Azure Security Center Readiness Roadmap

This document provides you a readiness roadmap that will assist you to get started with Azure Security Center.

Understanding Security Center

Azure Security Center provides unified security management and advanced threat protection for workloads running in Azure, on-premises, and in other clouds.

Use the following resources to get started with Security Center.

Articles

Videos

Planning and operations

To take full advantage of Security Center, it is important to understand how different individuals or teams in your organization use the service to meet secure operations, monitoring, governance, and incident response needs.

Use the following resources to assist you during the planning and operations processes.

Article

Video

Onboarding computers to Security Center

Security Center automatically detects any Azure subscriptions or workspaces not enabled for Security Center Standard. This includes Azure subscriptions using Security Center Free and workspaces that do not have the Security solution enabled.

Use the following resources to assist you during the onboarding processes.

Article

Video

Mitigating security issues using Security Center

Security Center automatically collects, analyzes, and integrates log data from your Azure resources, the network, and connected partner solutions, like firewall and endpoint protection solutions, to detect real threats and reduce false positives.

Use the following resources to assist you to manage security alerts and protect your resources.

Articles

Video

Security Center for incident response

To reduce costs and damage, it’s important to have an incident response plan in place before an attack takes place. You can use Azure Security Center in different stages of an incident response.

Use the following resources to understand how Security Center can be incorporated in your incident response process.

Videos

Articles

Advanced cloud defense

Azure VMs can take advantage of advanced cloud defense capabilities in Security Center. These capabilities include just in time virtual machine (VM) access, and adaptive application controls.

Use the following resources to learn how to use these capabilities in Security Center.

Video

Articles

Hands-on activities

Additional resources

Community Resources