{"id":595,"date":"2022-08-18T14:00:02","date_gmt":"2022-08-18T14:00:02","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/?p=595"},"modified":"2025-06-24T20:52:36","modified_gmt":"2025-06-25T04:52:36","slug":"defend-product-infrastructure-security","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/","title":{"rendered":"How to defend your product infrastructure against malicious attacks"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\"><em>This is part three of a three-part series on product infrastructure security.<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><em>Part 1: <a href=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/assess-product-infrastructure-security\/\" target=\"_blank\" rel=\"noopener\">How to assess your product infrastructure security<\/a><\/em><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><em>Part 2: <a href=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/secure-product-infrastructure-security\/\" target=\"_blank\" rel=\"noopener\">How to secure your product infrastructure security<\/a><\/em><\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">The attack vectors in the cloud are constantly evolving. These attacks frequently use unpatched vulnerabilities and insecure configurations to gain access to your systems. Quick and effective detection and proactive remediation is the key.&nbsp; As a startup building your business in the cloud, becoming the target of a malicious attack can set you back from your peers. <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/defender-for-cloud\/\" target=\"_blank\" rel=\"noopener\">Microsoft Defender for Cloud<\/a> has built in controls and integrated tools that can protect you from such predicaments.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In this blog series, we started off by <a href=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/assess-product-infrastructure-security\/\" target=\"_blank\" rel=\"noopener\">discussing the relevance of security posture management and how to get started with the service<\/a>. In the second part, we looked at the steps to <a href=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/secure-product-infrastructure-security\/\" target=\"_blank\" rel=\"noopener\">get started with some of the key features of Microsoft Defender for Cloud<\/a> that will help you get started with the service. In the concluding part of this series, we will deep dive further into the capabilities of Microsoft Defender for Cloud that will help protect your environment from malicious attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Assess security posture through secure score<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">For startups working in highly regulated industry verticals, ensuring compliance can involve extensive efforts. The option to download a certificate demonstrating how secure your infrastructure and services are will help make this process go more smoothly. The secure score provided by Microsoft Defender for Cloud based on leading compliance standards puts forth the easiest solution for this.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is Microsoft Secure Score?<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">The security status of your deployments is continuously assessed by Microsoft Defender for Cloud and the outcomes are quantified as a secure score. The secure score is displayed as a percentage, and the service also displays the security findings that contribute to the score.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The Secure score can be viewed from Microsoft Defender for Cloud &gt; Security posture. The security posture of different connected environments can also be viewed from here:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"3300\" height=\"1504\" src=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-01.png\" alt=\"defend 01\" class=\"wp-image-648\" srcset=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-01.png 3300w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-01-300x137.png 300w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-01-1024x467.png 1024w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-01-768x350.png 768w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-01-1536x700.png 1536w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-01-2048x933.png 2048w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-01-1920x875.png 1920w\" sizes=\"auto, (max-width: 3300px) 100vw, 3300px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Click on Recommendations to see the controls and recommendations for each environment. The view also shows the maximum score for each control, the current score and potential score increase that is possible by remediating the findings.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"630\" height=\"127\" src=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-02.png\" alt=\"defend 02\" class=\"wp-image-649\" srcset=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-02.png 630w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-02-300x60.png 300w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">You can expand the security control to see the recommendations associated with it. For example, shown below are the recommendations associated with the control \u201cSecure management ports.\u201d This control provides guidance on securing the management ports associated with your resources. If left unprotected, these ports can be targeted by brute force attacks to gain access to the environment.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"84\" src=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-03.png\" alt=\"defend 03\" class=\"wp-image-650\" srcset=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-03.png 624w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-03-300x40.png 300w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Max score<\/strong>: If all findings are remediated, the maximum possible score will be 8. The score is associated with a control based on its relevance to the respective environment. The recommendations associated with the control having the highest score should be prioritized first.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Current Score<\/strong>:&nbsp;It shows the current score based on the number of resources that are already in line with the recommendations.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Potential score increase<\/strong>: This section shows the percentage by which the score can be increased by remediating the recommendations.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Insights<\/strong>: It gives you additional information about the respective recommendations. The guidance provided can be used to fix the findings. You can also set up policies that will either rectify the problem if someone creates a non-compliant resource or altogether prevent the creation of resources with this issue.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Secure score calculation<\/strong>: The score associated with a single security control is calculated using the following formula<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"542\" height=\"44\" src=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-04.png\" alt=\"defend 04\" class=\"wp-image-651\" srcset=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-04.png 542w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-04-300x24.png 300w\" sizes=\"auto, (max-width: 542px) 100vw, 542px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">The score associated with each control rolls ups to provide the secure score of the Azure subscription or other connected cloud environment using the below formula:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"628\" height=\"45\" src=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-05.png\" alt=\"defend 5\" class=\"wp-image-652\" srcset=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-05.png 628w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-05-300x21.png 300w\" sizes=\"auto, (max-width: 628px) 100vw, 628px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">When there are multiple subscriptions or connected AWS\/GCP environments the overall security posture is calculated using the following formula<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"628\" height=\"47\" src=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-06.png\" alt=\"defend 06\" class=\"wp-image-653\" srcset=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-06.png 628w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-06-300x22.png 300w\" sizes=\"auto, (max-width: 628px) 100vw, 628px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Note that Microsoft Defender for Cloud assigns a weight to each environment depending on parameters such as the number of resources in that environment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Resolve threats and improve secure score<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Defender for Cloud protects your subscriptions by implementing security initiatives. One or more security policies are included in these initiatives. Each of these policies yields a security recommendation for strengthening your posture.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Security policy<\/strong>: Azure policies help implement subscription wide restrictions like usage of tags, naming convention, allowed regions. A security Policy uses the same constructs to create a set of rules for controlling certain security configurations. Defender for Cloud policies can either be \u201cAudit\u201d or \u201cEnforce\u201d policies. &#8216;Audit&#8217; policies, inspect and report on certain security configurations. &#8220;Enforce&#8221; policies on the other hand that can be used to enforce secure settings.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Security initiative<\/strong>: A Microsoft Defender for Cloud security policy initiative is created in Azure policy and is a collection of security policies groups for a specific purpose. <a href=\"https:\/\/docs.microsoft.com\/en-us\/security\/benchmark\/azure\/\" target=\"_blank\" rel=\"noopener\">Azure Security Benchmark<\/a> is the default initiative assigned by Microsoft Defender for Cloud for all subscriptions. It is built based on industry standard controls derived from National Institute of Standards and Technology (NIST) and Center for Internet Security (CIS). In addition to this, you can also create initiatives based on industry compliance standards.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Security recommendation<\/strong>:&nbsp;Depending on the security initiative and the policies included in it, Microsoft Defender for Cloud continuously analyzes your target environment and provides security recommendations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Review recommendations<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Let\u2019s take a closer look at one of the security recommendations, \u201cManagement ports should be closed on your virtual machines.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If you click on the recommendation, you can see additional information, including. severity, description of the recommendation, remediation steps, affected resources, etc.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"758\" src=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-07.png\" alt=\"defend 07\" class=\"wp-image-654\" srcset=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-07.png 936w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-07-300x243.png 300w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-07-768x622.png 768w\" sizes=\"auto, (max-width: 936px) 100vw, 936px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">View policy definition<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">You can click on \u201cView policy definition\u201d to see details of the policy associated with the recommendation.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"630\" height=\"326\" src=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-08.png\" alt=\"defend 08\" class=\"wp-image-655\" srcset=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-08.png 630w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-08-300x155.png 300w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Severity<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">This defines the severity of the recommendation, that helps with prioritization of the recommendation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Freshness<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Gives insights on when the recommendation was issued.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Tactics and Techniques<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">This provides additional information on MITRE ATT&amp;CK tactics and techniques related to the recommendation. You can click on the link to get additional information.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"630\" height=\"310\" src=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-09.png\" alt=\"defend 09\" class=\"wp-image-656\" srcset=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-09.png 630w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-09-300x148.png 300w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Description<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Explains why the control is important and how it can be exploited to attack your environment.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Remediation steps<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Provides step by step guidance on how to implement the recommendation. For example, the remediation steps in this case are as follows:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><em>Manual remediation<\/em><\/h4>\n\n\n\n<p class=\"wp-block-paragraph\"><em>We recommend that you edit the inbound rules of some of your virtual machines, to restrict access to specific source ranges.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>To restrict access to your virtual machines:<\/em><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><em>Select a VM to restrict access to.<\/em><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><em>In the &#8216;Networking&#8217; blade, click on each of the rules that allow management ports (for example, RDP-3389, WINRM-5985, SSH-22).<\/em><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><em>Either change the &#8216;Action&#8217; property to &#8216;Deny\u2019 or improve the rule by applying a less permissive range of source IP ranges.<\/em><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><em>Click &#8216;Save&#8217;.<\/em><\/li>\n<\/ol>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Use Microsoft Defender for Cloud&#8217;s Just-in-time (JIT) virtual machine (VM) access to lock down inbound traffic to your Azure VMs by demand. Learn more in <a href=\"https:\/\/docs.microsoft.com\/azure\/defender-for-cloud\/just-in-time-access-overview?wt.mc_id=defenderforcloud_inproduct_portal_recoremediation\" target=\"_blank\" rel=\"noopener\">Understanding just-in-time (JIT) VM access<\/a>.<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Affected resources<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Here the resources for which the recommendation is applicable are listed. They are segregated as follows:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Unhealthy resources<\/strong>: Shows the resources where the issue needs to be remediated<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Healthy resources<\/strong>: Shows resources where the issue is already remediated or those not impacted by the issue<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Not-applicable resources<\/strong>: Some resources cannot be evaluated against&nbsp; the recommendation and are marked as \u201cnot applicable resources\u201d. This could be because of corrupted VM extensions, lack of scanner, etc. The reason why the evaluation is not done will also be listed<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Action<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">You can select one of the affected resources and&nbsp; choose to remediate the action by Triggering a logic app or assign the owner to take action . You can also choose to Exempt the resource from this recommendation by selecting the \u201c Exempt\u201d option wherever applicable to align with organizational security standards.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Fix recommendations<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Defender for Cloud can fix some of the recommendations directly from the console. Let\u2019s explore how to do that for the recommendation \u201cMachines should have a vulnerability assessment solution.\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"716\" src=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-10.png\" alt=\"defend 10\" class=\"wp-image-657\" srcset=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-10.png 936w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-10-300x229.png 300w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-10-768x587.png 768w\" sizes=\"auto, (max-width: 936px) 100vw, 936px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Quick fix logic<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">You can click on this link to view the remediation logic\/script that will be used to fix the issue<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"499\" height=\"594\" src=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-11.png\" alt=\"defend 11\" class=\"wp-image-658\" srcset=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-11.png 499w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-11-252x300.png 252w\" sizes=\"auto, (max-width: 499px) 100vw, 499px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">To fix the issue select the unhealthy resource and click on \u201cFix\u201d. This is initiate process of deploying vulnerability management solution on the resource.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to investigate resource health<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Defender for Cloud provides a consolidated view of resource health and recommendations associated with it. You should have Resource Group contributor to view this, browse to Microsoft Defender for Cloud &gt; Inventory.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"630\" height=\"286\" src=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-12.png\" alt=\"defend 12\" class=\"wp-image-659\" srcset=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-12.png 630w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-12-300x136.png 300w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Click on a specific resource to view the resource health. You will get a view of recommendations, alerts and installed applications for that resource.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"295\" src=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-13.png\" alt=\"defend 13\" class=\"wp-image-660\" srcset=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-13.png 624w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-13-300x142.png 300w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Click any of the recommendations to take remedial action.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"630\" height=\"282\" src=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-14.png\" alt=\"defend 14\" class=\"wp-image-661\" srcset=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-14.png 630w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-14-300x134.png 300w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Click on \u201cTake Action\u201d or \u201cFix\u201d (for some recommendations) to implement the remediation steps as discussed in the earlier section<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">View and respond to security alerts<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Getting timely security alerts on detected attacks go a long way in preventing catastrophic events. Microsoft Defender for cloud uses advanced threat analytics and threat intelligence capabilities that can alert you about infiltration attempts and malicious activities in your environments. You can get a unified view of security threats detected in your environment, their severity and guidance on remediation steps once you have Microsoft Defender for cloud enhanced security features enabled.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To view detected security alerts, browse to Microsoft Defender for Cloud &gt; Security alerts.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"981\" height=\"715\" src=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-15.png\" alt=\"defend 15\" class=\"wp-image-662\" srcset=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-15.png 981w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-15-300x219.png 300w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-15-768x560.png 768w\" sizes=\"auto, (max-width: 981px) 100vw, 981px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">The alerts presented on this page are categorized as high, medium, low, or informational, depending on Microsoft Defender for Cloud&#8217;s level of confidence in the malicious intent behind the activity that triggered the alert. It helps you prioritize and take action on the alerts.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>High<\/strong>: Indicates a high probability of the resource being compromised by an attack and should be immediately prioritized for remediation.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Medium<\/strong>: Indicates a medium to high malicious intent detection, usually originating from anomaly-based detections or machine learning algorithms<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Low<\/strong>: These are low priority events that may or may not be related to an attack. Blocked attack attempts are also displayed as Low severity if it needs to be looked into<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Informational<\/strong>: These are events that are not malicious but should be investigated contextually to understand if it is related to any other threats.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Let\u2019s take a closer look at one of the alerts and understand how the remediation can be done:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"630\" height=\"221\" src=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-16.png\" alt=\"defend 16\" class=\"wp-image-663\" srcset=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-16.png 630w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-16-300x105.png 300w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Click on the alert to view additional information about the attack:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"630\" height=\"262\" src=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-17.png\" alt=\"defend 17\" class=\"wp-image-664\" srcset=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-17.png 630w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-17-300x125.png 300w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">It shows the following additional details:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Status of the activity. Detected alerts will be shown as \u201cactive\u201d until necessary action is taken, and it is marked as Dismissed manually<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Description. Give additional information about the attack. In this case it is a Failed SSH brute force attack<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Time at which the attack is detected<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Severity of the attack<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Kill chain intent assessment based on MITRE ATT&amp;CK metric<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Click on \u201cView full details\u201d for additional info. It gives granular information on the number of times the attack happened; account used for the failed attempts etc. It also provides granular information about geo and threat intelligence, for example, the geography, ASN, latitude, longitude, etc., from which the attack originated.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"630\" height=\"321\" src=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-18.png\" alt=\"defend 18\" class=\"wp-image-665\" srcset=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-18.png 630w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-18-300x153.png 300w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Click on \u201cNext: Take Action\u201d to view guidance on the remediation steps to be taken.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1035\" height=\"771\" src=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-19.png\" alt=\"defend 19\" class=\"wp-image-666\" srcset=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-19.png 1035w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-19-300x223.png 300w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-19-1024x763.png 1024w, https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/defend-19-768x572.png 768w\" sizes=\"auto, (max-width: 1035px) 100vw, 1035px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">You can view the logs generated around the time of events to identify correlated events by clicking on \u201cOpen logs.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The steps to mitigate the threat are listed under the section \u201cMitigate the threat.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Any hardening recommendations that can prevent such attacks in the future is listed under \u201cPrevent Future attacks.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If you want to trigger a logic app as response to the detection, it can be linked under \u201c Trigger Automated response.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If you identify that the alert was a false positive you can create a suppression rule from under the \u201cSuppress similar alerts\u201d section.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">You can configure email notifications to alert administrators of this security event from the \u201cConfigure email notification settings.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Summary<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Defender for Cloud helps protect your multi-cloud and hybrid environments from existing and emerging threats. Using advanced threat detection capabilities, analytics and machine learning algorithms, Microsoft Defender for Cloud can provide comprehensive security for your workloads.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In this three-part blog series, we explored all these topics to give you a head start on your cloud security posture management journey. Startups with minimal investment in security manpower can easily leverage the capabilities of Microsoft Defender for Cloud to secure your applications irrespective of the cloud platform it is hosted in. All the way from quantifying the security posture using secure score, providing actionable recommendations and alerts to intimate the right stakeholders, Microsoft Defender for Cloud has got you covered.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>To get started with&nbsp;<a href=\"https:\/\/foundershub.startups.microsoft.com\/blog\/signup\" target=\"_blank\" rel=\"noopener\">Microsoft for Startups Founders Hub, sign up today<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is part three of a three-part series on product infrastructure security. The attack vectors in the cloud are constantly evolving. These attacks frequently use unpatched vulnerabilities and insecure configurations to gain access to your systems. Quick and effective detection and proactive remediation is the key.<\/p>\n","protected":false},"author":7,"featured_media":823,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[591,593],"footnotes":""},"post_tag":[],"content-type":[],"job-role":[],"topic":[734],"coauthors":[473],"class_list":["post-595","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","topic-guidance-and-development"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to defend your product infrastructure against malicious attacks - Microsoft for Startups Blog<\/title>\n<meta name=\"description\" content=\"In the concluding part of this series, we dive further into how Microsoft Defender for Cloud helps protect your environment from malicious attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Part 3 of this essential series on product infrastructure security\" \/>\n<meta property=\"og:description\" content=\"Join Ilias Jennane, Microsoft for Startups CTO-in-residence, for the final part of this series on defending your product infrastructure security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft for Startups Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Microsoft4Startups\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-18T14:00:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-25T04:52:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/Defend-sharing.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Allison Rose\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Part 3 of this essential series on product infrastructure security\" \/>\n<meta name=\"twitter:description\" content=\"Join Ilias Jennane, Microsoft for Startups CTO-in-residence, for the final part of this series on defending your product infrastructure security.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/Defend-sharing.png\" \/>\n<meta name=\"twitter:creator\" content=\"@msft4startups\" \/>\n<meta name=\"twitter:site\" content=\"@msft4startups\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Allison Rose\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/author\/allison-rose\/\",\"@type\":\"Person\",\"@name\":\"Allison Rose\"}],\"headline\":\"How to defend your product infrastructure against malicious attacks\",\"datePublished\":\"2022-08-18T14:00:02+00:00\",\"dateModified\":\"2025-06-25T04:52:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/\"},\"wordCount\":2083,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2022\/09\/MS-Startups-Blog_Post-595_960x540.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/\",\"name\":\"How to defend your product infrastructure against malicious attacks - Microsoft for Startups Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2022\/09\/MS-Startups-Blog_Post-595_960x540.jpg\",\"datePublished\":\"2022-08-18T14:00:02+00:00\",\"dateModified\":\"2025-06-25T04:52:36+00:00\",\"description\":\"In the concluding part of this series, we dive further into how Microsoft Defender for Cloud helps protect your environment from malicious attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2022\/09\/MS-Startups-Blog_Post-595_960x540.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2022\/09\/MS-Startups-Blog_Post-595_960x540.jpg\",\"width\":960,\"height\":540,\"caption\":\"People working at computer workstations\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to defend your product infrastructure against malicious attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/\",\"name\":\"Microsoft for Startups Blog\",\"description\":\"Startup insight and inspiration\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/#organization\",\"name\":\"Microsoft for Startups Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2024\/11\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2024\/11\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft for Startups Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Microsoft4Startups\/\",\"https:\/\/x.com\/msft4startups\",\"https:\/\/www.linkedin.com\/company\/microsoftforstartups\/\",\"https:\/\/www.instagram.com\/microsoftforstartups\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/#\/schema\/person\/00d43ead2db2b633591820f98f2f774d\",\"name\":\"Allison Rose\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/8af354b87f8cc377ef5d23382adb7e00b1286700a00b12089a4b412f590ba851?s=96&d=microsoft&r=g55df77df06a03c9f6b2078546dda02c1\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8af354b87f8cc377ef5d23382adb7e00b1286700a00b12089a4b412f590ba851?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8af354b87f8cc377ef5d23382adb7e00b1286700a00b12089a4b412f590ba851?s=96&d=microsoft&r=g\",\"caption\":\"Allison Rose\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/author\/arose\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to defend your product infrastructure against malicious attacks - Microsoft for Startups Blog","description":"In the concluding part of this series, we dive further into how Microsoft Defender for Cloud helps protect your environment from malicious attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/","og_locale":"en_US","og_type":"article","og_title":"Part 3 of this essential series on product infrastructure security","og_description":"Join Ilias Jennane, Microsoft for Startups CTO-in-residence, for the final part of this series on defending your product infrastructure security.","og_url":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/","og_site_name":"Microsoft for Startups Blog","article_publisher":"https:\/\/www.facebook.com\/Microsoft4Startups\/","article_published_time":"2022-08-18T14:00:02+00:00","article_modified_time":"2025-06-25T04:52:36+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/Defend-sharing.png","type":"image\/png"}],"author":"Allison Rose","twitter_card":"summary_large_image","twitter_title":"Part 3 of this essential series on product infrastructure security","twitter_description":"Join Ilias Jennane, Microsoft for Startups CTO-in-residence, for the final part of this series on defending your product infrastructure security.","twitter_image":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2020\/08\/Defend-sharing.png","twitter_creator":"@msft4startups","twitter_site":"@msft4startups","twitter_misc":{"Written by":"Allison Rose","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/author\/allison-rose\/","@type":"Person","@name":"Allison Rose"}],"headline":"How to defend your product infrastructure against malicious attacks","datePublished":"2022-08-18T14:00:02+00:00","dateModified":"2025-06-25T04:52:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/"},"wordCount":2083,"commentCount":0,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2022\/09\/MS-Startups-Blog_Post-595_960x540.jpg","articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/","url":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/","name":"How to defend your product infrastructure against malicious attacks - Microsoft for Startups Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2022\/09\/MS-Startups-Blog_Post-595_960x540.jpg","datePublished":"2022-08-18T14:00:02+00:00","dateModified":"2025-06-25T04:52:36+00:00","description":"In the concluding part of this series, we dive further into how Microsoft Defender for Cloud helps protect your environment from malicious attacks.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2022\/09\/MS-Startups-Blog_Post-595_960x540.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2022\/09\/MS-Startups-Blog_Post-595_960x540.jpg","width":960,"height":540,"caption":"People working at computer workstations"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/defend-product-infrastructure-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/"},{"@type":"ListItem","position":2,"name":"How to defend your product infrastructure against malicious attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/","name":"Microsoft for Startups Blog","description":"Startup insight and inspiration","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/#organization","name":"Microsoft for Startups Blog","url":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2024\/11\/microsoft_logo.webp","contentUrl":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-content\/uploads\/2024\/11\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft for Startups Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Microsoft4Startups\/","https:\/\/x.com\/msft4startups","https:\/\/www.linkedin.com\/company\/microsoftforstartups\/","https:\/\/www.instagram.com\/microsoftforstartups\/"]},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/#\/schema\/person\/00d43ead2db2b633591820f98f2f774d","name":"Allison Rose","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8af354b87f8cc377ef5d23382adb7e00b1286700a00b12089a4b412f590ba851?s=96&d=microsoft&r=g55df77df06a03c9f6b2078546dda02c1","url":"https:\/\/secure.gravatar.com\/avatar\/8af354b87f8cc377ef5d23382adb7e00b1286700a00b12089a4b412f590ba851?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8af354b87f8cc377ef5d23382adb7e00b1286700a00b12089a4b412f590ba851?s=96&d=microsoft&r=g","caption":"Allison Rose"},"url":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/author\/arose\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-json\/wp\/v2\/posts\/595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-json\/wp\/v2\/comments?post=595"}],"version-history":[{"count":3,"href":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-json\/wp\/v2\/posts\/595\/revisions"}],"predecessor-version":[{"id":3201,"href":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-json\/wp\/v2\/posts\/595\/revisions\/3201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-json\/wp\/v2\/media\/823"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-json\/wp\/v2\/media?parent=595"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-json\/wp\/v2\/post_tag?post=595"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-json\/wp\/v2\/content-type?post=595"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-json\/wp\/v2\/job-role?post=595"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-json\/wp\/v2\/topic?post=595"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/startups\/blog\/wp-json\/wp\/v2\/coauthors?post=595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}