Acknowledgments
About the authors
Foreword
Introduction
CHAPTER 1 The threat landscape
CHAPTER 2 Planning Microsoft Defender for Cloud adoption
CHAPTER 3 Onboarding Microsoft Defender for Cloud
CHAPTER 4 Policy management
CHAPTER 5 Strengthening your security posture
CHAPTER 6 Threat detection
CHAPTER 7 Better together
CHAPTER 8 Enhanced security capabilities
CHAPTER 9 Accessing Defender for Cloud from APIs
CHAPTER 10 Deploying Microsoft Defender for Cloud at scale
APPENDIX Microsoft Defender for DevOps
Index
3.141.37.212