
  • Azure Kubernetes Cluster update & security
  • Modernizing your on-prem SIEM with Microsoft Sentinel – part 2
  • Modernizing your on-prem SIEM with Microsoft Sentinel – part 1

Top posts:

Defender for Cloud – Part 10: Cloud Workload protection (CWP)
Defender for Cloud - Part 6: Attack Path Analysis
Defender for Cloud – Part 5: Security Alerts
Microsoft Cloud Attack and Defense Bootcamp
Defender for Cloud - Part 7: Cloud Security Explorer

Categories

Tags

#cloudsecurity #defenderforstorage #malwarescan #mdcseries #sentinel #siem #soc

Archives

Visits on my site

15,149 hits

©2022-2025 Jussi Metso. All rights reserved.