You are on page 1of 1

Free (Secure Score) 

CSPM - Free 
Recommendations 

Attack Path Analysis 

Cloud Security Explorer 

Agentless Scanning for machines 

CSPM - Cloud Security Posture Management CSPM - Paid  Governance & Compliance 

Agentless Container Posture (Preview) 

EASM insights in network exposure

Data-aware security posture (preview) 


Maps the entire internet to expose threat
actors and their infrastructure 2023 CSPM Leadership Compass -

Defender Threat Intelligence (MDTI)  KuppingerCole

Defender for Servers P1


Discover unknown and unmanaged resources Former RiskIQ Compare P1xP2 
that are visible and accessible from the internet Defender for Servers  Defender for Servers P2
(outside-in view) Defender External Attack Surface

Management (EASM)
FAQ 

Defender for App Services 


Augment your SOC team with leading end-to-
end protection, threat intelligence, and Defender for Azure SQL 
expertise. Microsoft Defender Experts for Hunting 
Defender for SQL servers 
MXDR - Give your SOC team coverage with
leading end-to-end protection and expertise. Defender for open-source relational
Microsoft Defender Defender for Databases  
databases
Defender Experts for XDR also includes the Services
proactive threat hunting offered by Defender Microsoft Defender Experts for XDR  Defender for Azure Cosmos DB 
Experts for Hunting
CWP - Cloud Workload Protection Defender for Storage  Malware Scanning add-on 

Note: Not a Defender brand but it's part of the Defender for Containers 
service and I am adding to the context here.
Microsoft Incident Response Retainer 
Defender for Key Vault 
App Governance  Microsoft Defender for Cloud Apps (MDA)  Defender for Resource Manager 
Add-on - Microsoft Defender Vulnerability As of August 1, customers with an existing

Management subscription to Defender for DNS can
continue to use the service, but new
MDE P1  Microsoft Defender for Endpoint (MDE)  Defender for DNS  subscribers will receive alerts about
Compare P1xP2  Microsoft Defender for suspicious DNS activity as part of Defender
MDE P2   for Servers P2.
Cloud (MDC)
Microsoft Defender for Identity (MDI)  Security Alerts  Security alerts - a reference guide 
Microsoft 365

Defender (XDR) Unify DevOps security management across
Compare P1xP2 
MDO P1
Microsoft Defender for Office (MDO)  MICROSOFT Defender for DevOps 
multiple pipeline environments
MDO P2
DEFENDER Defender for APIs (Preview) 
Secure Score 
Automation 
Automatic Attack disruption 
Workbooks 

Overview  Microsoft Cloud Security benchmark 

Architecture  Other Features & Integrations Azure Policies integration 

OT sensor cloud connection  SIEM integration 

Enterprise IoT Network Security  Defender for IoT 


External Attack Surface Management 

Defender for IOT Solution for Microsoft Entra Permissions Management 



Sentinel
Azure 
M365 Defender 
AWS 
Defender for IoT  Multi-Cloud Protection
GCP 
Defender for Cloud 
Non-Azure VMs (Arc) 
Defender for Identity 
Pricing 
Defender for Endpoint  Defender Ninja Trainings
How to Effectively Perform a MDC PoC 
Defender for Office 365 
Labs 
Defender for Cloud Apps 
MDC, a Cloud-Native Application Protection
CNAPP Security 
Defender Threat Intelligence  Platform (CNAPP) - Blog Post

Defender EASM 

Note: This mind map aims to be a tool for clarifying the Microsoft Defender product family. This is not
an official Microsoft document. Don't forget to click on the LINKS to access the contents.
Tiago Souza - https://cybergeeks.cloud Revision date: August, 2023

You might also like