Why Threat Protection & Compliance Monitoring Matter
Even with strong identity, network, and encryption controls, continuous monitoring and rapid response are critical. Azure provides Defender for Cloud for proactive security posture management and Microsoft Sentinel for advanced threat detection and incident response.
These services are heavily scenario-tested in AZ-305 to check if you can design end-to-end security monitoring and governance solutions.
1. Microsoft Defender for Cloud
Definition:
A Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP) service.
Key Features:
-
Secure Score → quantifies security posture.
-
Regulatory compliance dashboard → maps controls to standards like ISO, PCI DSS, HIPAA.
-
Defender plans → enable advanced protection for VMs, SQL, Storage, Key Vault, Kubernetes, etc.
-
Adaptive Application Controls → whitelist apps.
-
Just-In-Time (JIT) VM Access → reduce attack surface.
Use Cases:
-
Ongoing compliance monitoring.
-
Detecting insecure configurations.
-
Hardening resources proactively.
2. Microsoft Sentinel
Definition:
A cloud-native SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation & Response) platform.
Key Features:
-
Collect logs from Azure, on-prem, and multi-cloud (via connectors).
-
Use KQL (Kusto Query Language) for threat hunting.
-
Built-in AI/ML for anomaly detection.
-
Playbooks (Logic Apps) for automated response.
-
Integrates with Defender for Cloud for unified alerts.
Use Cases:
-
Detecting insider threats and advanced persistent threats (APTs).
-
Correlating signals from multiple sources.
-
Automating incident response (e.g., disable compromised user).
3. Defender + Sentinel Together
-
Defender = proactive hardening + workload protection.
-
Sentinel = monitoring, correlation, response.
-
Together → end-to-end defense (prevent + detect + respond).
Analogy:
-
Defender = Security guard checking locks.
-
Sentinel = Security camera + alarm system.
4. Example Enterprise Scenario
A government agency requires:
-
Continuous compliance monitoring against NIST.
-
Alerts when SQL DBs or Storage Accounts are exposed publicly.
-
Central monitoring across hybrid + multi-cloud.
-
Automated response to disable compromised accounts.
Correct design:
-
Use Defender for Cloud → regulatory compliance dashboard, secure score, hardening.
-
Use Sentinel → collect logs from Azure, on-prem, AWS, GCP.
-
Configure Sentinel Playbooks → auto-disable compromised users, send alerts.
5. Confusion Buster
-
Defender for Cloud vs Sentinel
-
Defender = posture management + workload protection.
-
Sentinel = SIEM + threat detection/response.
-
-
Secure Score vs Compliance Dashboard
-
Secure Score = overall posture metric.
-
Compliance Dashboard = maps to standards (PCI, HIPAA, ISO).
-
-
SIEM vs SOAR in Sentinel
-
SIEM = collects + analyzes logs.
-
SOAR = automates responses (via playbooks).
-
6. Exam Tips
-
“Which service provides Secure Score and regulatory compliance dashboard?” → Defender for Cloud.
-
“Which Azure service is a cloud-native SIEM?” → Microsoft Sentinel.
-
“Which Sentinel feature allows automated response?” → Playbooks (SOAR).
-
“Which Defender feature allows controlling VM access time-bound?” → Just-In-Time VM access.
7. What to Expect in the Exam
-
Direct Q: “Which service continuously monitors Azure workloads for compliance?” → Defender for Cloud.
-
Scenario Q: “Company wants central SIEM across Azure + AWS + on-prem.” → Sentinel.
-
Scenario Q: “Finance org requires PCI DSS compliance mapping.” → Defender for Cloud.
-
Scenario Q: “Enterprise must auto-disable risky user accounts on detection.” → Sentinel Playbook.
-
Trick Q: “Sentinel provides regulatory compliance dashboards.” → False (that’s Defender).