01 configure and manage host security 01 host security as part of your defense strategy.en.txt
01 host security as part of your defense strategy
02 enable endpoint protection.en.txt
02 enable endpoint protection
03 define a privileged access device strategy.en.txt
03 define a privileged access device strategy
04 deploy privileged access workstations.en.txt
04 deploy privileged access workstations
05 create virtual machine templates.en.txt
05 create virtual machine templates
06 enable and secure remote access management.en.txt
06 enable and secure remote access management
07 configure update management.en.txt
07 configure update management
08 scheduled updates instructions.html
09 deploy disk encryption.en.txt
09 deploy disk encryption
10 deploy and configure windows defender.en.txt
10 deploy and configure windows defender
11 explore microsoft defender for cloud recommendations
13 exercise virtual machine updates instructions.html
14 solution virtual machine updates instructions.html
02 configure and manage container security 01 what is a container.en.txt
01 what is a container
02 configure azure container instances security.en.txt
02 configure azure container instances security
04 explore the azure container registry acr.en.txt
04 explore the azure container registry acr
05 enable azure container registry authentication
08 overview of serverless compute.en.txt
08 overview of serverless compute
09 security for serverless compute instructions.html
10 overview azure app service.en.txt
10 overview azure app service
11 security for azure app service instructions.html