Skip to main content

This browser is no longer supported.

Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.

Download Microsoft Edge More info about Internet Explorer and Microsoft Edge
Learn
Suggestions will filter as you type
Learn
  • Training
  • Credentials
  • Support
  • Shows
Suggestions will filter as you type
Read in English
Read in English Edit

Azure security fundamentals documentation

Learn how to secure your cloud solutions on Azure with our best practices and guidance.

About Azure security

Overview

  • Introduction to Azure security
  • Security technical capabilities

Concept

  • How Microsoft secures the Azure infrastructure

Get started

Overview

  • Shared responsibility in the cloud
  • Security services and technologies
  • Built-in security controls

Mitigate threats

Overview

  • Microsoft Defender for Cloud

Concept

  • Management and monitoring
  • Threat protection
  • Recover from identity compromise

Best practices for securing your cloud solutions

Concept

  • Network security
  • IaaS workloads
  • Identity management and access control
  • PaaS deployments
  • Data security and encryption
  • Operational security

Protect your Azure resources

Concept

  • Encryption at rest
  • Data protection
  • Network security
  • Virtual machines security
  • Identity management security

Training

  • Secure your cloud applications

Build your security skills

Training

  • Implement network security
  • Manage identity and access
  • Implement resource management security
  • Implement virtual machine host security
English (United States)
Your Privacy Choices
  • SH ICP Filing No. 13015306-25
  • PSB Filing No. 31011502002224
  • Privacy
  • Microsoft Azure Operated by 21Vianet
  • © Microsoft 2025
English (United States)
Your Privacy Choices
  • SH ICP Filing No. 13015306-25
  • PSB Filing No. 31011502002224
  • Privacy
  • Microsoft Azure Operated by 21Vianet
  • © Microsoft 2025