In this course, we will look at how enabling endpoint protection can help secure virtual machines in Azure. After that, we will look at privileged access workstations and ways you can enable and secure remote access management of VMs. Additionally, you'll learn about configuring update management, deploying disk encryption, and how Windows Defender can help secure VMs. We will round things out by taking a look at Defender for Cloud recommendations and how they help secure resources, including virtual machines.
Learning Objectives
- A basic understanding of the options that are available for configuring VM security in Microsoft Azure
Intended Audience
- Those who wish to learn about the ways you can configure VM security in Microsoft Azure
Prerequisites
- Basic understanding of Azure VMs
- Familiarity with the Azure portal
Hello, and welcome to Solutions for Configuring Azure VM Security. My name is Thomas Mitchell and I’ll be taking you through this course.
I’m an Azure instructor at Cloud Academy and I have over 25 years of IT experience, several of those with cloud technologies. If you have any questions about this course, feel free to connect with me on LinkedIn, or send an email to support@cloudacademy.com.
This course is intended for those who wish to learn about the ways you can configure VM security in Microsoft Azure.
We'll start things off by looking at how enabling endpoint protection can help secure virtual machines that you deploy in Azure. After that, we'll take a look at privileged access workstations and at ways you can enable and secure remote access management of VMs.
As we move through the course, you'll learn about configuring update management, deploying disk encryption, and how Windows Defender can help secure VMs. We'll round things out by taking a look at Defender for Cloud Recommendations and how they help secure resources, including virtual machines.
After finishing this course, you'll come away with a basic understanding of the options that are available for configuring VM security in Microsoft Azure. We’d love to get your feedback on this course, so please give it a rating when you’re finished.
If you’re ready to learn about the different solutions that are available for Configuring Azure VM Security, let’s get started!
Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.
In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.
In his spare time, Tom enjoys camping, fishing, and playing poker.