{"id":148,"date":"2023-01-11T00:23:31","date_gmt":"2023-01-10T22:23:31","guid":{"rendered":"https:\/\/www.jussimetso.com\/?p=148"},"modified":"2023-01-16T20:35:45","modified_gmt":"2023-01-16T18:35:45","slug":"cloud-security-posture-management-cspm-and-some-of-its-features","status":"publish","type":"post","link":"https:\/\/www.jussimetso.com\/index.php\/2023\/01\/11\/cloud-security-posture-management-cspm-and-some-of-its-features\/","title":{"rendered":"Cloud Security Posture Management (CSPM) and some of it&#8217;s features"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div>\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"148\" class=\"elementor elementor-148\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bd94246 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bd94246\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-10bf98b\" data-id=\"10bf98b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ae5378d elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"ae5378d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;exclude_headings_by_selector&quot;:[],&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;,&quot;h4&quot;,&quot;h5&quot;,&quot;h6&quot;],&quot;marker_view&quot;:&quot;numbers&quot;,&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h4 class=\"elementor-toc__header-title\">\n\t\t\t\tTable of Contents\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__ae5378d\" aria-expanded=\"true\" aria-label=\"Open table of contents\"><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__ae5378d\" aria-expanded=\"true\" aria-label=\"Close table of contents\"><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__ae5378d\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<i class=\"elementor-toc__spinner eicon-animation-spin eicon-loading\" aria-hidden=\"true\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2ba733a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2ba733a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a101dde\" data-id=\"a101dde\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a470cdd elementor-widget elementor-widget-heading\" data-id=\"a470cdd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is Cloud Security Posture Management in Azure?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7606eab elementor-widget elementor-widget-text-editor\" data-id=\"7606eab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #171717; font-family: 'Segoe UI', SegoeUI, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">Cloud Security Posture Management (CSPM) is a new plan in Microsoft Defender for Cloud. It provides a lot of new security management tools for Azure.\u00a0<\/span><span style=\"color: #171717; font-family: 'Segoe UI', SegoeUI, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-weight: var( --e-global-typography-text-font-weight ); background-color: var(--petite-stories-background);\">CSPM provides you with hardening guidance that helps you efficiently and effectively improve your security. CSPM also gives you visibility into your current security situation.<\/span><\/p>\n<p style=\"box-sizing: inherit; outline-color: inherit; margin-top: 1rem; margin-right: 0px; margin-left: 0px; padding: 0px; overflow-wrap: break-word; color: #171717; font-family: 'Segoe UI', SegoeUI, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">Defender for Cloud continually assesses your resources, subscriptions, and organization for security issues and shows your security posture in secure score, an aggregated score of the security findings that tells you, at a glance, your current security situation: the higher the score, the lower the identified risk level.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1c5516 elementor-widget elementor-widget-heading\" data-id=\"c1c5516\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Defender for CSPM options<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db911f3 elementor-widget elementor-widget-text-editor\" data-id=\"db911f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: rgb(23, 23, 23); font-family: &quot;Segoe UI&quot;, SegoeUI, &quot;Helvetica Neue&quot;, Helvetica, Arial, sans-serif;\">The Defender CSPM plan comes with two options, foundational CSPM capabilities and Defender CSPM. When you deploy Defender for Cloud to your subscription and resources, you&#8217;ll automatically gain the basic coverage offered by the CSPM plan. To gain access to the other capabilities provided by Defender CSPM, you&#8217;ll need to enable Defender CSPM plan in your environment settings.<\/span><br><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6726be elementor-widget elementor-widget-image\" data-id=\"c6726be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"52\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/cspm_plan.png?fit=640%2C52&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-151\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/cspm_plan.png?w=1730&amp;ssl=1 1730w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/cspm_plan.png?resize=300%2C24&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/cspm_plan.png?resize=1024%2C83&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/cspm_plan.png?resize=768%2C62&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/cspm_plan.png?resize=1536%2C124&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/cspm_plan.png?resize=850%2C69&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/cspm_plan.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b03d239 elementor-widget elementor-widget-heading\" data-id=\"b03d239\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">CSPM feature list<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45bb4bb elementor-widget elementor-widget-image\" data-id=\"45bb4bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/concept-cloud-security-posture-management#defender-cspm-plan-options\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"355\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cspm_features.png?fit=640%2C355&amp;ssl=1\" class=\"attachment-large size-large wp-image-163\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cspm_features.png?w=1521&amp;ssl=1 1521w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cspm_features.png?resize=300%2C166&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cspm_features.png?resize=1024%2C568&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cspm_features.png?resize=768%2C426&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cspm_features.png?resize=850%2C472&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cspm_features.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image grabbed from Overview of Defender CSPM page.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b299949 elementor-widget elementor-widget-heading\" data-id=\"b299949\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is Cloud Security Explorer?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58c64a30 elementor-widget elementor-widget-text-editor\" data-id=\"58c64a30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"box-sizing: inherit; outline-color: inherit; margin: 1rem 0px 0px; padding: 0px; overflow-wrap: break-word; color: rgb(23, 23, 23); font-family: &quot;Segoe UI&quot;, SegoeUI, &quot;Helvetica Neue&quot;, Helvetica, Arial, sans-serif;\">Using the cloud security explorer, you can proactively identify security risks in your multicloud environment by running graph-based queries on the cloud security graph. Your security team can use the query builder to search for and locate risks, while taking your organization&#8217;s specific contextual and conventional information into account.<\/p><p style=\"box-sizing: inherit; outline-color: inherit; margin-top: 1rem; margin-right: 0px; margin-left: 0px; padding: 0px; overflow-wrap: break-word; color: rgb(23, 23, 23); font-family: &quot;Segoe UI&quot;, SegoeUI, &quot;Helvetica Neue&quot;, Helvetica, Arial, sans-serif;\">Cloud security explorer provides you with the ability to perform proactive exploration features. You can search for security risks within your organization by running graph-based path-finding queries on top the contextual security data that is already provided by Defender for Cloud, such as cloud misconfigurations, vulnerabilities, resource context, lateral movement possibilities between resources and more.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c883885 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c883885\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a18f4b3\" data-id=\"a18f4b3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-877b929 elementor-widget elementor-widget-heading\" data-id=\"877b929\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How to enable it?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b8dc57f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b8dc57f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-25d2c71\" data-id=\"25d2c71\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-640117a elementor-widget elementor-widget-text-editor\" data-id=\"640117a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To use Cloud Security Explorer you need to enable the following:<\/p>\n<p>-Enable agentless scanning<\/p>\n<p>-Enable Defender for CSPM<\/p>\n<p>-Enable Defender for Containers,\u00a0<\/p>\n<p>(and install the relevant agents in order to view attack paths that are related to containers. This will also give you the ability to query containers data plane workloads in security explorer.)<\/p>\n<p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); background-color: var(--petite-stories-background);\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-585984b elementor-widget elementor-widget-heading\" data-id=\"585984b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How to use it?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9a7fdc elementor-widget elementor-widget-text-editor\" data-id=\"d9a7fdc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>You can build queries or use pre-made templates to get the results if there are any.<\/p>\n<p>But first you need to login to Azure portal. Go with your browser to\u00a0<a style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); background-color: var(--petite-stories-background);\" href=\"https:\/\/portal.azure.com\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.azure.com<\/a><\/p>\n<p>Navigate go to the Defender for Cloud and click <b>Cloud Security Explorer (preview)<\/b>.<\/p>\n<p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7a0a57 elementor-widget elementor-widget-image\" data-id=\"f7a0a57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"143\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_choose.png?fit=640%2C143&amp;ssl=1\" class=\"attachment-large size-large wp-image-168\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_choose.png?w=1957&amp;ssl=1 1957w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_choose.png?resize=300%2C67&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_choose.png?resize=1024%2C228&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_choose.png?resize=768%2C171&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_choose.png?resize=1536%2C342&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_choose.png?resize=850%2C189&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_choose.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eed5493 elementor-widget elementor-widget-text-editor\" data-id=\"eed5493\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>First you see only one dropdown list which is actually the starting point of query editor. Under that you can see pre-made query templates which you click and get the query results.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4095159 elementor-widget elementor-widget-image\" data-id=\"4095159\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2048\" height=\"810\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_ready_templates.png?fit=2048%2C810&amp;ssl=1\" class=\"attachment-2048x2048 size-2048x2048 wp-image-170\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_ready_templates.png?w=3035&amp;ssl=1 3035w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_ready_templates.png?resize=300%2C119&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_ready_templates.png?resize=1024%2C405&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_ready_templates.png?resize=768%2C304&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_ready_templates.png?resize=1536%2C608&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_ready_templates.png?resize=2048%2C810&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_ready_templates.png?resize=850%2C336&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_ready_templates.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_ready_templates.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51f8c16 elementor-widget elementor-widget-text-editor\" data-id=\"51f8c16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An example query: Search virtual machines which are exposed to internet:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8737984 elementor-widget elementor-widget-image\" data-id=\"8737984\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"258\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_example_query_results.png?fit=640%2C258&amp;ssl=1\" class=\"attachment-large size-large wp-image-173\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_example_query_results.png?w=1996&amp;ssl=1 1996w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_example_query_results.png?resize=300%2C121&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_example_query_results.png?resize=1024%2C412&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_example_query_results.png?resize=768%2C309&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_example_query_results.png?resize=1536%2C619&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_example_query_results.png?resize=850%2C342&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_example_query_results.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cse_example_query_results.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9babe0f elementor-widget elementor-widget-text-editor\" data-id=\"9babe0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The results are shown below the search button. And if you click some of the results, the new blade opens which shows more information about the current virtual machine. At this point of the public preview you can&#8217;t export the results\u00a0 anywhere but I hope it is possible in the coming versions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-799e145 elementor-widget elementor-widget-text-editor\" data-id=\"799e145\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Result details:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df31fb3 elementor-widget elementor-widget-image\" data-id=\"df31fb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"223\" height=\"300\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_sce_results_details.png?fit=223%2C300&amp;ssl=1\" class=\"attachment-medium size-medium wp-image-174\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_sce_results_details.png?w=745&amp;ssl=1 745w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_sce_results_details.png?resize=223%2C300&amp;ssl=1 223w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_sce_results_details.png?resize=300%2C404&amp;ssl=1 300w\" sizes=\"(max-width: 223px) 100vw, 223px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8282824 elementor-widget elementor-widget-text-editor\" data-id=\"8282824\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>More details at\u00a0<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/how-to-manage-cloud-security-explorer\" target=\"_blank\" rel=\"noopener\">Microsoft learn<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8f6dee9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8f6dee9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8e19977\" data-id=\"8e19977\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b4fbfea elementor-widget elementor-widget-heading\" data-id=\"b4fbfea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is Attack path analysis and how to use it?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ec0c7c elementor-widget elementor-widget-text-editor\" data-id=\"5ec0c7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"box-sizing: inherit; outline-color: inherit; margin: 1rem 0px 0px; padding: 0px; overflow-wrap: break-word; color: #171717; font-family: 'Segoe UI', SegoeUI, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">Attack path analysis is a graph-based algorithm that scans the cloud security graph. The scans expose exploitable paths that attackers may use to breach your environment to reach your high-impact assets. Attack path analysis exposes those attack paths and suggests recommendations as to how best remediate the issues that will break the attack path and prevent successful breach.<\/p>\n<p style=\"box-sizing: inherit; outline-color: inherit; margin-top: 1rem; margin-right: 0px; margin-left: 0px; padding: 0px; overflow-wrap: break-word; color: #171717; font-family: 'Segoe UI', SegoeUI, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">By taking your environment&#8217;s contextual information into account such as internet exposure, permissions, lateral movement, and more, attack path analysis identifies issues that may lead to a breach on your environment, and helps you to remediate the highest risk ones first.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5724f42 elementor-widget elementor-widget-image\" data-id=\"5724f42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"128\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attack_path_analysis.png?fit=640%2C128&amp;ssl=1\" class=\"attachment-large size-large wp-image-175\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attack_path_analysis.png?w=1525&amp;ssl=1 1525w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attack_path_analysis.png?resize=300%2C60&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attack_path_analysis.png?resize=1024%2C205&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attack_path_analysis.png?resize=768%2C154&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attack_path_analysis.png?resize=850%2C171&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attack_path_analysis.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03421b0 elementor-widget elementor-widget-text-editor\" data-id=\"03421b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To enable attack path analysis you need to enable the same options as with cloud security explorer which are CSPM plan. defender for containers and agentless scanning (or defender for servers P1 or defender for servers P2 in the Defender for servers plans).<\/p>\n<p>Navigate to Defender for Cloud and choose recommendations and you see the screen like this:<\/p>\n<p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-965e645 elementor-widget elementor-widget-image\" data-id=\"965e645\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"94\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_recomm_attack_path_analysis.png?fit=640%2C94&amp;ssl=1\" class=\"attachment-large size-large wp-image-176\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_recomm_attack_path_analysis.png?w=2287&amp;ssl=1 2287w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_recomm_attack_path_analysis.png?resize=300%2C44&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_recomm_attack_path_analysis.png?resize=1024%2C151&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_recomm_attack_path_analysis.png?resize=768%2C113&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_recomm_attack_path_analysis.png?resize=1536%2C226&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_recomm_attack_path_analysis.png?resize=2048%2C302&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_recomm_attack_path_analysis.png?resize=850%2C125&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_recomm_attack_path_analysis.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_recomm_attack_path_analysis.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10ef26e elementor-widget elementor-widget-text-editor\" data-id=\"10ef26e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Now click the attack path button and the new blade opens which shows the attack path, environment, path counts, risk categories and affected resources (sorry about small image).\u00a0<\/p>\n<p>For each attack path you can see all of risk categories and any affected resources.<\/p>\n<p>The potential risk categories include credentials exposure, compute abuse, data exposure, subsciption and account takeover.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da0df99 elementor-widget elementor-widget-image\" data-id=\"da0df99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2048\" height=\"396\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attack_path_details.png?fit=2048%2C396&amp;ssl=1\" class=\"attachment-2048x2048 size-2048x2048 wp-image-177\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attack_path_details.png?w=3637&amp;ssl=1 3637w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attack_path_details.png?resize=300%2C58&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attack_path_details.png?resize=1024%2C198&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attack_path_details.png?resize=768%2C148&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attack_path_details.png?resize=1536%2C297&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attack_path_details.png?resize=2048%2C396&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attack_path_details.png?resize=850%2C164&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attack_path_details.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attack_path_details.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a430f1a elementor-widget elementor-widget-text-editor\" data-id=\"a430f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For example I clicked of those paths (Interned exposed EC2). It opens a blade which has a lot of information and recommended actions to remediate the threat:<\/p>\n<p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e95e18 elementor-widget elementor-widget-image\" data-id=\"0e95e18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"213\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attackpath_ec2_example.png?fit=640%2C213&amp;ssl=1\" class=\"attachment-large size-large wp-image-178\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attackpath_ec2_example.png?w=3601&amp;ssl=1 3601w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attackpath_ec2_example.png?resize=300%2C99&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attackpath_ec2_example.png?resize=1024%2C340&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attackpath_ec2_example.png?resize=768%2C255&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attackpath_ec2_example.png?resize=1536%2C509&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attackpath_ec2_example.png?resize=2048%2C679&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attackpath_ec2_example.png?resize=850%2C282&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attackpath_ec2_example.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/attackpath_ec2_example.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69a8ab7 elementor-widget elementor-widget-text-editor\" data-id=\"69a8ab7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>More details at\u00a0<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/how-to-manage-attack-path\" target=\"_blank\" rel=\"noopener\">Microsoft learn.<\/a>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b2bdfb5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b2bdfb5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bdf8e6b\" data-id=\"bdf8e6b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-02523b1 elementor-widget elementor-widget-heading\" data-id=\"02523b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Agentless scanning for machines<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be48667 elementor-widget elementor-widget-text-editor\" data-id=\"be48667\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"box-sizing: inherit; outline-color: inherit; margin: 1rem 0px 0px; padding: 0px; overflow-wrap: break-word; color: #171717; font-family: 'Segoe UI', SegoeUI, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">Microsoft Defender for Cloud maximizes coverage on OS posture issues and extends beyond the reach of agent-based assessments. With agentless scanning for VMs, you can get frictionless, wide, and instant visibility on actionable posture issues without installed agents, network connectivity requirements, or machine performance impact.<\/p>\n<p style=\"box-sizing: inherit; outline-color: inherit; margin-top: 1rem; margin-right: 0px; margin-left: 0px; padding: 0px; overflow-wrap: break-word; color: #171717; font-family: 'Segoe UI', SegoeUI, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">Agentless scanning for VMs provides vulnerability assessment and software inventory, both powered by Defender vulnerability management, in Azure and Amazon AWS environments. Agentless scanning is available in both Defender Cloud Security Posture Management and Defender for Servers P2 plans.<\/p>\n<p style=\"box-sizing: inherit; outline-color: inherit; margin-top: 1rem; margin-right: 0px; margin-left: 0px; padding: 0px; overflow-wrap: break-word; color: #171717; font-family: 'Segoe UI', SegoeUI, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f2755d elementor-widget elementor-widget-heading\" data-id=\"4f2755d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How does it work?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72eb6a3 elementor-widget elementor-widget-text-editor\" data-id=\"72eb6a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"box-sizing: inherit; outline-color: inherit; margin: 1rem 0px 0px; padding: 0px; overflow-wrap: break-word; color: #171717; font-family: 'Segoe UI', SegoeUI, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">While agent-based methods use OS APIs in runtime to continuously collect security related data, agentless scanning for VMs uses cloud APIs to collect data. Defender for Cloud takes snapshots of VM disks and does an out-of-band, deep analysis of the OS configuration and file system stored in the snapshot. The copied snapshot doesn&#8217;t leave the original compute region of the VM, and the VM is never impacted by the scan.<\/p>\n<p style=\"box-sizing: inherit; outline-color: inherit; margin: 1rem 0px 0px; padding: 0px; overflow-wrap: break-word; color: #171717; font-family: 'Segoe UI', SegoeUI, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">After the necessary metadata is acquired from the disk, Defender for Cloud immediately deletes the copied snapshot of the disk and sends the metadata to Microsoft engines to analyze configuration gaps and potential threats. For example, in vulnerability assessment, the analysis is done by Defender vulnerability management. The results are displayed in Defender for Cloud, seamlessly consolidating agent-based and agentless results.<\/p>\n<p style=\"box-sizing: inherit; outline-color: inherit; margin-top: 1rem; margin-right: 0px; margin-left: 0px; padding: 0px; overflow-wrap: break-word; color: #171717; font-family: 'Segoe UI', SegoeUI, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">The scanning environment where disks are analyzed is regional, volatile, isolated, and highly secure. Disk snapshots and data unrelated to the scan aren&#8217;t stored longer than is necessary to collect the metadata, typically a few minutes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e03fba2 elementor-widget elementor-widget-image\" data-id=\"e03fba2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"238\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/agentless_scanning.png?fit=640%2C238&amp;ssl=1\" class=\"attachment-large size-large wp-image-179\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/agentless_scanning.png?w=1525&amp;ssl=1 1525w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/agentless_scanning.png?resize=300%2C112&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/agentless_scanning.png?resize=1024%2C381&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/agentless_scanning.png?resize=768%2C286&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/agentless_scanning.png?resize=850%2C316&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/agentless_scanning.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65c1072 elementor-widget elementor-widget-text-editor\" data-id=\"65c1072\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>More details at\u00a0<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/concept-agentless-data-collection\" target=\"_blank\" rel=\"noopener\">Microsoft learn<\/a>.<\/p>\n<p>Cloud Security Posture Management and all the features which I have presented are in Public Preview at the moment and they will develop in the future. So the images I have taken as screenshots from Azure might change.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Table of Contents What is Cloud Security Posture Management in Azure? Cloud Security Posture Management&#8230;<\/p>\n","protected":false},"author":2,"featured_media":160,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20,9],"tags":[],"class_list":["post-148","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cspm","category-defender-for-cloud"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/01\/az_cloud_security_graph.png?fit=1519%2C1208&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pes24X-2o","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/comments?post=148"}],"version-history":[{"count":0,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/148\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/media\/160"}],"wp:attachment":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/media?parent=148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/categories?post=148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/tags?post=148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}