{"id":1922,"date":"2025-02-22T22:20:06","date_gmt":"2025-02-22T20:20:06","guid":{"rendered":"https:\/\/www.jussimetso.com\/?p=1922"},"modified":"2025-05-25T17:20:13","modified_gmt":"2025-05-25T14:20:13","slug":"defender-for-cloud-part-7-cloud-security-explorer","status":"publish","type":"post","link":"https:\/\/www.jussimetso.com\/index.php\/2025\/02\/22\/defender-for-cloud-part-7-cloud-security-explorer\/","title":{"rendered":"Defender for Cloud &#8211; Part 7: Cloud Security Explorer"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div>\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1922\" class=\"elementor elementor-1922\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a3292 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a3292\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-51f7bda\" data-id=\"51f7bda\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-153a538 elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"153a538\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;,&quot;h4&quot;,&quot;h5&quot;],&quot;exclude_headings_by_selector&quot;:[],&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;marker_view&quot;:&quot;numbers&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h4 class=\"elementor-toc__header-title\">\n\t\t\t\tTable of Contents\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__153a538\" aria-expanded=\"true\" aria-label=\"Open table of contents\"><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__153a538\" aria-expanded=\"true\" aria-label=\"Close table of contents\"><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__153a538\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<i class=\"elementor-toc__spinner eicon-animation-spin eicon-loading\" aria-hidden=\"true\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e07de8d elementor-widget elementor-widget-text-editor\" data-id=\"e07de8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Cloud Security Explorer -feature was introduced to Public Preview on January 2023. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4837660 elementor-widget elementor-widget-heading\" data-id=\"4837660\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is Cloud Security Explorer?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ed7ba1 elementor-blockquote--skin-clean elementor-widget elementor-widget-blockquote\" data-id=\"9ed7ba1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tNote: You need Defender CSPM plan to use Cloud Security Explorer\t\t\t<\/p>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62725b1 elementor-widget elementor-widget-text-editor\" data-id=\"62725b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With\u00a0cloud security explorer, you can proactively identify security risks in your multicloud environment by running graph-based queries on the cloud security graph. Your security team can use the query builder to search for and locate risks, while taking your organization\u2019s specific contextual and conventional information into account.<\/p><p>Cloud security explorer provides you with the ability to perform proactive exploration features. You can search for security risks within your organization by running graph-based path-finding queries on top the contextual security data that is already provided by Defender for Cloud, such as cloud misconfigurations, vulnerabilities, resource context, lateral movement possibilities between resources and more.<\/p><p>It is based on cloud security graph which is a graph-based context engine within Defender for Cloud.<\/p><p>It has ready made templates and\u00a0 a query builder where you can &#8220;build&#8221; your query based on the options you select.\u00a0<\/p><p>For a more in-depth understanding and a visual demonstration of Cloud Security Explorer and its features (and of <a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/02\/12\/defender-for-cloud-part-6-attack-path-analysis\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">attack path analysis<\/span><\/a> which was my previous post,) you might watch the following video with Yuri Diogenes and Tal Rosler:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72368cd elementor-widget elementor-widget-video\" data-id=\"72368cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=dlkcQRys0c8&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5853026 elementor-widget elementor-widget-heading\" data-id=\"5853026\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Query templates<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78d366e elementor-widget elementor-widget-text-editor\" data-id=\"78d366e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Query templates in Cloud Security Explorer are predefined sets of filters and parameters that target specific security scenarios. They serve as starting points for users to quickly generate insights without the need to construct queries from scratch. These templates can be used as-is or customized further to meet the unique security requirements of an organization.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86f82e0 elementor-widget elementor-widget-image\" data-id=\"86f82e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_main_view.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_cloud_security_explorer_main_view\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTkyNSwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDJcL21kY19jbG91ZF9zZWN1cml0eV9leHBsb3Jlcl9tYWluX3ZpZXcucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"311\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_main_view.png?fit=640%2C311&amp;ssl=1\" class=\"attachment-large size-large wp-image-1925\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_main_view.png?w=3348&amp;ssl=1 3348w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_main_view.png?resize=300%2C146&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_main_view.png?resize=1024%2C497&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_main_view.png?resize=768%2C373&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_main_view.png?resize=1536%2C745&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_main_view.png?resize=2048%2C993&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_main_view.png?resize=850%2C412&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_main_view.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_main_view.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Templates page. Click to enlarge<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93c015a elementor-widget elementor-widget-heading\" data-id=\"93c015a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How to Use Query Templates<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae1bcba elementor-widget elementor-widget-text-editor\" data-id=\"ae1bcba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"847\" data-end=\"1003\"><p data-start=\"850\" data-end=\"888\"><strong data-start=\"850\" data-end=\"887\">Accessing Cloud Security Explorer<\/strong>:<\/p><ul data-start=\"892\" data-end=\"1003\"><li data-start=\"892\" data-end=\"922\">Sign in to the Azure portal.<\/li><li data-start=\"926\" data-end=\"1003\">Navigate to <strong data-start=\"940\" data-end=\"972\">Microsoft Defender for Cloud<\/strong> &gt; <strong data-start=\"975\" data-end=\"1002\">Cloud Security Explorer<\/strong>.<\/li><\/ul><\/li><li data-start=\"1005\" data-end=\"1312\"><p data-start=\"1008\" data-end=\"1039\"><strong data-start=\"1008\" data-end=\"1038\">Selecting a Query Template<\/strong>:<\/p><ul data-start=\"1043\" data-end=\"1312\"><li data-start=\"1043\" data-end=\"1144\">On the right side of Cloud Security Explorer page, you&#8217;ll find a list of available query templates.<\/li><li data-start=\"1148\" data-end=\"1242\">Browse through the templates to find one that aligns with your security investigation needs.<\/li><li data-start=\"1246\" data-end=\"1312\">Click on <strong data-start=\"1257\" data-end=\"1271\">Open query<\/strong> next to the desired template to load it.<\/li><\/ul><\/li><li data-start=\"1314\" data-end=\"1531\"><p data-start=\"1317\" data-end=\"1343\"><strong data-start=\"1317\" data-end=\"1342\">Customizing the Query<\/strong>:<\/p><ul data-start=\"1347\" data-end=\"1531\"><li data-start=\"1347\" data-end=\"1452\">Once the template is loaded, you can modify the filters and parameters to better suit your environment.<\/li><li data-start=\"1456\" data-end=\"1531\">Adjust resource types, severity levels, or specific conditions as needed.<\/li><\/ul><\/li><li data-start=\"1533\" data-end=\"1699\"><p data-start=\"1536\" data-end=\"1558\"><strong data-start=\"1536\" data-end=\"1557\">Running the Query<\/strong>:<\/p><ul data-start=\"1562\" data-end=\"1699\"><li data-start=\"1562\" data-end=\"1626\">After customization, click on <strong data-start=\"1594\" data-end=\"1604\">Search<\/strong> to execute the query.<\/li><li data-start=\"1630\" data-end=\"1699\">Review the results to identify and assess potential security risks.<\/li><\/ul><\/li><li data-start=\"1701\" data-end=\"1978\"><p data-start=\"1704\" data-end=\"1734\"><strong data-start=\"1704\" data-end=\"1733\">Sharing and Collaboration<\/strong>:<\/p><ul data-start=\"1738\" data-end=\"1978\"><li data-start=\"1738\" data-end=\"1865\">If you wish to share the query with colleagues, select <strong data-start=\"1795\" data-end=\"1815\">Share query link<\/strong> to copy a direct link to the query configuration.<\/li><li data-start=\"1869\" data-end=\"1978\">This facilitates collaboration and ensures that all stakeholders are aligned in their security assessments.<\/li><li data-start=\"1869\" data-end=\"1978\">You can also <strong>Download CSV report<\/strong> and use like to want.<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68026e9 elementor-widget elementor-widget-image\" data-id=\"68026e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"294\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_share.png?fit=640%2C294&amp;ssl=1\" class=\"attachment-large size-large wp-image-1997\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_share.png?w=1080&amp;ssl=1 1080w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_share.png?resize=300%2C138&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_share.png?resize=1024%2C471&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_share.png?resize=768%2C353&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_share.png?resize=850%2C391&amp;ssl=1 850w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e99c537 elementor-widget elementor-widget-text-editor\" data-id=\"e99c537\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The share query link content includes:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d02810 elementor-widget elementor-widget-code-highlight\" data-id=\"7d02810\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"code-highlight.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"prismjs-default copy-to-clipboard \">\n\t\t\t<pre data-line=\"\" class=\"highlight-height language-javascript line-numbers\">\n\t\t\t\t<code readonly=\"true\" class=\"language-javascript\">\n\t\t\t\t\t<xmp>\"https:\/\/portal.azure.com#view\/Microsoft_Azure_Security\/SecurityGraph.ReactView\/query\/<the rest of query includes all properties you have selected to find>\"<\/xmp>\n\t\t\t\t<\/code>\n\t\t\t<\/pre>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e9d15d elementor-widget elementor-widget-text-editor\" data-id=\"3e9d15d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2030\" data-end=\"2139\">While the full list of templates can be accessed within the Cloud Security Explorer, here are a few examples:<\/p><ul data-start=\"2141\" data-end=\"2581\"><li data-start=\"2141\" data-end=\"2297\"><strong data-start=\"2143\" data-end=\"2202\">Internet-Exposed Storage Containers with Sensitive Data<\/strong>: Identifies storage containers that are publicly accessible and contain sensitive information.<\/li><li data-start=\"2298\" data-end=\"2441\"><strong data-start=\"2300\" data-end=\"2355\">Virtual Machines with High-Severity Vulnerabilities<\/strong>: Finds VMs that have critical vulnerabilities and are potentially exposed to threats.<\/li><li data-start=\"2442\" data-end=\"2581\"><strong data-start=\"2444\" data-end=\"2490\">Kubernetes Clusters with Misconfigurations<\/strong>: Detects Kubernetes clusters that may be improperly configured, leading to security risks.<\/li><\/ul><p data-start=\"2583\" data-end=\"2725\">These templates are designed to address common security concerns and can be tailored to fit the specific context of your cloud infrastructure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ddb26b8 elementor-widget elementor-widget-heading\" data-id=\"ddb26b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Query editor<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e46ce59 elementor-widget elementor-widget-text-editor\" data-id=\"e46ce59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The <strong data-start=\"4\" data-end=\"20\">Query Editor<\/strong> in Microsoft Defender for Cloud&#8217;s <strong data-start=\"55\" data-end=\"82\">Cloud Security Explorer<\/strong> is a dynamic tool designed to help security teams proactively identify and mitigate risks within their cloud environments. It enables users to construct and execute graph-based queries on the cloud security graph, providing deep insights into assets, configurations, vulnerabilities, and more.<\/p><p>Here you can first select the category which to look for issues. The main categories are:<\/p><ul><li>Popular<\/li><li>Compute<\/li><li>Networking<\/li><li>Data<\/li><li>AI &amp; ML<\/li><li>Containers<\/li><li>Keys &amp; Secrets<\/li><li>APIs<\/li><li>DevOps<\/li><\/ul><p>Those have lot&#8217;s of sub categories which will be showed when you click the main category so you can drill-in to those.<\/p><p>Below is an image of the Query builder.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0e1ce8 elementor-widget elementor-widget-image\" data-id=\"e0e1ce8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_query_main_view.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_cloud_security_explorer_query_main_view\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTkzNCwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDJcL21kY19jbG91ZF9zZWN1cml0eV9leHBsb3Jlcl9xdWVyeV9tYWluX3ZpZXcucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"399\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_query_main_view.png?fit=640%2C399&amp;ssl=1\" class=\"attachment-large size-large wp-image-1934\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_query_main_view.png?w=1002&amp;ssl=1 1002w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_query_main_view.png?resize=300%2C187&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_query_main_view.png?resize=768%2C478&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_query_main_view.png?resize=850%2C529&amp;ssl=1 850w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">The query builder. Click to enlarge.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72183c3 elementor-widget elementor-widget-heading\" data-id=\"72183c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How to Use Query Templates\u200b<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6d8919 elementor-widget elementor-widget-text-editor\" data-id=\"c6d8919\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"1141\" data-end=\"1301\"><p data-start=\"1144\" data-end=\"1186\"><strong data-start=\"1144\" data-end=\"1185\">Accessing the Cloud Security Explorer<\/strong>:<\/p><ul data-start=\"1190\" data-end=\"1301\"><li data-start=\"1190\" data-end=\"1220\">Sign in to the Azure portal.<\/li><li data-start=\"1224\" data-end=\"1301\">Navigate to <strong data-start=\"1238\" data-end=\"1270\">Microsoft Defender for Cloud<\/strong> &gt; <strong data-start=\"1273\" data-end=\"1300\">Cloud Security Explorer<\/strong>.<\/li><\/ul><\/li><li data-start=\"1303\" data-end=\"1612\"><p data-start=\"1306\" data-end=\"1334\"><strong data-start=\"1306\" data-end=\"1333\">Building a Custom Query<\/strong>:<\/p><ul data-start=\"1338\" data-end=\"1612\"><li data-start=\"1338\" data-end=\"1420\">Select a resource type from the dropdown menu to define the scope of your query.<\/li><li data-start=\"1424\" data-end=\"1546\">Click the <strong data-start=\"1436\" data-end=\"1443\">&#8220;+&#8221;<\/strong> icon to add additional filters, such as specific subscriptions, resource groups, or security statuses.<\/li><li data-start=\"1550\" data-end=\"1612\">Adjust subfilters as needed to refine your query parameters.<\/li><\/ul><\/li><li data-start=\"1614\" data-end=\"1806\"><p data-start=\"1617\" data-end=\"1641\"><strong data-start=\"1617\" data-end=\"1640\">Executing the Query<\/strong>:<\/p><ul data-start=\"1645\" data-end=\"1806\"><li data-start=\"1645\" data-end=\"1713\">After configuring your filters, click <strong data-start=\"1685\" data-end=\"1695\">Search<\/strong> to run the query.<\/li><li data-start=\"1717\" data-end=\"1806\">Review the generated results to identify potential security risks or compliance issues.<\/li><\/ul><\/li><li data-start=\"1808\" data-end=\"2134\"><p data-start=\"1811\" data-end=\"1841\"><strong data-start=\"1811\" data-end=\"1840\">Utilizing Query Templates<\/strong>:<\/p><ul data-start=\"1845\" data-end=\"2134\"><li data-start=\"1845\" data-end=\"1939\">At the bottom of the Cloud Security Explorer page, browse through available query templates.<\/li><li data-start=\"1943\" data-end=\"2030\">Select a template that aligns with your investigation needs and click <strong data-start=\"2015\" data-end=\"2029\">Open query<\/strong>.<\/li><li data-start=\"2034\" data-end=\"2134\">Modify the pre-populated filters as necessary, then execute the query to obtain tailored insights.<\/li><\/ul><\/li><li data-start=\"2136\" data-end=\"2369\"><p data-start=\"2139\" data-end=\"2159\"><strong data-start=\"2139\" data-end=\"2158\">Sharing Queries<\/strong>:<\/p><ul data-start=\"2163\" data-end=\"2369\"><li data-start=\"2163\" data-end=\"2260\">After constructing a query, click <strong data-start=\"2199\" data-end=\"2219\">Share query link<\/strong> to copy a direct link to your clipboard.<\/li><li data-start=\"2264\" data-end=\"2369\">Share this link with colleagues to facilitate collaboration and ensure consistent security evaluations.<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3440bee elementor-widget elementor-widget-text-editor\" data-id=\"3440bee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Watch my video how to make a query:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-165441d elementor-widget elementor-widget-video\" data-id=\"165441d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;video_type&quot;:&quot;hosted&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-hosted-video elementor-wrapper elementor-open-inline\">\n\t\t\t\t\t<video class=\"elementor-video\" src=\"https:\/\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/cloud_Security_Explorer.mp4\" controls=\"\" preload=\"metadata\" controlsList=\"nodownload\"><\/video>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36b33a2 elementor-widget elementor-widget-text-editor\" data-id=\"36b33a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>After making a query you can press <strong>Search<\/strong> to get the results if there&#8217;s a possibility to find any assets.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39e3c03 elementor-widget elementor-widget-image\" data-id=\"39e3c03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_cloud_security_explorer_results\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTk5OSwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDJcL21kY19jbG91ZF9zZWN1cml0eV9leHBsb3Jlcl9yZXN1bHRzLnBuZyJ9\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"167\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results.png?fit=640%2C167&amp;ssl=1\" class=\"attachment-large size-large wp-image-1999\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results.png?w=1444&amp;ssl=1 1444w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results.png?resize=300%2C78&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results.png?resize=1024%2C267&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results.png?resize=768%2C200&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results.png?resize=850%2C221&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Click to enlarge<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-589ac6e elementor-widget elementor-widget-text-editor\" data-id=\"589ac6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>View details<\/strong> link opens the panel to the right side of the screen<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e3fcb2 elementor-widget elementor-widget-image\" data-id=\"8e3fcb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results_details.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_cloud_security_explorer_results_details\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MjAwMCwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDJcL21kY19jbG91ZF9zZWN1cml0eV9leHBsb3Jlcl9yZXN1bHRzX2RldGFpbHMucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"132\" height=\"300\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results_details.png?fit=132%2C300&amp;ssl=1\" class=\"attachment-medium size-medium wp-image-2000\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results_details.png?w=676&amp;ssl=1 676w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results_details.png?resize=132%2C300&amp;ssl=1 132w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results_details.png?resize=450%2C1024&amp;ssl=1 450w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results_details.png?resize=675%2C1536&amp;ssl=1 675w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results_details.png?resize=300%2C683&amp;ssl=1 300w\" sizes=\"(max-width: 132px) 100vw, 132px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Results details. Click to enlarge<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f5ce69 elementor-widget elementor-widget-text-editor\" data-id=\"2f5ce69\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>What you can see as general details:<\/p><p>Asset name, <span class=\"XWEnF\">Subscription, <\/span><span class=\"XWEnF\">Resource group, <\/span><span class=\"XWEnF\">Cloud provider, <\/span><span class=\"XWEnF\">Tags.<\/span><\/p><p>Vulnerability Insights from the asset:<\/p><p><span class=\"XWEnF\">CVE-ID, <\/span><span class=\"XWEnF\">Description summary, Severity, CVSS vectors, CVSS score.<\/span><\/p><p>And if you press the <strong>Open vulnerability page<\/strong> link the Azure opens the normal details page which can see from e.g. recommendations:<\/p><div class=\"_3n0IW\"><div class=\"f1+ld\">\u00a0<\/div><div class=\"f1+ld\"><div class=\"-h0qC\"><div>\u00a0<\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-166a7e8 elementor-widget elementor-widget-image\" data-id=\"166a7e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results_details_vulnpage.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"mdc_cloud_security_explorer_results_details_vulnpage\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MjAwMSwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDJcL21kY19jbG91ZF9zZWN1cml0eV9leHBsb3Jlcl9yZXN1bHRzX2RldGFpbHNfdnVsbnBhZ2UucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"446\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results_details_vulnpage.png?fit=640%2C446&amp;ssl=1\" class=\"attachment-large size-large wp-image-2001\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results_details_vulnpage.png?w=2502&amp;ssl=1 2502w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results_details_vulnpage.png?resize=300%2C209&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results_details_vulnpage.png?resize=1024%2C713&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results_details_vulnpage.png?resize=768%2C535&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results_details_vulnpage.png?resize=1536%2C1070&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results_details_vulnpage.png?resize=2048%2C1427&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results_details_vulnpage.png?resize=850%2C592&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results_details_vulnpage.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_cloud_security_explorer_results_details_vulnpage.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Click to enlarge<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec2c654 elementor-widget elementor-widget-text-editor\" data-id=\"ec2c654\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Here was the Cloud Security Explorer features explained. The next one is Workbooks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a984321 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a984321\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1f9e19a0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1f9e19a0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-137839fb\" data-id=\"137839fb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57767b0a elementor-widget elementor-widget-heading\" data-id=\"57767b0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The parts of the MDC blog series<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3af5ae4d elementor-widget elementor-widget-text-editor\" data-id=\"3af5ae4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e84b670 elementor-widget elementor-widget-heading\" data-id=\"e84b670\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\u00a0<\/div><div class=\"elementor-element elementor-element-e246c31 elementor-widget elementor-widget-text-editor\" data-id=\"e246c31\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><ul><li><span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.jussimetso.com\/index.php\/2024\/01\/20\/microsoft-defender-for-cloud-the-blog-series-part-0-introduction\/\" target=\"_blank\" rel=\"noopener\">Part 0: Microsoft Defender for Cloud \u2013 The EPIC blog series \u2013 introduction<\/a><\/span><\/li><li><span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.jussimetso.com\/index.php\/2024\/01\/25\/microsoft-defender-for-cloud-the-blog-series-part-1-getting-started\/\" target=\"_blank\" rel=\"noopener\">Part 1: Getting started aka Setup<\/a><\/span>\u00a0<strong><br \/><\/strong><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2024\/06\/22\/defender-for-cloud-part-2-the-asset-inventory\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 2: The Asset Inventory\u00a0<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2024\/06\/22\/defender-for-cloud-part-3-security-posture\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 3: Security posture<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2024\/08\/24\/defender-for-cloud-part-4-security-recommendations\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 4: Security recommendations<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2024\/08\/31\/defender-for-cloud-part-5-security-alerts\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 5: Security alerts<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/02\/12\/defender-for-cloud-part-6-attack-path-analysis\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 6: Attack path analysis<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/02\/22\/defender-for-cloud-part-7-cloud-security-explorer\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 7: Cloud security explorer<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/03\/07\/defender-for-cloud-part-8-workbooks\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 8: Workbooks<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/03\/13\/defender-for-cloud-part-regulatory-compliance\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 9: Regulatory compliance<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/04\/24\/defender-for-cloud-part-10-cloud-workload-protection-cwp\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 10: Workload protections<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/05\/10\/defender-for-cloud-part-10-5-cwp-advanced-protection\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">part 10.5: Advanced Workload protection<\/span><\/a><\/li><li><a href=\"https:\/\/www.jussimetso.com\/index.php\/2025\/05\/27\/defender-for-cloud-part-11-data-and-ai-security\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Part 11: Data and AI security &#8211; The end of the series<\/span><\/a><\/li><\/ul><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2dc557b4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2dc557b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-63300fde elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"63300fde\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6953cb4\" data-id=\"6953cb4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-72d1e0c elementor-widget elementor-widget-author-box\" data-id=\"72d1e0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-author-box\">\n\t\t\t\t\t\t\t<div  class=\"elementor-author-box__avatar\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2024\/07\/jussi_06_2024.jpg?fit=262%2C300&#038;ssl=1\" alt=\"Picture of Jussi Metso\" loading=\"lazy\">\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t<h6 class=\"elementor-author-box__name\">\n\t\t\t\t\t\t\tJussi Metso\t\t\t\t\t\t<\/h6>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-author-box__bio\">\n\t\t\t\t\t\t<p>Author is a a lifelong IT enthusiast, Microsoft Security MVP and interested in Cloud Security, XDR, SIEM and AI. Motto: Learning is the key for your future. <\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Cloud Security Explorer allows you to run graph-based queries and proactively identify security risks in your cloud environment. You can query effective exposure to internet, permisisons, vulnerabilities, potential lateral movement and much more. Your security team can create and run different queries for different scenarios<\/p>\n","protected":false},"author":1,"featured_media":1923,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9],"tags":[36,40],"class_list":["post-1922","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-defender-for-cloud","tag-cloudsecurity","tag-mdcseries"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/02\/mdc_series_7.png?fit=800%2C400&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pes24X-v0","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/1922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/comments?post=1922"}],"version-history":[{"count":27,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/1922\/revisions"}],"predecessor-version":[{"id":2464,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/1922\/revisions\/2464"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/media\/1923"}],"wp:attachment":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/media?parent=1922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/categories?post=1922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/tags?post=1922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}