{"id":"bbec10c3-566d-4e7c-91ef-01af8e206168","shortId":"ctdGkB","kind":"skill","title":"azure-defender-for-cloud","tagline":"Expert knowledge for Azure Defender For Cloud development including troubleshooting, best practices, decision making, architecture & design patterns, limits & quotas, security, configuration, integrations & coding patterns, and deployment. Use when securing Azure VMs, AKS/contain","description":"# Azure Defender For Cloud Skill\n\nThis skill provides expert guidance for Azure Defender For Cloud. Covers troubleshooting, best practices, decision making, architecture & design patterns, limits & quotas, security, configuration, integrations & coding patterns, and deployment. It combines local quick-reference content with remote documentation fetching capabilities.\n\n## How to Use This Skill\n\n> **IMPORTANT for Agent**: Use the **Category Index** below to locate relevant sections. For categories with line ranges (e.g., `L35-L120`), use `read_file` with the specified lines. For categories with file links (e.g., `[security.md](security.md)`), use `read_file` on the linked reference file\n\n> **IMPORTANT for Agent**: If `metadata.generated_at` is more than 3 months old, suggest the user pull the latest version from the repository. If `mcp_microsoftdocs` tools are not available, suggest the user install it: [Installation Guide](https://github.com/MicrosoftDocs/mcp/blob/main/README.md)\n\nThis skill requires **network access** to fetch documentation content:\n- **Preferred**: Use `mcp_microsoftdocs:microsoft_docs_fetch` with query string `from=learn-agent-skill`. Returns Markdown.\n- **Fallback**: Use `fetch_webpage` with query string `from=learn-agent-skill&accept=text/markdown`. Returns Markdown.\n\n## Category Index\n\n| Category | Lines | Description |\n|----------|-------|-------------|\n| Troubleshooting | L37-L65 | Diagnosing and fixing Defender for Cloud issues: alert validation/interpretation, connector/onboarding problems (AWS/GCP/APIs/SQL/K8s), deployment gaps, malware/vuln handling, and incident references. |\n| Best Practices | L66-L85 | Best practices for investigating and remediating vulnerabilities, misconfigurations, secrets, and API/endpoint/Kubernetes risks across Defender for Cloud, AKS, registries, and CI/CD. |\n| Decision Making | L86-L104 | Guidance for choosing and planning Defender for Cloud plans, pricing, portals, agents, regional availability, and migration/transition paths for servers, containers, storage, and GCP. |\n| Architecture & Design Patterns | L105-L114 | Architectural guidance for Defender for Servers/Containers: agentless scanning, malware/vuln detection on VMs/Kubernetes, data collection, residency, workspaces, and large-scale deployment. |\n| Limits & Quotas | L115-L124 | Limits, quotas, and prerequisites for Defender for Cloud features: free trials, data ingestion, APIs, DevOps, portal preview, alert export limits, and data collection extension changes. |\n| Security | L125-L199 | Security alerts, permissions, and hardening for Defender for Cloud: configuring protections, interpreting alerts/recommendations, RBAC/CIEM, data handling, and securing SQL, storage, containers, VMs, APIs, and Kubernetes. |\n| Configuration | L200-L267 | Configuring Defender for Cloud features: onboarding, policies, exemptions, scanning (agentless, containers, SQL, storage, DevOps), alerts, exports, private links, and data security posture. |\n| Integrations & Coding Patterns | L268-L297 | Integrating Defender for Cloud with CI/CD, SIEM, EDR, ITSM, APIs, and multi-cloud logs, plus querying/exporting security data and automating tickets and container/AKS scans |\n| Deployment | L298-L325 | Deploying and managing Defender for Cloud plans and agents (Containers, SQL, Storage) across AKS/EKS/GKE and servers using portal, CLI, IaC, policies, APIs, and reviewing support/regions. |\n\n### Troubleshooting\n| Topic | URL |\n|-------|-----|\n| Validate Defender for Cloud alert generation and coverage | https://learn.microsoft.com/en-us/azure/defender-for-cloud/alert-validation |\n| Interpret and respond to Defender for Cloud AI alerts | https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-ai-workloads |\n| Trigger and validate Defender for APIs alerts | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-apis-validation |\n| Verify Defender for Containers deployment on EKS | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-aws-verify |\n| Verify Defender for Containers deployment on AKS | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-azure-verify |\n| Verify Defender for Containers deployment on GKE | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-gcp-verify |\n| Respond to Microsoft Defender for DNS security alerts | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-dns-alerts |\n| Investigate and respond to Defender for Resource Manager alerts | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-resource-manager-usage |\n| Reference deprecated Defender for Cloud alert IDs | https://learn.microsoft.com/en-us/azure/defender-for-cloud/deprecated-alerts |\n| Remediate Defender for Cloud endpoint detection gaps | https://learn.microsoft.com/en-us/azure/defender-for-cloud/endpoint-detection-response-solution-recommendations |\n| Resolve common issues in Endor Labs integration | https://learn.microsoft.com/en-us/azure/defender-for-cloud/faq-endor-labs |\n| Use Defender for Cloud incident reference catalog | https://learn.microsoft.com/en-us/azure/defender-for-cloud/incidents-reference |\n| Handle malware alerts on Kubernetes nodes in Defender | https://learn.microsoft.com/en-us/azure/defender-for-cloud/kubernetes-nodes-malware |\n| Investigate and fix Defender Kubernetes node vulnerabilities | https://learn.microsoft.com/en-us/azure/defender-for-cloud/kubernetes-nodes-va |\n| Resolve agentless disk scan errors for GCP in Defender | https://learn.microsoft.com/en-us/azure/defender-for-cloud/resolve-disk-scanning-error |\n| Fix GCP Domain Restricted Sharing issues for Defender connector | https://learn.microsoft.com/en-us/azure/defender-for-cloud/resolve-gcp-sharing-policy |\n| Resolve GCP VPC Service Controls issues for Defender scanning | https://learn.microsoft.com/en-us/azure/defender-for-cloud/resolve-vpc-service-controls-issues |\n| Resolve Sentinel-connected AWS onboarding issues in Defender | https://learn.microsoft.com/en-us/azure/defender-for-cloud/sentinel-connected-aws |\n| Troubleshoot AWS and GCP connectors in Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/troubleshoot-connectors |\n| Troubleshoot Defender for SQL on Machines configuration | https://learn.microsoft.com/en-us/azure/defender-for-cloud/troubleshoot-sql-machines-guide |\n| Troubleshoot Defender for SQL on Machines deployment (gov) | https://learn.microsoft.com/en-us/azure/defender-for-cloud/troubleshoot-sql-machines-guide-gov |\n| Troubleshoot express and classic SQL vulnerability configurations | https://learn.microsoft.com/en-us/azure/defender-for-cloud/troubleshoot-vulnerability-findings |\n| Troubleshoot common Microsoft Defender for Cloud issues | https://learn.microsoft.com/en-us/azure/defender-for-cloud/troubleshooting-guide |\n| Troubleshoot gated deployment issues in Kubernetes | https://learn.microsoft.com/en-us/azure/defender-for-cloud/troubleshooting-runtime-gated |\n| Interpret and act on Defender for Storage malware scan results | https://learn.microsoft.com/en-us/azure/defender-for-cloud/understand-malware-scan-results |\n\n### Best Practices\n| Topic | URL |\n|-------|-----|\n| Apply agentless vulnerability assessment for containers | https://learn.microsoft.com/en-us/azure/defender-for-cloud/agentless-vulnerability-assessment-azure |\n| Review OS misconfiguration recommendations against MCSB baselines | https://learn.microsoft.com/en-us/azure/defender-for-cloud/apply-security-baseline |\n| Review CI/CD scan results in Cloud Security Explorer | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-cli-reviewing-results |\n| Investigate API security findings and posture in Defender for APIs | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-apis-posture |\n| Remediate system update and patch recommendations in Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/enable-periodic-system-updates |\n| Investigate Defender for Endpoint misconfiguration recommendations | https://learn.microsoft.com/en-us/azure/defender-for-cloud/endpoint-detection-misconfiguration |\n| Remediate endpoint detection and response gaps in Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/endpoint-detection-response-solution-recommendations |\n| Apply Defender networking recommendations for Azure | https://learn.microsoft.com/en-us/azure/defender-for-cloud/protect-network-resources |\n| Remediate cloud deployment secrets in Defender | https://learn.microsoft.com/en-us/azure/defender-for-cloud/remediate-cloud-deployment-secrets |\n| Remediate machine secrets findings in Defender | https://learn.microsoft.com/en-us/azure/defender-for-cloud/remediate-server-secrets |\n| Remediate machine vulnerability findings in Defender for Servers | https://learn.microsoft.com/en-us/azure/defender-for-cloud/remediate-vulnerability-findings-vm |\n| Review security annotations on pull requests in GitHub and Azure DevOps | https://learn.microsoft.com/en-us/azure/defender-for-cloud/review-pull-request-annotations |\n| Prioritize and fix vulnerabilities in AKS containers | https://learn.microsoft.com/en-us/azure/defender-for-cloud/view-and-remediate-vulnerabilities-containers |\n| Assess Kubernetes image vulnerabilities using Secure Score | https://learn.microsoft.com/en-us/azure/defender-for-cloud/view-and-remediate-vulnerabilities-for-images-secure-score |\n| Remediate registry image vulnerabilities using Secure Score | https://learn.microsoft.com/en-us/azure/defender-for-cloud/view-and-remediate-vulnerability-assessment-findings-secure-score |\n| Remediate registry image vulnerabilities in Defender | https://learn.microsoft.com/en-us/azure/defender-for-cloud/view-and-remediate-vulnerability-registry-images |\n\n### Decision Making\n| Topic | URL |\n|-------|-----|\n| Understand Defender for Servers vulnerability scanning options | https://learn.microsoft.com/en-us/azure/defender-for-cloud/auto-deploy-vulnerability-assessment |\n| Choose between Azure and Defender portals for Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/azure-portal-vs-defender-portal-comparison |\n| Allocate Defender for Cloud costs via chargeback | https://learn.microsoft.com/en-us/azure/defender-for-cloud/chargeback |\n| Select and configure Defender for Cloud plans for GCP | https://learn.microsoft.com/en-us/azure/defender-for-cloud/configure-google-plans |\n| Estimate Defender for Cloud costs with calculator | https://learn.microsoft.com/en-us/azure/defender-for-cloud/cost-calculator |\n| Choose Defender for Containers deployment options | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-deployment-overview |\n| Decide between Defender for Storage classic and new plan | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-classic |\n| Migrate from Defender for Storage classic to new plan | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-classic-migrate |\n| Use BYOL vulnerability assessment with Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/deploy-vulnerability-assessment-byol-vm |\n| Choose the right Defender for Servers plan | https://learn.microsoft.com/en-us/azure/defender-for-cloud/plan-defender-for-servers-select-plan |\n| Plan for Defender for Cloud Log Analytics agent retirement | https://learn.microsoft.com/en-us/azure/defender-for-cloud/prepare-deprecation-log-analytics-mma-agent |\n| Plan for Defender for Cloud Log Analytics agent retirement | https://learn.microsoft.com/en-us/azure/defender-for-cloud/prepare-deprecation-log-analytics-mma-agent |\n| Optimize Defender for Cloud spend with pre-purchase DCUs | https://learn.microsoft.com/en-us/azure/defender-for-cloud/prepurchase-plan |\n| Check Defender for Cloud regional and plan availability | https://learn.microsoft.com/en-us/azure/defender-for-cloud/regional-availability |\n| Plan transition from grouped to individual Defender recommendations | https://learn.microsoft.com/en-us/azure/defender-for-cloud/transition-grouped-individual-recommendations |\n\n### Architecture & Design Patterns\n| Topic | URL |\n|-------|-----|\n| Use agentless malware scanning for virtual machines | https://learn.microsoft.com/en-us/azure/defender-for-cloud/agentless-malware-scanning |\n| Understand Defender for Containers security architecture | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-architecture |\n| Design a Defender for Servers deployment architecture | https://learn.microsoft.com/en-us/azure/defender-for-cloud/plan-defender-for-servers |\n| Understand Defender for Servers data collection design | https://learn.microsoft.com/en-us/azure/defender-for-cloud/plan-defender-for-servers-agents |\n| Plan Defender for Servers data residency and workspaces | https://learn.microsoft.com/en-us/azure/defender-for-cloud/plan-defender-for-servers-data-workspace |\n| Scale Microsoft Defender for Servers across environments | https://learn.microsoft.com/en-us/azure/defender-for-cloud/plan-defender-for-servers-scale |\n\n### Limits & Quotas\n| Topic | URL |\n|-------|-----|\n| Use Defender for Servers data ingestion benefit and free quota | https://learn.microsoft.com/en-us/azure/defender-for-cloud/data-ingestion-benefit |\n| Understand current limitations of Defender portal preview | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-portal/known-limitations |\n| Review support scope and prerequisites for DevOps security | https://learn.microsoft.com/en-us/azure/defender-for-cloud/devops-support |\n| Export Defender for Cloud alerts to CSV with limits | https://learn.microsoft.com/en-us/azure/defender-for-cloud/export-alerts-to-csv |\n| Check and understand Defender for Cloud free trial limits | https://learn.microsoft.com/en-us/azure/defender-for-cloud/free-trial |\n| Understand Defender data collection extensions and retirement | https://learn.microsoft.com/en-us/azure/defender-for-cloud/monitoring-components |\n\n### Security\n| Topic | URL |\n|-------|-----|\n| Configure and use Defender for Cloud AI model security | https://learn.microsoft.com/en-us/azure/defender-for-cloud/ai-model-security |\n| Understand Defender for Cloud alerts for Azure App Service | https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-azure-app-service |\n| Understand Defender for Cloud alerts for Azure Cosmos DB | https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-azure-cosmos-db |\n| Understand Defender for Cloud alerts for Azure DDoS Protection | https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-azure-ddos-protection |\n| Understand Defender for Cloud alerts for Azure Key Vault | https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-azure-key-vault |\n| Understand Defender for Cloud alerts for Azure network layer | https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-azure-network-layer |\n| Understand Defender for Cloud alerts for Azure Storage | https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-azure-storage |\n| Understand Defender for Cloud alerts for Azure VM extensions | https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-azure-vm-extensions |\n| Understand Defender for Containers and Kubernetes alerts | https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-containers |\n| Understand Defender for Cloud alerts for Defender for APIs | https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-defender-for-apis |\n| Understand Defender for Cloud alerts for DNS | https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-dns |\n| Understand Defender for Cloud alerts for Linux VMs | https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-linux-machines |\n| Understand Defender for Cloud alerts for open-source databases | https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-open-source-relational-databases |\n| Navigate Defender for Cloud security alert references | https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-reference |\n| Understand Defender for Cloud alerts for Resource Manager | https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-resource-manager |\n| Understand Defender for Cloud alerts for SQL and Synapse | https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-sql-database-and-azure-synapse-analytics |\n| Understand Defender for Cloud alerts for Windows VMs | https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-windows-machines |\n| Configure container runtime anti-malware policies | https://learn.microsoft.com/en-us/azure/defender-for-cloud/anti-malware |\n| Assign granular access to AWS and GCP connectors | https://learn.microsoft.com/en-us/azure/defender-for-cloud/assign-access-to-workload |\n| Understand GCP connector authentication architecture in Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/authentication-architecture-google-cloud |\n| Configure binary drift detection and blocking for containers | https://learn.microsoft.com/en-us/azure/defender-for-cloud/binary-drift-detection |\n| Manage cloud scopes and unified RBAC in Defender | https://learn.microsoft.com/en-us/azure/defender-for-cloud/cloud-scopes-unified-rbac |\n| Understand AWS connector authentication architecture in Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-authentication-architecture-aws |\n| Use classic configuration to manage SQL vulnerability findings | https://learn.microsoft.com/en-us/azure/defender-for-cloud/configure-vulnerability-findings-classic |\n| Use express configuration to manage SQL vulnerability findings | https://learn.microsoft.com/en-us/azure/defender-for-cloud/configure-vulnerability-findings-express |\n| Permissions required for Defender for Containers on EKS and GKE | https://learn.microsoft.com/en-us/azure/defender-for-cloud/containers-permissions |\n| Monitor APIs for sensitive data exposure | https://learn.microsoft.com/en-us/azure/defender-for-cloud/data-classification |\n| Understand Defender for Cloud data handling and security | https://learn.microsoft.com/en-us/azure/defender-for-cloud/data-security |\n| Configure secure authentication for Defender for Cloud CLI | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-cli-authentication |\n| Enable Microsoft Defender for Azure Cosmos DB | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-databases-enable-cosmos-protections |\n| Explore and investigate Defender for SQL security alerts | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-sql-alerts |\n| Use Defender VA scanner for SQL servers on machines | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-sql-on-machines-vulnerability-assessment |\n| Interpret Defender for Storage threats and alerts | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-threats-alerts |\n| Configure disable rules for container vulnerability findings | https://learn.microsoft.com/en-us/azure/defender-for-cloud/disable-vulnerability-findings-containers-secure-score |\n| Enable Defender for open-source databases on AWS | https://learn.microsoft.com/en-us/azure/defender-for-cloud/enable-defender-for-databases-aws |\n| Enable Defender for open-source databases on Azure | https://learn.microsoft.com/en-us/azure/defender-for-cloud/enable-defender-for-databases-azure |\n| Enable CIEM in Microsoft Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/enable-permissions-management |\n| Enable and configure gated deployment for Kubernetes clusters | https://learn.microsoft.com/en-us/azure/defender-for-cloud/enablement-guide-runtime-gated |\n| Understand and assign Defender for Cloud permissions | https://learn.microsoft.com/en-us/azure/defender-for-cloud/faq-permissions |\n| Configure governance rules to enforce Defender remediation | https://learn.microsoft.com/en-us/azure/defender-for-cloud/governance-rules |\n| Use Purview data sensitivity in Defender alerts | https://learn.microsoft.com/en-us/azure/defender-for-cloud/information-protection |\n| Apply Defender for Cloud Kubernetes data plane hardening | https://learn.microsoft.com/en-us/azure/defender-for-cloud/kubernetes-workload-protections |\n| Configure on-upload malware scanning for Azure Storage | https://learn.microsoft.com/en-us/azure/defender-for-cloud/on-upload-malware-scanning |\n| Assign Defender for Cloud roles and permissions with Azure RBAC | https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions |\n| Configure CIEM capabilities in Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management |\n| Configure roles and permissions for Defender for Servers | https://learn.microsoft.com/en-us/azure/defender-for-cloud/plan-defender-for-servers-roles |\n| Manage Defender for Cloud user and personal data | https://learn.microsoft.com/en-us/azure/defender-for-cloud/privacy |\n| Use Defender for Cloud AI security recommendations | https://learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-ai |\n| Apply Defender for Cloud API security recommendations | https://learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-api |\n| Use Defender for Cloud security recommendations for Azure App Service | https://learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-app-services |\n| Apply Defender for Cloud compute security recommendations | https://learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-compute |\n| Apply Defender for Cloud container security recommendations | https://learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-container |\n| Use Defender for Cloud data security recommendations | https://learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-data |\n| Review deprecated Defender for Cloud security recommendations | https://learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-deprecated |\n| Apply Defender for Cloud DevOps security recommendations | https://learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-devops |\n| Implement identity and access recommendations in Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-identity-access |\n| Use Defender for Cloud IoT security recommendations | https://learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-iot |\n| Use Defender for Cloud Key Vault security recommendations | https://learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-keyvault |\n| Apply Defender for Cloud networking security recommendations | https://learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-networking |\n| Use Defender for Cloud serverless protection recommendations | https://learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-serverless-protection |\n| Interpret and act on Defender for Cloud recommendations | https://learn.microsoft.com/en-us/azure/defender-for-cloud/review-security-recommendations |\n| Secure Kubernetes deployments with gated container images | https://learn.microsoft.com/en-us/azure/defender-for-cloud/runtime-gated-overview |\n| Sign and verify container vulnerability findings artifacts | https://learn.microsoft.com/en-us/azure/defender-for-cloud/secure-container-image |\n| Configure security policies in Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/security-policy-concept |\n| Simulate Defender for SQL alerts on machines | https://learn.microsoft.com/en-us/azure/defender-for-cloud/simulate-alerts-sql-machines |\n| Review and remediate SQL vulnerability assessment findings | https://learn.microsoft.com/en-us/azure/defender-for-cloud/sql-azure-vulnerability-assessment-find |\n| Configure and interpret Azure SQL vulnerability assessments | https://learn.microsoft.com/en-us/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview |\n| Reference for SQL vulnerability assessment rules | https://learn.microsoft.com/en-us/azure/defender-for-cloud/sql-azure-vulnerability-assessment-rules |\n| Changelog for SQL vulnerability assessment rules | https://learn.microsoft.com/en-us/azure/defender-for-cloud/sql-azure-vulnerability-assessment-rules-changelog |\n| Prerequisites and permissions for Defender for Storage | https://learn.microsoft.com/en-us/azure/defender-for-cloud/support-matrix-defender-for-storage |\n| Manage tenant-wide permissions in Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/tenant-wide-permissions-management |\n\n### Configuration\n| Topic | URL |\n|-------|-----|\n| Configure advanced malware scanning for Defender for Storage | https://learn.microsoft.com/en-us/azure/defender-for-cloud/advanced-configurations-for-malware-scanning |\n| Configure agentless code scanning in Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/agentless-code-scanning |\n| Configure Docker Hub vulnerability assessments with Defender | https://learn.microsoft.com/en-us/azure/defender-for-cloud/agentless-vulnerability-assessment-docker-hub |\n| Configure JFrog Artifactory vulnerability assessments with Defender | https://learn.microsoft.com/en-us/azure/defender-for-cloud/agentless-vulnerability-assessment-jfrog-artifactory |\n| Enable Defender threat protection for Azure AI services | https://learn.microsoft.com/en-us/azure/defender-for-cloud/ai-onboarding |\n| Use Defender for Cloud alert schemas for integrations | https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-schemas |\n| Configure Azure Monitor Agent for Defender | https://learn.microsoft.com/en-us/azure/defender-for-cloud/auto-deploy-azure-monitoring-agent |\n| Review prerequisites for data security posture | https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-data-security-posture-prepare |\n| Configure Microsoft Security Private Link for Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-private-links |\n| Configure Microsoft Security DevOps extension in Azure DevOps | https://learn.microsoft.com/en-us/azure/defender-for-cloud/configure-azure-devops-extension |\n| Configure Microsoft Security DevOps extension in Azure DevOps | https://learn.microsoft.com/en-us/azure/defender-for-cloud/configure-azure-devops-extension |\n| Configure Defender for Cloud alert email notifications | https://learn.microsoft.com/en-us/azure/defender-for-cloud/configure-email-notifications |\n| Set up private endpoints for Defender for Cloud via Security Private Link | https://learn.microsoft.com/en-us/azure/defender-for-cloud/configure-private-endpoints |\n| Modify Defender for Servers coverage and plan settings | https://learn.microsoft.com/en-us/azure/defender-for-cloud/configure-servers-coverage |\n| Configure continuous export of Defender for Cloud data | https://learn.microsoft.com/en-us/azure/defender-for-cloud/continuous-export |\n| Configure continuous export with Azure Policy at scale | https://learn.microsoft.com/en-us/azure/defender-for-cloud/continuous-export-azure-policy |\n| Enable continuous export to event hubs behind firewalls | https://learn.microsoft.com/en-us/azure/defender-for-cloud/continuous-export-event-hub-firewall |\n| Analyze Defender for Cloud export data in Azure Monitor | https://learn.microsoft.com/en-us/azure/defender-for-cloud/continuous-export-view-data |\n| Define custom security standards and recommendations | https://learn.microsoft.com/en-us/azure/defender-for-cloud/create-custom-recommendations |\n| Configure cross-tenant management with Azure Lighthouse | https://learn.microsoft.com/en-us/azure/defender-for-cloud/cross-tenant-management |\n| Configure custom Data Collection Rules for Defender for Servers | https://learn.microsoft.com/en-us/azure/defender-for-cloud/data-collection-rule |\n| Enable data security posture for Azure datastores | https://learn.microsoft.com/en-us/azure/defender-for-cloud/data-security-posture-enable |\n| Customize Defender data sensitivity settings | https://learn.microsoft.com/en-us/azure/defender-for-cloud/data-sensitivity-settings |\n| Use Defender for Cloud CLI for security scanning | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-cli-overview |\n| Manage onboarding and offboarding for Defender for APIs | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-apis-manage |\n| Check prerequisites to deploy Defender for APIs | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-apis-prepare |\n| Programmatically enable Defender for Containers on Arc | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-arc-enable-programmatically |\n| Configure Defender for Containers settings on EKS | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-aws-configure |\n| Configure Defender for Containers settings on AKS | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-azure-configure |\n| Onboard Docker Hub registries to Defender for Containers | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-enable-external-registry-for-docker-hub |\n| Configure Defender for Containers settings on GKE | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-gcp-configure |\n| Enable and configure Defender for Storage classic via templates | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-classic-enable |\n| Set up automated malware remediation in Defender for Storage | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-configure-malware-scan |\n| Enable vulnerability scanning with Defender Vulnerability Management | https://learn.microsoft.com/en-us/azure/defender-for-cloud/deploy-vulnerability-assessment-defender-vulnerability-management |\n| Disable specific VM vulnerability findings in Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/disable-vulnerability-findings |\n| Configure exemptions and disable container VA findings | https://learn.microsoft.com/en-us/azure/defender-for-cloud/disable-vulnerability-findings-containers |\n| Configure agentless scanning for virtual machines | https://learn.microsoft.com/en-us/azure/defender-for-cloud/enable-agentless-scanning-vms |\n| Enable and configure sensitive data threat detection for Storage | https://learn.microsoft.com/en-us/azure/defender-for-cloud/enable-defender-for-storage-data-sensitivity |\n| Enable just-in-time access for Azure virtual machines | https://learn.microsoft.com/en-us/azure/defender-for-cloud/enable-just-in-time-access |\n| Enable DevOps pull request security annotations | https://learn.microsoft.com/en-us/azure/defender-for-cloud/enable-pull-request-annotations |\n| Configure Defender Vulnerability Management for containers | https://learn.microsoft.com/en-us/azure/defender-for-cloud/enable-vulnerability-assessment |\n| Exclude machines from agentless scanning in Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/exclude-machines-agentless-scanning |\n| Configure resource exemptions for recommendations | https://learn.microsoft.com/en-us/azure/defender-for-cloud/exempt-resource |\n| Create large-scale policy exemptions in Defender | https://learn.microsoft.com/en-us/azure/defender-for-cloud/exempt-resources-at-scale |\n| SQL VA express configuration Azure CLI commands reference | https://learn.microsoft.com/en-us/azure/defender-for-cloud/express-configuration-azure-commands |\n| SQL VA express configuration PowerShell commands reference | https://learn.microsoft.com/en-us/azure/defender-for-cloud/express-configuration-powershell-commands |\n| SQL VA express configuration PowerShell wrapper module reference | https://learn.microsoft.com/en-us/azure/defender-for-cloud/express-configuration-sql-commands |\n| Configure File Integrity Monitoring with Defender for Endpoint | https://learn.microsoft.com/en-us/azure/defender-for-cloud/file-integrity-monitoring-enable-defender-endpoint |\n| Configure end-user and app context for AI security alerts | https://learn.microsoft.com/en-us/azure/defender-for-cloud/gain-end-user-context-ai |\n| Configure Microsoft Security DevOps GitHub Action | https://learn.microsoft.com/en-us/azure/defender-for-cloud/github-action |\n| Configure IaC misconfiguration scanning with Microsoft Security DevOps | https://learn.microsoft.com/en-us/azure/defender-for-cloud/iac-vulnerabilities |\n| Configure and manage MCSB security standard | https://learn.microsoft.com/en-us/azure/defender-for-cloud/manage-mcsb |\n| Enable Defender for Cloud on management groups via policy | https://learn.microsoft.com/en-us/azure/defender-for-cloud/onboard-management-group |\n| Use built-in Azure Policy definitions for Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/policy-reference |\n| Onboard Defender for Cloud using PowerShell | https://learn.microsoft.com/en-us/azure/defender-for-cloud/powershell-onboarding |\n| PowerShell script to enable SQL VA express configuration | https://learn.microsoft.com/en-us/azure/defender-for-cloud/powershell-sample-vulnerability-assessment-azure-sql |\n| PowerShell script to set SQL VA baselines | https://learn.microsoft.com/en-us/azure/defender-for-cloud/powershell-sample-vulnerability-assessment-baselines |\n| Query SBOM data in Defender for Cloud using Cloud Security Explorer | https://learn.microsoft.com/en-us/azure/defender-for-cloud/query-software-bill-of-materials |\n| Set up Azure Policy guest configuration for Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/security-baseline-guest-configuration |\n| Reference sensitive information types in Defender | https://learn.microsoft.com/en-us/azure/defender-for-cloud/sensitive-info-types |\n| Enable SQL vulnerability assessment (Express) for Azure SQL and Synapse | https://learn.microsoft.com/en-us/azure/defender-for-cloud/sql-azure-vulnerability-assessment-enable |\n| Enable SQL vulnerability assessment (Classic) with storage account | https://learn.microsoft.com/en-us/azure/defender-for-cloud/sql-azure-vulnerability-assessment-enable-classic |\n| Test agentless malware scanning alerts for VMs | https://learn.microsoft.com/en-us/azure/defender-for-cloud/test-agentless-malware-scanning |\n| Update configuration for Defender for SQL Servers on Machines | https://learn.microsoft.com/en-us/azure/defender-for-cloud/update-sql-machine-configuration |\n\n### Integrations & Coding Patterns\n| Topic | URL |\n|-------|-----|\n| Connect Defender for Cloud data to Power BI | https://learn.microsoft.com/en-us/azure/defender-for-cloud/add-data-power-bi |\n| Query Defender attack path data via ARG API | https://learn.microsoft.com/en-us/azure/defender-for-cloud/attack-path-api |\n| Integrate Defender for Cloud CLI into CI/CD pipelines | https://learn.microsoft.com/en-us/azure/defender-for-cloud/ci-cd-pipeline-scanning-with-defender-cli |\n| Author Cloud Security Explorer queries for AKS vulnerabilities | https://learn.microsoft.com/en-us/azure/defender-for-cloud/cloud-security-explorer-kubernetes-clusters |\n| Connect Endor Labs with Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/connect-endor-labs |\n| Connect Mend.io with Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/connect-mend-io |\n| Connect ServiceNow ITSM with Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/connect-servicenow |\n| Set up Defender for Cloud continuous export via REST API | https://learn.microsoft.com/en-us/azure/defender-for-cloud/continuous-export-rest-api |\n| Automate ServiceNow tickets with governance rules | https://learn.microsoft.com/en-us/azure/defender-for-cloud/create-governance-rule-servicenow |\n| Create and sync ServiceNow tickets from Defender | https://learn.microsoft.com/en-us/azure/defender-for-cloud/create-ticket-servicenow |\n| Use Defender for Cloud CLI to scan container images | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-cli-syntax |\n| Programmatically deploy Defender for Containers on AKS | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-azure-enable-programmatically |\n| Consume and export Defender for SQL scan results via ARG | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-sql-scan-results |\n| Use partner API security testing with Defender | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-partner-applications |\n| Enable Defender for Endpoint integration in Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/enable-defender-for-endpoint |\n| Stream Defender for Cloud alerts to SIEM tools | https://learn.microsoft.com/en-us/azure/defender-for-cloud/export-to-siem |\n| Configure Azure resources to export alerts to QRadar and Splunk | https://learn.microsoft.com/en-us/azure/defender-for-cloud/export-to-splunk-or-qradar |\n| Integrate AWS CloudTrail logs with Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/integrate-cloud-trail |\n| Integrate Defender for Endpoint with Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/integration-defender-for-endpoint |\n| Ingest GCP Cloud Logging into Defender for Cloud via Pub/Sub | https://learn.microsoft.com/en-us/azure/defender-for-cloud/logging-ingestion |\n| Onboard 42Crunch API security with Defender | https://learn.microsoft.com/en-us/azure/defender-for-cloud/onboarding-guide-42crunch |\n| Connect Bright Security DAST with Defender | https://learn.microsoft.com/en-us/azure/defender-for-cloud/onboarding-guide-bright |\n| Integrate StackHawk testing with Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/onboarding-guide-stackhawk |\n| Use legacy security solution integrations with Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/partner-integration |\n| Run Azure Resource Graph queries for Defender for Cloud | https://learn.microsoft.com/en-us/azure/defender-for-cloud/resource-graph-samples |\n| Use Defender VM subassessments for container vulnerabilities | https://learn.microsoft.com/en-us/azure/defender-for-cloud/subassessment-rest-api |\n\n### Deployment\n| Topic | URL |\n|-------|-----|\n| Integrate Defender for Cloud CLI into CI/CD pipelines | https://learn.microsoft.com/en-us/azure/defender-for-cloud/ci-cd-pipeline-scanning-with-defender-cli |\n| Enable Defender for Containers on EKS via portal | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-aws-enable-portal |\n| Programmatically deploy Defender for Containers on EKS | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-aws-enable-programmatically |\n| Remove Defender for Containers from EKS clusters | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-aws-remove |\n| Remove Defender for Containers from AKS clusters | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-azure-remove |\n| Enable Defender for Containers on GKE via portal | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-gcp-enable-portal |\n| Programmatically deploy Defender for Containers on GKE | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-gcp-enable-programmatically |\n| Remove Defender for Containers from GKE clusters | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-gcp-remove |\n| Migrate Defender for SQL to AMA autoprovisioning | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-sql-autoprovisioning |\n| Enable Defender for SQL Servers on Machines across environments | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-sql-usage |\n| Enable Defender for Storage via Azure portal | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-azure-portal-enablement |\n| Enable Defender for Storage with IaC templates | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-infrastructure-as-code-enablement |\n| Enable Defender for Storage using Azure Policy | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-policy-enablement |\n| Enable Defender for Storage with Azure PowerShell | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-powershell-enablement |\n| Enable Defender for Storage using REST API | https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-rest-api-enablement |\n| Deploy Defender for Containers sensor via Helm | https://learn.microsoft.com/en-us/azure/defender-for-cloud/deploy-helm |\n| Enable Defender for SQL on Machines at scale | https://learn.microsoft.com/en-us/azure/defender-for-cloud/enable-defender-sql-at-scale |\n| Deploy gated deployment agent via Infrastructure as Code | https://learn.microsoft.com/en-us/azure/defender-for-cloud/gated-deployment-infrastructure-as-code |\n| Identify SQL Servers still protected by Microsoft Monitoring Agent | https://learn.microsoft.com/en-us/azure/defender-for-cloud/identify-sql-servers-protected-by-monitor-agent |\n| Migrate File Integrity Monitoring to Defender for Endpoint | https://learn.microsoft.com/en-us/azure/defender-for-cloud/migrate-file-integrity-monitoring |\n| Check Defender for Cloud interoperability across Azure services and environments | https://learn.microsoft.com/en-us/azure/defender-for-cloud/support-matrix-defender-for-cloud |\n| Support matrix for Defender for Containers features | https://learn.microsoft.com/en-us/azure/defender-for-cloud/support-matrix-defender-for-containers |\n| Review support matrix and requirements for Defender for Servers | https://learn.microsoft.com/en-us/azure/defender-for-cloud/support-matrix-defender-for-servers |\n| Deploy Microsoft Defender for Storage on Azure | https://learn.microsoft.com/en-us/azure/defender-for-cloud/tutorial-enable-storage-plan |\n| Verify Defender for SQL Servers on Machines protection status | https://learn.microsoft.com/en-us/azure/defender-for-cloud/verify-machine-protection |","tags":["azure","defender","for","cloud","agent","skills","microsoftdocs","agent-skills","agentic-skills","agentskill","ai-agents","ai-coding"],"capabilities":["skill","source-microsoftdocs","skill-azure-defender-for-cloud","topic-agent","topic-agent-skills","topic-agentic-skills","topic-agentskill","topic-ai-agents","topic-ai-coding","topic-azure","topic-azure-functions","topic-azure-kubernetes-service","topic-azure-openai","topic-azure-sql-database","topic-azure-storage"],"categories":["Agent-Skills"],"synonyms":[],"warnings":[],"endpointUrl":"https://skills.sh/MicrosoftDocs/Agent-Skills/azure-defender-for-cloud","protocol":"skill","transport":"skills-sh","auth":{"type":"none","details":{"cli":"npx skills add MicrosoftDocs/Agent-Skills","source_repo":"https://github.com/MicrosoftDocs/Agent-Skills","install_from":"skills.sh"}},"qualityScore":"0.698","qualityRationale":"deterministic score 0.70 from registry signals: · indexed on github topic:agent-skills · 497 github stars · SKILL.md body (42,650 chars)","verified":false,"liveness":"unknown","lastLivenessCheck":null,"agentReviews":{"count":0,"score_avg":null,"cost_usd_avg":null,"success_rate":null,"latency_p50_ms":null,"narrative_summary":null,"summary_updated_at":null},"enrichmentModel":"deterministic:skill-github:v1","enrichmentVersion":1,"enrichedAt":"2026-04-22T06:53:31.376Z","embedding":null,"createdAt":"2026-04-18T21:58:50.702Z","updatedAt":"2026-04-22T06:53:31.376Z","lastSeenAt":"2026-04-22T06:53:31.376Z","tsv":"'/en-us/azure/defender-for-cloud/add-data-power-bi':2706 '/en-us/azure/defender-for-cloud/advanced-configurations-for-malware-scanning':2008 '/en-us/azure/defender-for-cloud/agentless-code-scanning':2019 '/en-us/azure/defender-for-cloud/agentless-malware-scanning':1098 '/en-us/azure/defender-for-cloud/agentless-vulnerability-assessment-azure':751 '/en-us/azure/defender-for-cloud/agentless-vulnerability-assessment-docker-hub':2029 '/en-us/azure/defender-for-cloud/agentless-vulnerability-assessment-jfrog-artifactory':2039 '/en-us/azure/defender-for-cloud/ai-model-security':1235 '/en-us/azure/defender-for-cloud/ai-onboarding':2050 '/en-us/azure/defender-for-cloud/alert-validation':479 '/en-us/azure/defender-for-cloud/alerts-ai-workloads':491 '/en-us/azure/defender-for-cloud/alerts-azure-app-service':1247 '/en-us/azure/defender-for-cloud/alerts-azure-cosmos-db':1259 '/en-us/azure/defender-for-cloud/alerts-azure-ddos-protection':1271 '/en-us/azure/defender-for-cloud/alerts-azure-key-vault':1283 '/en-us/azure/defender-for-cloud/alerts-azure-network-layer':1295 '/en-us/azure/defender-for-cloud/alerts-azure-storage':1306 '/en-us/azure/defender-for-cloud/alerts-azure-vm-extensions':1318 '/en-us/azure/defender-for-cloud/alerts-containers':1328 '/en-us/azure/defender-for-cloud/alerts-defender-for-apis':1340 '/en-us/azure/defender-for-cloud/alerts-dns':1350 '/en-us/azure/defender-for-cloud/alerts-linux-machines':1361 '/en-us/azure/defender-for-cloud/alerts-open-source-relational-databases':1374 '/en-us/azure/defender-for-cloud/alerts-reference':1384 '/en-us/azure/defender-for-cloud/alerts-resource-manager':1395 '/en-us/azure/defender-for-cloud/alerts-schemas':2061 '/en-us/azure/defender-for-cloud/alerts-sql-database-and-azure-synapse-analytics':1407 '/en-us/azure/defender-for-cloud/alerts-windows-machines':1418 '/en-us/azure/defender-for-cloud/anti-malware':1428 '/en-us/azure/defender-for-cloud/apply-security-baseline':761 '/en-us/azure/defender-for-cloud/assign-access-to-workload':1439 '/en-us/azure/defender-for-cloud/attack-path-api':2717 '/en-us/azure/defender-for-cloud/authentication-architecture-google-cloud':1451 '/en-us/azure/defender-for-cloud/auto-deploy-azure-monitoring-agent':2070 '/en-us/azure/defender-for-cloud/auto-deploy-vulnerability-assessment':925 '/en-us/azure/defender-for-cloud/azure-portal-vs-defender-portal-comparison':938 '/en-us/azure/defender-for-cloud/binary-drift-detection':1462 '/en-us/azure/defender-for-cloud/chargeback':948 '/en-us/azure/defender-for-cloud/ci-cd-pipeline-scanning-with-defender-cli':2728,2992 '/en-us/azure/defender-for-cloud/cloud-scopes-unified-rbac':1473 '/en-us/azure/defender-for-cloud/cloud-security-explorer-kubernetes-clusters':2739 '/en-us/azure/defender-for-cloud/concept-authentication-architecture-aws':1485 '/en-us/azure/defender-for-cloud/concept-data-security-posture-prepare':2079 '/en-us/azure/defender-for-cloud/concept-private-links':2091 '/en-us/azure/defender-for-cloud/configure-azure-devops-extension':2102,2113 '/en-us/azure/defender-for-cloud/configure-email-notifications':2123 '/en-us/azure/defender-for-cloud/configure-google-plans':960 '/en-us/azure/defender-for-cloud/configure-private-endpoints':2138 '/en-us/azure/defender-for-cloud/configure-servers-coverage':2149 '/en-us/azure/defender-for-cloud/configure-vulnerability-findings-classic':1496 '/en-us/azure/defender-for-cloud/configure-vulnerability-findings-express':1507 '/en-us/azure/defender-for-cloud/connect-endor-labs':2749 '/en-us/azure/defender-for-cloud/connect-mend-io':2758 '/en-us/azure/defender-for-cloud/connect-servicenow':2768 '/en-us/azure/defender-for-cloud/containers-permissions':1520 '/en-us/azure/defender-for-cloud/continuous-export':2160 '/en-us/azure/defender-for-cloud/continuous-export-azure-policy':2171 '/en-us/azure/defender-for-cloud/continuous-export-event-hub-firewall':2182 '/en-us/azure/defender-for-cloud/continuous-export-rest-api':2781 '/en-us/azure/defender-for-cloud/continuous-export-view-data':2194 '/en-us/azure/defender-for-cloud/cost-calculator':970 '/en-us/azure/defender-for-cloud/create-custom-recommendations':2203 '/en-us/azure/defender-for-cloud/create-governance-rule-servicenow':2790 '/en-us/azure/defender-for-cloud/create-ticket-servicenow':2800 '/en-us/azure/defender-for-cloud/cross-tenant-management':2214 '/en-us/azure/defender-for-cloud/data-classification':1529 '/en-us/azure/defender-for-cloud/data-collection-rule':2226 '/en-us/azure/defender-for-cloud/data-ingestion-benefit':1165 '/en-us/azure/defender-for-cloud/data-security':1540 '/en-us/azure/defender-for-cloud/data-security-posture-enable':2236 '/en-us/azure/defender-for-cloud/data-sensitivity-settings':2244 '/en-us/azure/defender-for-cloud/defender-cli-authentication':1551 '/en-us/azure/defender-for-cloud/defender-cli-overview':2255 '/en-us/azure/defender-for-cloud/defender-cli-reviewing-results':772 '/en-us/azure/defender-for-cloud/defender-cli-syntax':2812 '/en-us/azure/defender-for-cloud/defender-for-apis-manage':2266 '/en-us/azure/defender-for-cloud/defender-for-apis-posture':785 '/en-us/azure/defender-for-cloud/defender-for-apis-prepare':2276 '/en-us/azure/defender-for-cloud/defender-for-apis-validation':501 '/en-us/azure/defender-for-cloud/defender-for-containers-arc-enable-programmatically':2286 '/en-us/azure/defender-for-cloud/defender-for-containers-architecture':1107 '/en-us/azure/defender-for-cloud/defender-for-containers-aws-configure':2296 '/en-us/azure/defender-for-cloud/defender-for-containers-aws-enable-portal':3003 '/en-us/azure/defender-for-cloud/defender-for-containers-aws-enable-programmatically':3013 '/en-us/azure/defender-for-cloud/defender-for-containers-aws-remove':3023 '/en-us/azure/defender-for-cloud/defender-for-containers-aws-verify':511 '/en-us/azure/defender-for-cloud/defender-for-containers-azure-configure':2306 '/en-us/azure/defender-for-cloud/defender-for-containers-azure-enable-programmatically':2822 '/en-us/azure/defender-for-cloud/defender-for-containers-azure-remove':3033 '/en-us/azure/defender-for-cloud/defender-for-containers-azure-verify':521 '/en-us/azure/defender-for-cloud/defender-for-containers-deployment-overview':979 '/en-us/azure/defender-for-cloud/defender-for-containers-enable-external-registry-for-docker-hub':2317 '/en-us/azure/defender-for-cloud/defender-for-containers-gcp-configure':2327 '/en-us/azure/defender-for-cloud/defender-for-containers-gcp-enable-portal':3044 '/en-us/azure/defender-for-cloud/defender-for-containers-gcp-enable-programmatically':3054 '/en-us/azure/defender-for-cloud/defender-for-containers-gcp-remove':3064 '/en-us/azure/defender-for-cloud/defender-for-containers-gcp-verify':531 '/en-us/azure/defender-for-cloud/defender-for-databases-enable-cosmos-protections':1561 '/en-us/azure/defender-for-cloud/defender-for-dns-alerts':542 '/en-us/azure/defender-for-cloud/defender-for-resource-manager-usage':554 '/en-us/azure/defender-for-cloud/defender-for-sql-alerts':1572 '/en-us/azure/defender-for-cloud/defender-for-sql-autoprovisioning':3074 '/en-us/azure/defender-for-cloud/defender-for-sql-on-machines-vulnerability-assessment':1584 '/en-us/azure/defender-for-cloud/defender-for-sql-scan-results':2835 '/en-us/azure/defender-for-cloud/defender-for-sql-usage':3086 '/en-us/azure/defender-for-cloud/defender-for-storage-azure-portal-enablement':3096 '/en-us/azure/defender-for-cloud/defender-for-storage-classic':991 '/en-us/azure/defender-for-cloud/defender-for-storage-classic-enable':2339 '/en-us/azure/defender-for-cloud/defender-for-storage-classic-migrate':1003 '/en-us/azure/defender-for-cloud/defender-for-storage-configure-malware-scan':2351 '/en-us/azure/defender-for-cloud/defender-for-storage-infrastructure-as-code-enablement':3106 '/en-us/azure/defender-for-cloud/defender-for-storage-policy-enablement':3116 '/en-us/azure/defender-for-cloud/defender-for-storage-powershell-enablement':3126 '/en-us/azure/defender-for-cloud/defender-for-storage-rest-api-enablement':3136 '/en-us/azure/defender-for-cloud/defender-for-storage-threats-alerts':1594 '/en-us/azure/defender-for-cloud/defender-partner-applications':2845 '/en-us/azure/defender-for-cloud/defender-portal/known-limitations':1175 '/en-us/azure/defender-for-cloud/deploy-helm':3146 '/en-us/azure/defender-for-cloud/deploy-vulnerability-assessment-byol-vm':1014 '/en-us/azure/defender-for-cloud/deploy-vulnerability-assessment-defender-vulnerability-management':2361 '/en-us/azure/defender-for-cloud/deprecated-alerts':564 '/en-us/azure/defender-for-cloud/devops-support':1186 '/en-us/azure/defender-for-cloud/disable-vulnerability-findings':2373 '/en-us/azure/defender-for-cloud/disable-vulnerability-findings-containers':2383 '/en-us/azure/defender-for-cloud/disable-vulnerability-findings-containers-secure-score':1604 '/en-us/azure/defender-for-cloud/enable-agentless-scanning-vms':2392 '/en-us/azure/defender-for-cloud/enable-defender-for-databases-aws':1616 '/en-us/azure/defender-for-cloud/enable-defender-for-databases-azure':1628 '/en-us/azure/defender-for-cloud/enable-defender-for-endpoint':2857 '/en-us/azure/defender-for-cloud/enable-defender-for-storage-data-sensitivity':2404 '/en-us/azure/defender-for-cloud/enable-defender-sql-at-scale':3157 '/en-us/azure/defender-for-cloud/enable-just-in-time-access':2417 '/en-us/azure/defender-for-cloud/enable-periodic-system-updates':798 '/en-us/azure/defender-for-cloud/enable-permissions-management':1638 '/en-us/azure/defender-for-cloud/enable-pull-request-annotations':2426 '/en-us/azure/defender-for-cloud/enable-vulnerability-assessment':2435 '/en-us/azure/defender-for-cloud/enablement-guide-runtime-gated':1649 '/en-us/azure/defender-for-cloud/endpoint-detection-misconfiguration':807 '/en-us/azure/defender-for-cloud/endpoint-detection-response-solution-recommendations':574,820 '/en-us/azure/defender-for-cloud/exclude-machines-agentless-scanning':2447 '/en-us/azure/defender-for-cloud/exempt-resource':2455 '/en-us/azure/defender-for-cloud/exempt-resources-at-scale':2466 '/en-us/azure/defender-for-cloud/export-alerts-to-csv':1198 '/en-us/azure/defender-for-cloud/export-to-siem':2868 '/en-us/azure/defender-for-cloud/export-to-splunk-or-qradar':2881 '/en-us/azure/defender-for-cloud/express-configuration-azure-commands':2477 '/en-us/azure/defender-for-cloud/express-configuration-powershell-commands':2487 '/en-us/azure/defender-for-cloud/express-configuration-sql-commands':2498 '/en-us/azure/defender-for-cloud/faq-endor-labs':584 '/en-us/azure/defender-for-cloud/faq-permissions':1659 '/en-us/azure/defender-for-cloud/file-integrity-monitoring-enable-defender-endpoint':2509 '/en-us/azure/defender-for-cloud/free-trial':1210 '/en-us/azure/defender-for-cloud/gain-end-user-context-ai':2523 '/en-us/azure/defender-for-cloud/gated-deployment-infrastructure-as-code':3168 '/en-us/azure/defender-for-cloud/github-action':2532 '/en-us/azure/defender-for-cloud/governance-rules':1669 '/en-us/azure/defender-for-cloud/iac-vulnerabilities':2543 '/en-us/azure/defender-for-cloud/identify-sql-servers-protected-by-monitor-agent':3180 '/en-us/azure/defender-for-cloud/incidents-reference':594 '/en-us/azure/defender-for-cloud/information-protection':1679 '/en-us/azure/defender-for-cloud/integrate-cloud-trail':2892 '/en-us/azure/defender-for-cloud/integration-defender-for-endpoint':2903 '/en-us/azure/defender-for-cloud/kubernetes-nodes-malware':605 '/en-us/azure/defender-for-cloud/kubernetes-nodes-va':615 '/en-us/azure/defender-for-cloud/kubernetes-workload-protections':1690 '/en-us/azure/defender-for-cloud/logging-ingestion':2916 '/en-us/azure/defender-for-cloud/manage-mcsb':2552 '/en-us/azure/defender-for-cloud/migrate-file-integrity-monitoring':3191 '/en-us/azure/defender-for-cloud/monitoring-components':1220 '/en-us/azure/defender-for-cloud/on-upload-malware-scanning':1702 '/en-us/azure/defender-for-cloud/onboard-management-group':2564 '/en-us/azure/defender-for-cloud/onboarding-guide-42crunch':2925 '/en-us/azure/defender-for-cloud/onboarding-guide-bright':2934 '/en-us/azure/defender-for-cloud/onboarding-guide-stackhawk':2944 '/en-us/azure/defender-for-cloud/partner-integration':2956 '/en-us/azure/defender-for-cloud/permissions':1715 '/en-us/azure/defender-for-cloud/permissions-management':1725 '/en-us/azure/defender-for-cloud/plan-defender-for-servers':1117 '/en-us/azure/defender-for-cloud/plan-defender-for-servers-agents':1127 '/en-us/azure/defender-for-cloud/plan-defender-for-servers-data-workspace':1138 '/en-us/azure/defender-for-cloud/plan-defender-for-servers-roles':1736 '/en-us/azure/defender-for-cloud/plan-defender-for-servers-scale':1148 '/en-us/azure/defender-for-cloud/plan-defender-for-servers-select-plan':1024 '/en-us/azure/defender-for-cloud/policy-reference':2578 '/en-us/azure/defender-for-cloud/powershell-onboarding':2587 '/en-us/azure/defender-for-cloud/powershell-sample-vulnerability-assessment-azure-sql':2598 '/en-us/azure/defender-for-cloud/powershell-sample-vulnerability-assessment-baselines':2608 '/en-us/azure/defender-for-cloud/prepare-deprecation-log-analytics-mma-agent':1036,1048 '/en-us/azure/defender-for-cloud/prepurchase-plan':1061 '/en-us/azure/defender-for-cloud/privacy':1747 '/en-us/azure/defender-for-cloud/protect-network-resources':829 '/en-us/azure/defender-for-cloud/query-software-bill-of-materials':2622 '/en-us/azure/defender-for-cloud/recommendations-reference-ai':1757 '/en-us/azure/defender-for-cloud/recommendations-reference-api':1767 '/en-us/azure/defender-for-cloud/recommendations-reference-app-services':1780 '/en-us/azure/defender-for-cloud/recommendations-reference-compute':1790 '/en-us/azure/defender-for-cloud/recommendations-reference-container':1800 '/en-us/azure/defender-for-cloud/recommendations-reference-data':1810 '/en-us/azure/defender-for-cloud/recommendations-reference-deprecated':1820 '/en-us/azure/defender-for-cloud/recommendations-reference-devops':1830 '/en-us/azure/defender-for-cloud/recommendations-reference-identity-access':1842 '/en-us/azure/defender-for-cloud/recommendations-reference-iot':1852 '/en-us/azure/defender-for-cloud/recommendations-reference-keyvault':1863 '/en-us/azure/defender-for-cloud/recommendations-reference-networking':1873 '/en-us/azure/defender-for-cloud/recommendations-reference-serverless-protection':1883 '/en-us/azure/defender-for-cloud/regional-availability':1072 '/en-us/azure/defender-for-cloud/remediate-cloud-deployment-secrets':838 '/en-us/azure/defender-for-cloud/remediate-server-secrets':847 '/en-us/azure/defender-for-cloud/remediate-vulnerability-findings-vm':858 '/en-us/azure/defender-for-cloud/resolve-disk-scanning-error':627 '/en-us/azure/defender-for-cloud/resolve-gcp-sharing-policy':639 '/en-us/azure/defender-for-cloud/resolve-vpc-service-controls-issues':651 '/en-us/azure/defender-for-cloud/resource-graph-samples':2968 '/en-us/azure/defender-for-cloud/review-pull-request-annotations':872 '/en-us/azure/defender-for-cloud/review-security-recommendations':1894 '/en-us/azure/defender-for-cloud/runtime-gated-overview':1904 '/en-us/azure/defender-for-cloud/secure-container-image':1914 '/en-us/azure/defender-for-cloud/security-baseline-guest-configuration':2635 '/en-us/azure/defender-for-cloud/security-policy-concept':1924 '/en-us/azure/defender-for-cloud/sensitive-info-types':2644 '/en-us/azure/defender-for-cloud/sentinel-connected-aws':663 '/en-us/azure/defender-for-cloud/simulate-alerts-sql-machines':1934 '/en-us/azure/defender-for-cloud/sql-azure-vulnerability-assessment-enable':2657 '/en-us/azure/defender-for-cloud/sql-azure-vulnerability-assessment-enable-classic':2668 '/en-us/azure/defender-for-cloud/sql-azure-vulnerability-assessment-find':1944 '/en-us/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview':1954 '/en-us/azure/defender-for-cloud/sql-azure-vulnerability-assessment-rules':1963 '/en-us/azure/defender-for-cloud/sql-azure-vulnerability-assessment-rules-changelog':1972 '/en-us/azure/defender-for-cloud/subassessment-rest-api':2978 '/en-us/azure/defender-for-cloud/support-matrix-defender-for-cloud':3204 '/en-us/azure/defender-for-cloud/support-matrix-defender-for-containers':3214 '/en-us/azure/defender-for-cloud/support-matrix-defender-for-servers':3226 '/en-us/azure/defender-for-cloud/support-matrix-defender-for-storage':1982 '/en-us/azure/defender-for-cloud/tenant-wide-permissions-management':1994 '/en-us/azure/defender-for-cloud/test-agentless-malware-scanning':2678 '/en-us/azure/defender-for-cloud/transition-grouped-individual-recommendations':1083 '/en-us/azure/defender-for-cloud/troubleshoot-connectors':675 '/en-us/azure/defender-for-cloud/troubleshoot-sql-machines-guide':685 '/en-us/azure/defender-for-cloud/troubleshoot-sql-machines-guide-gov':696 '/en-us/azure/defender-for-cloud/troubleshoot-vulnerability-findings':706 '/en-us/azure/defender-for-cloud/troubleshooting-guide':716 '/en-us/azure/defender-for-cloud/troubleshooting-runtime-gated':725 '/en-us/azure/defender-for-cloud/tutorial-enable-storage-plan':3236 '/en-us/azure/defender-for-cloud/understand-malware-scan-results':738 '/en-us/azure/defender-for-cloud/update-sql-machine-configuration':2690 '/en-us/azure/defender-for-cloud/verify-machine-protection':3248 '/en-us/azure/defender-for-cloud/view-and-remediate-vulnerabilities-containers':882 '/en-us/azure/defender-for-cloud/view-and-remediate-vulnerabilities-for-images-secure-score':892 '/en-us/azure/defender-for-cloud/view-and-remediate-vulnerability-assessment-findings-secure-score':902 '/en-us/azure/defender-for-cloud/view-and-remediate-vulnerability-registry-images':911 '/microsoftdocs/mcp/blob/main/readme.md)':170 '3':141 '42crunch':2918 'accept':209 'access':175,1431,1834,2410 'account':2665 'across':258,453,1144,3082,3197 'act':728,1886 'action':2529 'advanc':1999 'agent':90,134,193,207,282,449,1032,1044,2065,3161,3177 'agentless':306,393,617,744,1090,2010,2385,2439,2670 'ai':487,1230,1752,2046,2518 'ak':262,518,878,2303,2735,2819,3029 'aks/contain':37 'aks/eks/gke':454 'alert':229,343,356,398,473,488,498,539,551,560,597,1191,1240,1252,1264,1276,1288,1300,1311,1325,1333,1345,1355,1366,1380,1389,1400,1412,1569,1591,1676,1929,2055,2118,2520,2673,2862,2874 'alerts/recommendations':367 'alloc':939 'ama':3070 'analyt':1031,1043 'analyz':2183 'annot':861,2423 'anti':1423 'anti-malwar':1422 'api':339,377,421,462,497,774,782,1337,1522,1762,2263,2273,2714,2778,2838,2919,3133 'api/endpoint/kubernetes':256 'app':1243,1776,2515 'appli':743,821,1680,1758,1781,1791,1821,1864 'arc':2283 'architectur':20,59,294,300,1084,1104,1114,1444,1478 'arg':2713,2832 'artifact':1911 'artifactori':2032 'assess':746,883,1007,1940,1951,1959,1968,2024,2034,2648,2661 'assign':1429,1652,1703 'attack':2709 'authent':1443,1477,1543 'author':2729 'autom':432,2342,2782 'autoprovis':3071 'avail':160,284,1069 'aw':656,665,1433,1475,1613,2883 'aws/gcp/apis/sql/k8s':233 'azur':2,9,35,38,49,826,868,928,1242,1254,1266,1278,1290,1302,1313,1556,1625,1698,1711,1775,1948,2045,2063,2098,2109,2165,2190,2210,2232,2412,2471,2569,2625,2651,2870,2958,3092,3112,3122,3198,3233 'azure-defender-for-cloud':1 'baselin':758,2605 'behind':2178 'benefit':1159 'best':16,55,241,246,739 'bi':2703 'binari':1453 'block':1457 'bright':2927 'built':2567 'built-in':2566 'byol':1005 'calcul':967 'capabl':82,1718 'catalog':591 'categori':93,101,117,213,215 'chang':350 'changelog':1964 'chargeback':945 'check':1062,1199,2267,3192 'choos':273,926,971,1015 'ci/cd':265,417,763,2724,2988 'ciem':1630,1717 'classic':700,985,997,1487,2334,2662 'cli':459,1548,2249,2472,2722,2805,2986 'cloud':5,12,41,52,227,261,278,333,363,387,415,425,446,472,486,559,568,588,672,712,767,795,817,831,935,942,954,964,1011,1029,1041,1052,1065,1190,1204,1229,1239,1251,1263,1275,1287,1299,1310,1332,1344,1354,1365,1378,1388,1399,1411,1448,1464,1482,1533,1547,1635,1655,1683,1706,1722,1740,1751,1761,1771,1784,1794,1804,1815,1824,1839,1846,1856,1867,1877,1890,1921,1991,2016,2054,2088,2117,2131,2156,2186,2248,2370,2444,2556,2575,2582,2615,2617,2632,2699,2721,2730,2746,2755,2765,2773,2804,2854,2861,2889,2900,2906,2911,2941,2953,2965,2985,3195 'cloudtrail':2884 'cluster':1646,3020,3030,3061 'code':28,67,407,2011,2692,3165 'collect':313,348,1123,1214,2218 'combin':72 'command':2473,2483 'common':576,708 'comput':1785 'configur':26,65,364,380,384,682,703,951,1224,1419,1452,1488,1499,1541,1595,1641,1660,1691,1716,1726,1915,1945,1995,1998,2009,2020,2030,2062,2080,2092,2103,2114,2150,2161,2204,2215,2287,2297,2318,2330,2374,2384,2395,2427,2448,2470,2481,2491,2499,2510,2524,2533,2544,2595,2628,2680,2869 'connect':655,2696,2740,2750,2759,2926 'connector':636,668,1436,1442,1476 'connector/onboarding':231 'consum':2823 'contain':290,375,394,450,505,515,525,748,879,974,1102,1322,1420,1459,1513,1599,1795,1900,1908,2281,2290,2300,2314,2321,2378,2432,2808,2817,2974,2996,3008,3017,3027,3037,3049,3058,3140,3210 'container/aks':435 'content':77,179 'context':2516 'continu':2151,2162,2173,2774 'control':644 'cosmos':1255,1557 'cost':943,965 'cover':53 'coverag':476,2143 'creat':2456,2791 'cross':2206 'cross-ten':2205 'csv':1193 'current':1167 'custom':2196,2216,2237 'dast':2929 'data':312,337,347,369,403,430,1122,1132,1157,1213,1525,1534,1672,1685,1744,1805,2074,2157,2188,2217,2228,2239,2397,2611,2700,2711 'databas':1371,1611,1623 'datastor':2233 'db':1256,1558 'dcus':1058 'ddos':1267 'decid':980 'decis':18,57,266,912 'defend':3,10,39,50,225,259,276,303,331,361,385,413,444,470,484,495,503,513,523,535,547,557,566,586,602,609,624,635,647,660,670,677,687,710,730,780,793,800,815,822,835,844,853,908,917,930,933,940,952,962,972,982,994,1009,1018,1027,1039,1050,1063,1079,1100,1110,1119,1129,1141,1154,1170,1188,1202,1212,1227,1237,1249,1261,1273,1285,1297,1308,1320,1330,1335,1342,1352,1363,1376,1386,1397,1409,1446,1470,1480,1511,1531,1545,1554,1565,1574,1586,1606,1618,1633,1653,1665,1675,1681,1704,1720,1731,1738,1749,1759,1769,1782,1792,1802,1813,1822,1837,1844,1854,1865,1875,1888,1919,1926,1977,1989,2003,2014,2026,2036,2041,2052,2067,2086,2115,2129,2140,2154,2184,2221,2238,2246,2261,2271,2279,2288,2298,2312,2319,2331,2346,2356,2368,2428,2442,2463,2504,2554,2573,2580,2613,2630,2641,2682,2697,2708,2719,2744,2753,2763,2771,2797,2802,2815,2826,2842,2847,2852,2859,2887,2894,2898,2909,2922,2931,2939,2951,2963,2970,2983,2994,3006,3015,3025,3035,3047,3056,3066,3076,3088,3098,3108,3118,3128,3138,3148,3186,3193,3208,3221,3229,3238 'defin':2195 'definit':2571 'deploy':31,70,234,320,437,441,506,516,526,692,719,832,975,1113,1643,1897,2270,2814,2979,3005,3046,3137,3158,3160,3227 'deprec':556,1812 'descript':217 'design':21,60,295,1085,1108,1124 'detect':309,570,810,1455,2399 'develop':13 'devop':340,397,869,1182,1825,2095,2099,2106,2110,2419,2527,2540 'diagnos':222 'disabl':1596,2362,2377 'disk':618 'dns':537,1347 'doc':185 'docker':2021,2308 'document':80,178 'domain':630 'drift':1454 'e.g':105,121 'edr':419 'ek':508,1515,2293,2998,3010,3019 'email':2119 'enabl':1552,1605,1617,1629,1639,2040,2172,2227,2278,2328,2352,2393,2405,2418,2553,2591,2645,2658,2846,2993,3034,3075,3087,3097,3107,3117,3127,3147 'end':2512 'end-us':2511 'endor':579,2741 'endpoint':569,802,809,2127,2506,2849,2896,3188 'enforc':1664 'environ':1145,3083,3201 'error':620 'estim':961 'event':2176 'exclud':2436 'exempt':391,2375,2450,2461 'expert':6,46 'explor':769,1562,2619,2732 'export':344,399,1187,2152,2163,2174,2187,2775,2825,2873 'exposur':1526 'express':698,1498,2469,2480,2490,2594,2649 'extens':349,1215,1315,2096,2107 'fallback':197 'featur':334,388,3211 'fetch':81,177,186,199 'file':111,119,126,131,2500,3182 'find':776,842,851,1493,1504,1601,1910,1941,2366,2380 'firewal':2179 'fix':224,608,628,875 'free':335,1161,1205 'gap':235,571,813 'gate':718,1642,1899,3159 'gcp':293,622,629,641,667,957,1435,1441,2905 'generat':474 'github':866,2528 'github.com':169 'github.com/microsoftdocs/mcp/blob/main/readme.md)':168 'gke':528,1517,2324,3039,3051,3060 'gov':693 'govern':1661,2786 'granular':1430 'graph':2960 'group':1076,2559 'guest':2627 'guid':167 'guidanc':47,271,301 'handl':237,370,595,1535 'harden':359,1687 'helm':3143 'hub':2022,2177,2309 'iac':460,2534,3102 'id':561 'ident':1832 'identifi':3169 'imag':885,895,905,1901,2809 'implement':1831 'import':88,132 'incid':239,589 'includ':14 'index':94,214 'individu':1078 'inform':2638 'infrastructur':3163 'ingest':338,1158,2904 'instal':164,166 'integr':27,66,406,412,581,2058,2501,2691,2718,2850,2882,2893,2935,2949,2982,3183 'interoper':3196 'interpret':366,480,726,1585,1884,1947 'investig':249,543,606,773,799,1564 'iot':1847 'issu':228,577,633,645,658,713,720 'itsm':420,2761 'jfrog':2031 'just-in-tim':2406 'key':1279,1857 'knowledg':7 'kubernet':379,599,610,722,884,1324,1645,1684,1896 'l104':270 'l105':298 'l105-l114':297 'l114':299 'l115':324 'l115-l124':323 'l120':108 'l124':325 'l125':353 'l125-l199':352 'l199':354 'l200':382 'l200-l267':381 'l267':383 'l268':410 'l268-l297':409 'l297':411 'l298':439 'l298-l325':438 'l325':440 'l35':107 'l35-l120':106 'l37':220 'l37-l65':219 'l65':221 'l66':244 'l66-l85':243 'l85':245 'l86':269 'l86-l104':268 'lab':580,2742 'larg':318,2458 'large-scal':317,2457 'latest':149 'layer':1292 'learn':192,206 'learn-agent-skil':191,205 'learn.microsoft.com':478,490,500,510,520,530,541,553,563,573,583,593,604,614,626,638,650,662,674,684,695,705,715,724,737,750,760,771,784,797,806,819,828,837,846,857,871,881,891,901,910,924,937,947,959,969,978,990,1002,1013,1023,1035,1047,1060,1071,1082,1097,1106,1116,1126,1137,1147,1164,1174,1185,1197,1209,1219,1234,1246,1258,1270,1282,1294,1305,1317,1327,1339,1349,1360,1373,1383,1394,1406,1417,1427,1438,1450,1461,1472,1484,1495,1506,1519,1528,1539,1550,1560,1571,1583,1593,1603,1615,1627,1637,1648,1658,1668,1678,1689,1701,1714,1724,1735,1746,1756,1766,1779,1789,1799,1809,1819,1829,1841,1851,1862,1872,1882,1893,1903,1913,1923,1933,1943,1953,1962,1971,1981,1993,2007,2018,2028,2038,2049,2060,2069,2078,2090,2101,2112,2122,2137,2148,2159,2170,2181,2193,2202,2213,2225,2235,2243,2254,2265,2275,2285,2295,2305,2316,2326,2338,2350,2360,2372,2382,2391,2403,2416,2425,2434,2446,2454,2465,2476,2486,2497,2508,2522,2531,2542,2551,2563,2577,2586,2597,2607,2621,2634,2643,2656,2667,2677,2689,2705,2716,2727,2738,2748,2757,2767,2780,2789,2799,2811,2821,2834,2844,2856,2867,2880,2891,2902,2915,2924,2933,2943,2955,2967,2977,2991,3002,3012,3022,3032,3043,3053,3063,3073,3085,3095,3105,3115,3125,3135,3145,3156,3167,3179,3190,3203,3213,3225,3235,3247 'learn.microsoft.com/en-us/azure/defender-for-cloud/add-data-power-bi':2704 'learn.microsoft.com/en-us/azure/defender-for-cloud/advanced-configurations-for-malware-scanning':2006 'learn.microsoft.com/en-us/azure/defender-for-cloud/agentless-code-scanning':2017 'learn.microsoft.com/en-us/azure/defender-for-cloud/agentless-malware-scanning':1096 'learn.microsoft.com/en-us/azure/defender-for-cloud/agentless-vulnerability-assessment-azure':749 'learn.microsoft.com/en-us/azure/defender-for-cloud/agentless-vulnerability-assessment-docker-hub':2027 'learn.microsoft.com/en-us/azure/defender-for-cloud/agentless-vulnerability-assessment-jfrog-artifactory':2037 'learn.microsoft.com/en-us/azure/defender-for-cloud/ai-model-security':1233 'learn.microsoft.com/en-us/azure/defender-for-cloud/ai-onboarding':2048 'learn.microsoft.com/en-us/azure/defender-for-cloud/alert-validation':477 'learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-ai-workloads':489 'learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-azure-app-service':1245 'learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-azure-cosmos-db':1257 'learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-azure-ddos-protection':1269 'learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-azure-key-vault':1281 'learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-azure-network-layer':1293 'learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-azure-storage':1304 'learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-azure-vm-extensions':1316 'learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-containers':1326 'learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-defender-for-apis':1338 'learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-dns':1348 'learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-linux-machines':1359 'learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-open-source-relational-databases':1372 'learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-reference':1382 'learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-resource-manager':1393 'learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-schemas':2059 'learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-sql-database-and-azure-synapse-analytics':1405 'learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-windows-machines':1416 'learn.microsoft.com/en-us/azure/defender-for-cloud/anti-malware':1426 'learn.microsoft.com/en-us/azure/defender-for-cloud/apply-security-baseline':759 'learn.microsoft.com/en-us/azure/defender-for-cloud/assign-access-to-workload':1437 'learn.microsoft.com/en-us/azure/defender-for-cloud/attack-path-api':2715 'learn.microsoft.com/en-us/azure/defender-for-cloud/authentication-architecture-google-cloud':1449 'learn.microsoft.com/en-us/azure/defender-for-cloud/auto-deploy-azure-monitoring-agent':2068 'learn.microsoft.com/en-us/azure/defender-for-cloud/auto-deploy-vulnerability-assessment':923 'learn.microsoft.com/en-us/azure/defender-for-cloud/azure-portal-vs-defender-portal-comparison':936 'learn.microsoft.com/en-us/azure/defender-for-cloud/binary-drift-detection':1460 'learn.microsoft.com/en-us/azure/defender-for-cloud/chargeback':946 'learn.microsoft.com/en-us/azure/defender-for-cloud/ci-cd-pipeline-scanning-with-defender-cli':2726,2990 'learn.microsoft.com/en-us/azure/defender-for-cloud/cloud-scopes-unified-rbac':1471 'learn.microsoft.com/en-us/azure/defender-for-cloud/cloud-security-explorer-kubernetes-clusters':2737 'learn.microsoft.com/en-us/azure/defender-for-cloud/concept-authentication-architecture-aws':1483 'learn.microsoft.com/en-us/azure/defender-for-cloud/concept-data-security-posture-prepare':2077 'learn.microsoft.com/en-us/azure/defender-for-cloud/concept-private-links':2089 'learn.microsoft.com/en-us/azure/defender-for-cloud/configure-azure-devops-extension':2100,2111 'learn.microsoft.com/en-us/azure/defender-for-cloud/configure-email-notifications':2121 'learn.microsoft.com/en-us/azure/defender-for-cloud/configure-google-plans':958 'learn.microsoft.com/en-us/azure/defender-for-cloud/configure-private-endpoints':2136 'learn.microsoft.com/en-us/azure/defender-for-cloud/configure-servers-coverage':2147 'learn.microsoft.com/en-us/azure/defender-for-cloud/configure-vulnerability-findings-classic':1494 'learn.microsoft.com/en-us/azure/defender-for-cloud/configure-vulnerability-findings-express':1505 'learn.microsoft.com/en-us/azure/defender-for-cloud/connect-endor-labs':2747 'learn.microsoft.com/en-us/azure/defender-for-cloud/connect-mend-io':2756 'learn.microsoft.com/en-us/azure/defender-for-cloud/connect-servicenow':2766 'learn.microsoft.com/en-us/azure/defender-for-cloud/containers-permissions':1518 'learn.microsoft.com/en-us/azure/defender-for-cloud/continuous-export':2158 'learn.microsoft.com/en-us/azure/defender-for-cloud/continuous-export-azure-policy':2169 'learn.microsoft.com/en-us/azure/defender-for-cloud/continuous-export-event-hub-firewall':2180 'learn.microsoft.com/en-us/azure/defender-for-cloud/continuous-export-rest-api':2779 'learn.microsoft.com/en-us/azure/defender-for-cloud/continuous-export-view-data':2192 'learn.microsoft.com/en-us/azure/defender-for-cloud/cost-calculator':968 'learn.microsoft.com/en-us/azure/defender-for-cloud/create-custom-recommendations':2201 'learn.microsoft.com/en-us/azure/defender-for-cloud/create-governance-rule-servicenow':2788 'learn.microsoft.com/en-us/azure/defender-for-cloud/create-ticket-servicenow':2798 'learn.microsoft.com/en-us/azure/defender-for-cloud/cross-tenant-management':2212 'learn.microsoft.com/en-us/azure/defender-for-cloud/data-classification':1527 'learn.microsoft.com/en-us/azure/defender-for-cloud/data-collection-rule':2224 'learn.microsoft.com/en-us/azure/defender-for-cloud/data-ingestion-benefit':1163 'learn.microsoft.com/en-us/azure/defender-for-cloud/data-security':1538 'learn.microsoft.com/en-us/azure/defender-for-cloud/data-security-posture-enable':2234 'learn.microsoft.com/en-us/azure/defender-for-cloud/data-sensitivity-settings':2242 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-cli-authentication':1549 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-cli-overview':2253 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-cli-reviewing-results':770 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-cli-syntax':2810 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-apis-manage':2264 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-apis-posture':783 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-apis-prepare':2274 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-apis-validation':499 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-arc-enable-programmatically':2284 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-architecture':1105 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-aws-configure':2294 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-aws-enable-portal':3001 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-aws-enable-programmatically':3011 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-aws-remove':3021 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-aws-verify':509 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-azure-configure':2304 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-azure-enable-programmatically':2820 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-azure-remove':3031 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-azure-verify':519 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-deployment-overview':977 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-enable-external-registry-for-docker-hub':2315 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-gcp-configure':2325 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-gcp-enable-portal':3042 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-gcp-enable-programmatically':3052 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-gcp-remove':3062 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-gcp-verify':529 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-databases-enable-cosmos-protections':1559 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-dns-alerts':540 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-resource-manager-usage':552 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-sql-alerts':1570 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-sql-autoprovisioning':3072 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-sql-on-machines-vulnerability-assessment':1582 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-sql-scan-results':2833 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-sql-usage':3084 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-azure-portal-enablement':3094 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-classic':989 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-classic-enable':2337 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-classic-migrate':1001 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-configure-malware-scan':2349 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-infrastructure-as-code-enablement':3104 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-policy-enablement':3114 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-powershell-enablement':3124 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-rest-api-enablement':3134 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-threats-alerts':1592 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-partner-applications':2843 'learn.microsoft.com/en-us/azure/defender-for-cloud/defender-portal/known-limitations':1173 'learn.microsoft.com/en-us/azure/defender-for-cloud/deploy-helm':3144 'learn.microsoft.com/en-us/azure/defender-for-cloud/deploy-vulnerability-assessment-byol-vm':1012 'learn.microsoft.com/en-us/azure/defender-for-cloud/deploy-vulnerability-assessment-defender-vulnerability-management':2359 'learn.microsoft.com/en-us/azure/defender-for-cloud/deprecated-alerts':562 'learn.microsoft.com/en-us/azure/defender-for-cloud/devops-support':1184 'learn.microsoft.com/en-us/azure/defender-for-cloud/disable-vulnerability-findings':2371 'learn.microsoft.com/en-us/azure/defender-for-cloud/disable-vulnerability-findings-containers':2381 'learn.microsoft.com/en-us/azure/defender-for-cloud/disable-vulnerability-findings-containers-secure-score':1602 'learn.microsoft.com/en-us/azure/defender-for-cloud/enable-agentless-scanning-vms':2390 'learn.microsoft.com/en-us/azure/defender-for-cloud/enable-defender-for-databases-aws':1614 'learn.microsoft.com/en-us/azure/defender-for-cloud/enable-defender-for-databases-azure':1626 'learn.microsoft.com/en-us/azure/defender-for-cloud/enable-defender-for-endpoint':2855 'learn.microsoft.com/en-us/azure/defender-for-cloud/enable-defender-for-storage-data-sensitivity':2402 'learn.microsoft.com/en-us/azure/defender-for-cloud/enable-defender-sql-at-scale':3155 'learn.microsoft.com/en-us/azure/defender-for-cloud/enable-just-in-time-access':2415 'learn.microsoft.com/en-us/azure/defender-for-cloud/enable-periodic-system-updates':796 'learn.microsoft.com/en-us/azure/defender-for-cloud/enable-permissions-management':1636 'learn.microsoft.com/en-us/azure/defender-for-cloud/enable-pull-request-annotations':2424 'learn.microsoft.com/en-us/azure/defender-for-cloud/enable-vulnerability-assessment':2433 'learn.microsoft.com/en-us/azure/defender-for-cloud/enablement-guide-runtime-gated':1647 'learn.microsoft.com/en-us/azure/defender-for-cloud/endpoint-detection-misconfiguration':805 'learn.microsoft.com/en-us/azure/defender-for-cloud/endpoint-detection-response-solution-recommendations':572,818 'learn.microsoft.com/en-us/azure/defender-for-cloud/exclude-machines-agentless-scanning':2445 'learn.microsoft.com/en-us/azure/defender-for-cloud/exempt-resource':2453 'learn.microsoft.com/en-us/azure/defender-for-cloud/exempt-resources-at-scale':2464 'learn.microsoft.com/en-us/azure/defender-for-cloud/export-alerts-to-csv':1196 'learn.microsoft.com/en-us/azure/defender-for-cloud/export-to-siem':2866 'learn.microsoft.com/en-us/azure/defender-for-cloud/export-to-splunk-or-qradar':2879 'learn.microsoft.com/en-us/azure/defender-for-cloud/express-configuration-azure-commands':2475 'learn.microsoft.com/en-us/azure/defender-for-cloud/express-configuration-powershell-commands':2485 'learn.microsoft.com/en-us/azure/defender-for-cloud/express-configuration-sql-commands':2496 'learn.microsoft.com/en-us/azure/defender-for-cloud/faq-endor-labs':582 'learn.microsoft.com/en-us/azure/defender-for-cloud/faq-permissions':1657 'learn.microsoft.com/en-us/azure/defender-for-cloud/file-integrity-monitoring-enable-defender-endpoint':2507 'learn.microsoft.com/en-us/azure/defender-for-cloud/free-trial':1208 'learn.microsoft.com/en-us/azure/defender-for-cloud/gain-end-user-context-ai':2521 'learn.microsoft.com/en-us/azure/defender-for-cloud/gated-deployment-infrastructure-as-code':3166 'learn.microsoft.com/en-us/azure/defender-for-cloud/github-action':2530 'learn.microsoft.com/en-us/azure/defender-for-cloud/governance-rules':1667 'learn.microsoft.com/en-us/azure/defender-for-cloud/iac-vulnerabilities':2541 'learn.microsoft.com/en-us/azure/defender-for-cloud/identify-sql-servers-protected-by-monitor-agent':3178 'learn.microsoft.com/en-us/azure/defender-for-cloud/incidents-reference':592 'learn.microsoft.com/en-us/azure/defender-for-cloud/information-protection':1677 'learn.microsoft.com/en-us/azure/defender-for-cloud/integrate-cloud-trail':2890 'learn.microsoft.com/en-us/azure/defender-for-cloud/integration-defender-for-endpoint':2901 'learn.microsoft.com/en-us/azure/defender-for-cloud/kubernetes-nodes-malware':603 'learn.microsoft.com/en-us/azure/defender-for-cloud/kubernetes-nodes-va':613 'learn.microsoft.com/en-us/azure/defender-for-cloud/kubernetes-workload-protections':1688 'learn.microsoft.com/en-us/azure/defender-for-cloud/logging-ingestion':2914 'learn.microsoft.com/en-us/azure/defender-for-cloud/manage-mcsb':2550 'learn.microsoft.com/en-us/azure/defender-for-cloud/migrate-file-integrity-monitoring':3189 'learn.microsoft.com/en-us/azure/defender-for-cloud/monitoring-components':1218 'learn.microsoft.com/en-us/azure/defender-for-cloud/on-upload-malware-scanning':1700 'learn.microsoft.com/en-us/azure/defender-for-cloud/onboard-management-group':2562 'learn.microsoft.com/en-us/azure/defender-for-cloud/onboarding-guide-42crunch':2923 'learn.microsoft.com/en-us/azure/defender-for-cloud/onboarding-guide-bright':2932 'learn.microsoft.com/en-us/azure/defender-for-cloud/onboarding-guide-stackhawk':2942 'learn.microsoft.com/en-us/azure/defender-for-cloud/partner-integration':2954 'learn.microsoft.com/en-us/azure/defender-for-cloud/permissions':1713 'learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management':1723 'learn.microsoft.com/en-us/azure/defender-for-cloud/plan-defender-for-servers':1115 'learn.microsoft.com/en-us/azure/defender-for-cloud/plan-defender-for-servers-agents':1125 'learn.microsoft.com/en-us/azure/defender-for-cloud/plan-defender-for-servers-data-workspace':1136 'learn.microsoft.com/en-us/azure/defender-for-cloud/plan-defender-for-servers-roles':1734 'learn.microsoft.com/en-us/azure/defender-for-cloud/plan-defender-for-servers-scale':1146 'learn.microsoft.com/en-us/azure/defender-for-cloud/plan-defender-for-servers-select-plan':1022 'learn.microsoft.com/en-us/azure/defender-for-cloud/policy-reference':2576 'learn.microsoft.com/en-us/azure/defender-for-cloud/powershell-onboarding':2585 'learn.microsoft.com/en-us/azure/defender-for-cloud/powershell-sample-vulnerability-assessment-azure-sql':2596 'learn.microsoft.com/en-us/azure/defender-for-cloud/powershell-sample-vulnerability-assessment-baselines':2606 'learn.microsoft.com/en-us/azure/defender-for-cloud/prepare-deprecation-log-analytics-mma-agent':1034,1046 'learn.microsoft.com/en-us/azure/defender-for-cloud/prepurchase-plan':1059 'learn.microsoft.com/en-us/azure/defender-for-cloud/privacy':1745 'learn.microsoft.com/en-us/azure/defender-for-cloud/protect-network-resources':827 'learn.microsoft.com/en-us/azure/defender-for-cloud/query-software-bill-of-materials':2620 'learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-ai':1755 'learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-api':1765 'learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-app-services':1778 'learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-compute':1788 'learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-container':1798 'learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-data':1808 'learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-deprecated':1818 'learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-devops':1828 'learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-identity-access':1840 'learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-iot':1850 'learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-keyvault':1861 'learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-networking':1871 'learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-serverless-protection':1881 'learn.microsoft.com/en-us/azure/defender-for-cloud/regional-availability':1070 'learn.microsoft.com/en-us/azure/defender-for-cloud/remediate-cloud-deployment-secrets':836 'learn.microsoft.com/en-us/azure/defender-for-cloud/remediate-server-secrets':845 'learn.microsoft.com/en-us/azure/defender-for-cloud/remediate-vulnerability-findings-vm':856 'learn.microsoft.com/en-us/azure/defender-for-cloud/resolve-disk-scanning-error':625 'learn.microsoft.com/en-us/azure/defender-for-cloud/resolve-gcp-sharing-policy':637 'learn.microsoft.com/en-us/azure/defender-for-cloud/resolve-vpc-service-controls-issues':649 'learn.microsoft.com/en-us/azure/defender-for-cloud/resource-graph-samples':2966 'learn.microsoft.com/en-us/azure/defender-for-cloud/review-pull-request-annotations':870 'learn.microsoft.com/en-us/azure/defender-for-cloud/review-security-recommendations':1892 'learn.microsoft.com/en-us/azure/defender-for-cloud/runtime-gated-overview':1902 'learn.microsoft.com/en-us/azure/defender-for-cloud/secure-container-image':1912 'learn.microsoft.com/en-us/azure/defender-for-cloud/security-baseline-guest-configuration':2633 'learn.microsoft.com/en-us/azure/defender-for-cloud/security-policy-concept':1922 'learn.microsoft.com/en-us/azure/defender-for-cloud/sensitive-info-types':2642 'learn.microsoft.com/en-us/azure/defender-for-cloud/sentinel-connected-aws':661 'learn.microsoft.com/en-us/azure/defender-for-cloud/simulate-alerts-sql-machines':1932 'learn.microsoft.com/en-us/azure/defender-for-cloud/sql-azure-vulnerability-assessment-enable':2655 'learn.microsoft.com/en-us/azure/defender-for-cloud/sql-azure-vulnerability-assessment-enable-classic':2666 'learn.microsoft.com/en-us/azure/defender-for-cloud/sql-azure-vulnerability-assessment-find':1942 'learn.microsoft.com/en-us/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview':1952 'learn.microsoft.com/en-us/azure/defender-for-cloud/sql-azure-vulnerability-assessment-rules':1961 'learn.microsoft.com/en-us/azure/defender-for-cloud/sql-azure-vulnerability-assessment-rules-changelog':1970 'learn.microsoft.com/en-us/azure/defender-for-cloud/subassessment-rest-api':2976 'learn.microsoft.com/en-us/azure/defender-for-cloud/support-matrix-defender-for-cloud':3202 'learn.microsoft.com/en-us/azure/defender-for-cloud/support-matrix-defender-for-containers':3212 'learn.microsoft.com/en-us/azure/defender-for-cloud/support-matrix-defender-for-servers':3224 'learn.microsoft.com/en-us/azure/defender-for-cloud/support-matrix-defender-for-storage':1980 'learn.microsoft.com/en-us/azure/defender-for-cloud/tenant-wide-permissions-management':1992 'learn.microsoft.com/en-us/azure/defender-for-cloud/test-agentless-malware-scanning':2676 'learn.microsoft.com/en-us/azure/defender-for-cloud/transition-grouped-individual-recommendations':1081 'learn.microsoft.com/en-us/azure/defender-for-cloud/troubleshoot-connectors':673 'learn.microsoft.com/en-us/azure/defender-for-cloud/troubleshoot-sql-machines-guide':683 'learn.microsoft.com/en-us/azure/defender-for-cloud/troubleshoot-sql-machines-guide-gov':694 'learn.microsoft.com/en-us/azure/defender-for-cloud/troubleshoot-vulnerability-findings':704 'learn.microsoft.com/en-us/azure/defender-for-cloud/troubleshooting-guide':714 'learn.microsoft.com/en-us/azure/defender-for-cloud/troubleshooting-runtime-gated':723 'learn.microsoft.com/en-us/azure/defender-for-cloud/tutorial-enable-storage-plan':3234 'learn.microsoft.com/en-us/azure/defender-for-cloud/understand-malware-scan-results':736 'learn.microsoft.com/en-us/azure/defender-for-cloud/update-sql-machine-configuration':2688 'learn.microsoft.com/en-us/azure/defender-for-cloud/verify-machine-protection':3246 'learn.microsoft.com/en-us/azure/defender-for-cloud/view-and-remediate-vulnerabilities-containers':880 'learn.microsoft.com/en-us/azure/defender-for-cloud/view-and-remediate-vulnerabilities-for-images-secure-score':890 'learn.microsoft.com/en-us/azure/defender-for-cloud/view-and-remediate-vulnerability-assessment-findings-secure-score':900 'learn.microsoft.com/en-us/azure/defender-for-cloud/view-and-remediate-vulnerability-registry-images':909 'legaci':2946 'lighthous':2211 'limit':23,62,321,326,345,1149,1168,1195,1207 'line':103,115,216 'link':120,129,401,2084,2135 'linux':1357 'local':73 'locat':97 'log':426,1030,1042,2885,2907 'machin':681,691,840,849,1095,1581,1931,2389,2414,2437,2687,3081,3152,3243 'make':19,58,267,913 'malwar':596,733,1091,1424,1695,2000,2343,2671 'malware/vuln':236,308 'manag':443,550,1392,1463,1490,1501,1737,1983,2208,2256,2358,2430,2546,2558 'markdown':196,212 'matrix':3206,3217 'mcp':155,182 'mcsb':757,2547 'mend.io':2751 'metadata.generated':136 'microsoft':184,534,709,1140,1553,1632,2081,2093,2104,2525,2538,3175,3228 'microsoftdoc':156,183 'migrat':992,3065,3181 'migration/transition':286 'misconfigur':253,754,803,2535 'model':1231 'modifi':2139 'modul':2494 'monitor':1521,2064,2191,2502,3176,3184 'month':142 'multi':424 'multi-cloud':423 'navig':1375 'network':174,823,1291,1868 'new':987,999 'node':600,611 'notif':2120 'offboard':2259 'old':143 'on-upload':1692 'onboard':389,657,2257,2307,2579,2917 'open':1369,1609,1621 'open-sourc':1368,1608,1620 'optim':1049 'option':922,976 'os':753 'partner':2837 'patch':790 'path':287,2710 'pattern':22,29,61,68,296,408,1086,2693 'permiss':357,1508,1656,1709,1729,1975,1987 'person':1743 'pipelin':2725,2989 'plan':275,279,447,955,988,1000,1021,1025,1037,1068,1073,1128,2145 'plane':1686 'plus':427 'polici':390,461,1425,1917,2166,2460,2561,2570,2626,3113 'portal':281,341,458,931,1171,3000,3041,3093 'postur':405,778,2076,2230 'power':2702 'powershel':2482,2492,2584,2588,2599,3123 'practic':17,56,242,247,740 'pre':1056 'pre-purchas':1055 'prefer':180 'prerequisit':329,1180,1973,2072,2268 'preview':342,1172 'price':280 'priorit':873 'privat':400,2083,2126,2134 'problem':232 'programmat':2277,2813,3004,3045 'protect':365,1268,1879,2043,3173,3244 'provid':45 'pub/sub':2913 'pull':147,863,2420 'purchas':1057 'purview':1671 'qradar':2876 'queri':188,202,2609,2707,2733,2961 'querying/exporting':428 'quick':75 'quick-refer':74 'quota':24,63,322,327,1150,1162 'rang':104 'rbac':1468,1712 'rbac/ciem':368 'read':110,125 'recommend':755,791,804,824,1080,1754,1764,1773,1787,1797,1807,1817,1827,1835,1849,1860,1870,1880,1891,2200,2452 'refer':76,130,240,555,590,1381,1955,2474,2484,2495,2636 'region':283,1066 'registri':263,894,904,2310 'relev':98 'remedi':251,565,786,808,830,839,848,893,903,1666,1937,2344 'remot':79 'remov':3014,3024,3055 'repositori':153 'request':864,2421 'requir':173,1509,3219 'resid':314,1133 'resolv':575,616,640,652 'resourc':549,1391,2449,2871,2959 'respond':482,532,545 'respons':812 'rest':2777,3132 'restrict':631 'result':735,765,2830 'retir':1033,1045,1217 'return':195,211 'review':464,752,762,859,1176,1811,1935,2071,3215 'right':1017 'risk':257 'role':1707,1727 'rule':1597,1662,1960,1969,2219,2787 'run':2957 'runtim':1421 'sbom':2610 'scale':319,1139,2168,2459,3154 'scan':307,392,436,619,648,734,764,921,1092,1696,2001,2012,2252,2354,2386,2440,2536,2672,2807,2829 'scanner':1576 'schema':2056 'scope':1178,1465 'score':889,899 'script':2589,2600 'secret':254,833,841 'section':99 'secur':25,34,64,351,355,372,404,429,538,768,775,860,888,898,1103,1183,1221,1232,1379,1537,1542,1568,1753,1763,1772,1786,1796,1806,1816,1826,1848,1859,1869,1895,1916,2075,2082,2094,2105,2133,2197,2229,2251,2422,2519,2526,2539,2548,2618,2731,2839,2920,2928,2947 'security.md':122,123 'select':949 'sensit':1524,1673,2240,2396,2637 'sensor':3141 'sentinel':654 'sentinel-connect':653 'server':289,456,855,919,1020,1112,1121,1131,1143,1156,1579,1733,2142,2223,2685,3079,3171,3223,3241 'serverless':1878 'servers/containers':305 'servic':643,1244,1777,2047,3199 'servicenow':2760,2783,2794 'set':2124,2146,2241,2291,2301,2322,2340,2602,2623,2769 'share':632 'siem':418,2864 'sign':1905 'simul':1925 'skill':42,44,87,172,194,208 'skill-azure-defender-for-cloud' 'solut':2948 'sourc':1370,1610,1622 'source-microsoftdocs' 'specif':2363 'specifi':114 'spend':1053 'splunk':2878 'sql':373,395,451,679,689,701,1402,1491,1502,1567,1578,1928,1938,1949,1957,1966,2467,2478,2488,2592,2603,2646,2652,2659,2684,2828,3068,3078,3150,3170,3240 'stackhawk':2936 'standard':2198,2549 'status':3245 'still':3172 'storag':291,374,396,452,732,984,996,1303,1588,1699,1979,2005,2333,2348,2401,2664,3090,3100,3110,3120,3130,3231 'stream':2858 'string':189,203 'subassess':2972 'suggest':144,161 'support':1177,3205,3216 'support/regions':465 'synaps':1404,2654 'sync':2793 'system':787 'templat':2336,3103 'tenant':1985,2207 'tenant-wid':1984 'test':2669,2840,2937 'text/markdown':210 'threat':1589,2042,2398 'ticket':433,2784,2795 'time':2409 'tool':157,2865 'topic':467,741,914,1087,1151,1222,1996,2694,2980 'topic-agent' 'topic-agent-skills' 'topic-agentic-skills' 'topic-agentskill' 'topic-ai-agents' 'topic-ai-coding' 'topic-azure' 'topic-azure-functions' 'topic-azure-kubernetes-service' 'topic-azure-openai' 'topic-azure-sql-database' 'topic-azure-storage' 'transit':1074 'trial':336,1206 'trigger':492 'troubleshoot':15,54,218,466,664,676,686,697,707,717 'type':2639 'understand':916,1099,1118,1166,1201,1211,1236,1248,1260,1272,1284,1296,1307,1319,1329,1341,1351,1362,1385,1396,1408,1440,1474,1530,1650 'unifi':1467 'updat':788,2679 'upload':1694 'url':468,742,915,1088,1152,1223,1997,2695,2981 'use':32,85,91,109,124,181,198,457,585,887,897,1004,1089,1153,1226,1486,1497,1573,1670,1748,1768,1801,1843,1853,1874,2051,2245,2565,2583,2616,2801,2836,2945,2969,3111,3131 'user':146,163,1741,2513 'va':1575,2379,2468,2479,2489,2593,2604 'valid':469,494 'validation/interpretation':230 'vault':1280,1858 'verifi':502,512,522,1907,3237 'version':150 'via':944,2132,2335,2560,2712,2776,2831,2912,2999,3040,3091,3142,3162 'virtual':1094,2388,2413 'vm':1314,2364,2971 'vms':36,376,1358,1415,2675 'vms/kubernetes':311 'vpc':642 'vulner':252,612,702,745,850,876,886,896,906,920,1006,1492,1503,1600,1909,1939,1950,1958,1967,2023,2033,2353,2357,2365,2429,2647,2660,2736,2975 'webpag':200 'wide':1986 'window':1414 'workspac':315,1135 'wrapper':2493","prices":[{"id":"b2847426-0ad6-45ca-830b-a66a97a3c417","listingId":"bbec10c3-566d-4e7c-91ef-01af8e206168","amountUsd":"0","unit":"free","nativeCurrency":null,"nativeAmount":null,"chain":null,"payTo":null,"paymentMethod":"skill-free","isPrimary":true,"details":{"org":"MicrosoftDocs","category":"Agent-Skills","install_from":"skills.sh"},"createdAt":"2026-04-18T21:58:50.702Z"}],"sources":[{"listingId":"bbec10c3-566d-4e7c-91ef-01af8e206168","source":"github","sourceId":"MicrosoftDocs/Agent-Skills/azure-defender-for-cloud","sourceUrl":"https://github.com/MicrosoftDocs/Agent-Skills/tree/main/skills/azure-defender-for-cloud","isPrimary":false,"firstSeenAt":"2026-04-18T21:58:50.702Z","lastSeenAt":"2026-04-22T06:53:31.376Z"}],"details":{"listingId":"bbec10c3-566d-4e7c-91ef-01af8e206168","quickStartSnippet":null,"exampleRequest":null,"exampleResponse":null,"schema":null,"openapiUrl":null,"agentsTxtUrl":null,"citations":[],"useCases":[],"bestFor":[],"notFor":[],"kindDetails":{"org":"MicrosoftDocs","slug":"azure-defender-for-cloud","github":{"repo":"MicrosoftDocs/Agent-Skills","stars":497,"topics":["agent","agent-skills","agentic-skills","agentskill","ai","ai-agents","ai-coding","azure","azure-functions","azure-kubernetes-service","azure-openai","azure-sql-database","azure-storage","azure-virtual-machine","claude-code","github-copilot","microsoft-learn","openai-codex","skills"],"license":"cc-by-4.0","html_url":"https://github.com/MicrosoftDocs/Agent-Skills","pushed_at":"2026-04-22T01:37:27Z","description":"Curated Agent Skills for Microsoft & Azure – giving AI coding assistants structured, real-time expertise from Microsoft Learn docs.","skill_md_sha":"cdc89f83d3517434d778f0b608c61e349623433f","skill_md_path":"skills/azure-defender-for-cloud/SKILL.md","default_branch":"main","skill_tree_url":"https://github.com/MicrosoftDocs/Agent-Skills/tree/main/skills/azure-defender-for-cloud"},"layout":"multi","source":"github","category":"Agent-Skills","frontmatter":{"name":"azure-defender-for-cloud","description":"Expert knowledge for Azure Defender For Cloud development including troubleshooting, best practices, decision making, architecture & design patterns, limits & quotas, security, configuration, integrations & coding patterns, and deployment. Use when securing Azure VMs, AKS/containers, SQL/storage, multi-cloud connectors, or Defender for DevOps APIs, and other Azure Defender For Cloud related development tasks. Not for Azure Defender For Iot (use azure-defender-for-iot), Azure DDos Protection (use azure-ddos-protection), Azure External Attack Surface Management (use azure-external-attack-surface-management), Azure Security (use azure-security).","compatibility":"Requires network access. Uses mcp_microsoftdocs:microsoft_docs_fetch or fetch_webpage to retrieve documentation."},"skills_sh_url":"https://skills.sh/MicrosoftDocs/Agent-Skills/azure-defender-for-cloud"},"updatedAt":"2026-04-22T06:53:31.376Z"}}