Content Directory
Hyperlinks to each of the lab exercises and demos are listed below.
Labs
| Module | Lab |
|---|---|
| Module 02 - Enable Defender for Cloud on Your Azure Subscription | Exercise 01 - Configuring Microsoft Defender for Cloud Enhanced Security Features for Servers |
| Module 03 - Filter network traffic with a network security group using the Azure portal | Exercise 02 - Create a virtual network infrastructure |
| Module 04 - Create a Log Analytics workspace | Exercise 03 - Create a Log Analytics workspace |
| Module 05 - In this lab you will collect guest operating system monitoring data from Azure and hybrid virtual machines using Azure Monitor Agent. You use Data Collection Rules (DCRs) to specify the data to be collected, while the Azure Monitor Agent applies these rules to gather logs and metrics from virtual machines in Azure, other clouds, or on-premises. | Exercise 04 - Create a data collection rule and install the Azure Monitor Agent |
| Module 06 - Explore just-in-time VM access | Exercise 05 - Enable just-in-time access on VMs |
| Module 07 - Configure Azure Key Vault networking settings | Exercise 06a - Configure Azure Key Vault networking settings |
| Module 07 - Configure Azure Key Vault networking settings | Exercise 06b - Enable soft delete in Azure Key Vault |
| Module 08 - Connect to an Azure SQL server using an Azure Private Endpoint using the Azure portal | Exercise 07 - Connect to an Azure SQL server using an Azure Private Endpoint using the Azure portal |