Microsoft Defender for Cloud Features
Management (3)
Dashboards and Reports
Access pre-built and custom reports and dashboards. This feature was mentioned in 45 Microsoft Defender for Cloud reviews.
Workflow Management
Creates new or streamlines existing workflows to better handle IT support tickets and service. This feature was mentioned in 45 Microsoft Defender for Cloud reviews.
Administration Console
Provides Administration tools/console that are easy to use and learn for routine maintenance tasks This feature was mentioned in 44 Microsoft Defender for Cloud reviews.
Operations (3)
Governance
Allows users to create, edit, and relinquish user access privileges. This feature was mentioned in 44 Microsoft Defender for Cloud reviews.
Logging and Reporting
Based on 44 Microsoft Defender for Cloud reviews. Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
API / Integrations
Based on 45 Microsoft Defender for Cloud reviews. Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Security Controls (4)
Anomaly Detection
Based on 45 Microsoft Defender for Cloud reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data Loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. 44 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Security Auditing
Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices. This feature was mentioned in 44 Microsoft Defender for Cloud reviews.
Cloud Gap Analytics
Based on 44 Microsoft Defender for Cloud reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Administration (10)
Risk Scoring
Based on 22 Microsoft Defender for Cloud reviews. Provides risk scoring for suspicious activity, vulnerabilities, and other threats.
Secrets Management
Provides tools for managing authentication credentials such as keys and passwords. This feature was mentioned in 21 Microsoft Defender for Cloud reviews.
Security Auditing
As reported in 22 Microsoft Defender for Cloud reviews. Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.
Configuration Management
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. This feature was mentioned in 22 Microsoft Defender for Cloud reviews.
Policy Enforcement
Allows administrators to set policies for security and data governance. 92 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Auditing
Based on 94 Microsoft Defender for Cloud reviews. Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices.
Workflow Management
Creates new or streamlines existing workflows to better handle IT support tickets and service. This feature was mentioned in 93 Microsoft Defender for Cloud reviews.
Security Automation
Based on 60 Microsoft Defender for Cloud reviews. Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Security Integration
As reported in 61 Microsoft Defender for Cloud reviews. Integrates additional security tools to automate security and incident response processes.
Multicloud Visibility
Allows users to track and control activity across cloud services and providers. This feature was mentioned in 60 Microsoft Defender for Cloud reviews.
Monitoring (7)
Continuous Image Assurance
Provides image verification features to establish container approval requirements and continuously monitor for policy violations to identify containers with known vulnerabilities, malware, and other threats. 20 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Behavior Monitoring
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators. 20 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Observability
As reported in 20 Microsoft Defender for Cloud reviews. Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.
Resource utilization
Optimizes resource allocation.
Real-time monitoring
Consistently monitors processes for applications and IT infrastructure to detect anomalies in real-time.
Performance baseline
Sets up standard performance baseline to compare live container activities.
API monitoring
Traces connections between different containerized environments and detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Protection (4)
Dynamic Image Scanning
Scans application and image source code for security flaws without executing it in a live environment 19 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Runtime Protection
Based on 21 Microsoft Defender for Cloud reviews. Monitors container activities and detects threats across containers, networks, and cloud service providers.
Workload Protection
Protects compute resources across a networks and cloud service providers. Serves as Firewall and prompts additional authentication for suspicious users. This feature was mentioned in 22 Microsoft Defender for Cloud reviews.
Network Segmentation
Allows administrative control over network components, mapping, and segmentation. This feature was mentioned in 21 Microsoft Defender for Cloud reviews.
Security (10)
Compliance Monitoring
Based on 97 Microsoft Defender for Cloud reviews. Monitors data quality and sends alerts based on violations or misuse.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. 97 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Data Loss Prevention
As reported in 95 Microsoft Defender for Cloud reviews. Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. 95 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Compliance Monitoring
Based on 62 Microsoft Defender for Cloud reviews. Monitors data quality and send alerts based on violations or misuse.
Risk Analysis
Based on 60 Microsoft Defender for Cloud reviews. Identifies potential network security risks, vulnerabilities, and compliance impacts.
Reporting
Creates reports outlining log activity and relevant metrics. 62 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
False Positives
Does not falsely indicate vulnerable code when no vulnerabilitiy legitimately exists. 15 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Custom Compliance
Based on 17 Microsoft Defender for Cloud reviews. Allows users to set custom code standards to meet specific compliances.
Agility
Detects vulnerabilities at a rate suitable to maintain security, or allows collaborators to do the same. This feature was mentioned in 15 Microsoft Defender for Cloud reviews.
Compliance (3)
Governance
Allows users to create, edit, and relinquish user access privileges. 97 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Data Governance
Ensures user access management, data lineage, and data encryption. 93 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Sensitive Data Compliance
Based on 94 Microsoft Defender for Cloud reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Functionality - Software Composition Analysis (3)
Language Support
As reported in 12 Microsoft Defender for Cloud reviews. Supports a useful and wide variety of programming languages.
Integration
Integrates seamlessly with the build environment and development tools like repositories, package managers, etc. 12 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Transparency
Based on 12 Microsoft Defender for Cloud reviews. Grants comprehensive user-friendly insight into all open source components.
Effectiveness - Software Composition Analysis (3)
Remediation Suggestions
Provides relevant and helpful suggestions for vulnerability remediation upon detection. This feature was mentioned in 12 Microsoft Defender for Cloud reviews.
Continuous Monitoring
Monitors open source components proactively and continuously. 12 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Thorough Detection
Comprehensively identifies all open source version updates, vulnerabilities, and compliance issues. This feature was mentioned in 12 Microsoft Defender for Cloud reviews.
Activity Monitoring (4)
Usage Monitoring
Based on 63 Microsoft Defender for Cloud reviews. Tracks infrastructure resource needs and alerts administrators or automatically scales usage to minimize waste.
Database Monitoring
As reported in 62 Microsoft Defender for Cloud reviews. Monitors performance and statistics related to memory, caches and connections.
API Monitoring
As reported in 63 Microsoft Defender for Cloud reviews. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Activity Monitoring
Based on 61 Microsoft Defender for Cloud reviews. Actively monitors status of work stations either on-premise or remote.
Documentation (3)
Feedback
Provides thorough, actionable feedback regarding security vulnerabilities, or allows collaborators to do the same. 16 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Prioritization
Prioritizes detected vulnerabilities by potential risk, or allows collaborators to do the same. This feature was mentioned in 16 Microsoft Defender for Cloud reviews.
Remediation Suggestions
As reported in 15 Microsoft Defender for Cloud reviews. Provides suggestions for remediating vulnerable code, or allows collaborators to do the same.
Configuration (5)
DLP Configuration
As reported in 62 Microsoft Defender for Cloud reviews. Offers data loss prevention tools to protect data from leaving the environments it is allowed to.
Configuration Monitoring
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. This feature was mentioned in 63 Microsoft Defender for Cloud reviews.
Unified Policy Management
As reported in 59 Microsoft Defender for Cloud reviews. Allows users to track and control security policies across cloud services and providers.
Adaptive Access Control
Provides a risk-based approach to determining trust within the network. 60 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
API / Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. This feature was mentioned in 64 Microsoft Defender for Cloud reviews.
Visibility (2)
Multicloud Visibility
As reported in 63 Microsoft Defender for Cloud reviews. Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
Asset Discovery
As reported in 59 Microsoft Defender for Cloud reviews. Detect new assets as they enter a cloud environments and networks to add to asset inventory.
Vulnerability Management (4)
Threat Hunting
As reported in 62 Microsoft Defender for Cloud reviews. Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.
Vulnerability Scanning
Analyzes your existing cloud, network, and IT infrastructure to outline access points that can be easily compromised. This feature was mentioned in 61 Microsoft Defender for Cloud reviews.
Vulnerability Intelligence
Stores information related to new and common vulnerabilities and how to resolve them once incidents occur. 62 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Risk-Prioritization
Allows for vulnerability ranking by customized risk and threat priorities. 62 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Alerts management (3)
Multi-mode alerts
Alerts over email, text, phone call, or more to multiple parties.
Opimization alerts
Provides information related to unnecessary spending and unused resources.
Incident alerts
Gives alerts when incidents arise.
Automation (2)
Resolution automation
Diagnoses and resolves incidents without the need for human interaction.
Automation
Efficiently scales resource usage to optimize spend whith increased or decreased resource usage requirements.
Analysis (4)
Search
Allows users to search logs for troubleshooting and open-ended exploration of data.
Reporting
Creates reports outlining resource, underutilization, cost trends, and/or functional overlap.
Visualization
Presents information and analytics in a digestible, intuitive, and visually appealing way.
Track trends
Allows users to track log trends.
Issue Resolution (3)
Root cause identification
Directly identifies, or increases identification speed for, root causes for container issues.
Resolution guidance
Provides paths, suggestions, or other general assistance towards issue resolution.
Proactive identification
Proactively identifies trends on container systems that could lead to failures or errors.
Security - Cloud-Native Application Protection Platform (CNAPP) (4)
Workload and container security
Scans containers, workloads, and kubernetes clusters for any misconfigurations or vulnerabilities.
Threat detection and response
Monitor live environments for anomalies, risks and threats to ensure rapid response.
DevSecOps Integrations
Integrates with CI/CD pipelines to detect security risks early in the development life cycle.
Unified Visibility
Consolidate all security data across the tech and cloud stacks into one dashboard.
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP) (3)
Intelligent remediations and suggestions
Offers an AI-powered engine to provide remediation guidance to the user based on the type of threat.
Risk prioritization
Uses context-aware analysis to identify critical and non-critical risks across vulnerabilities.
Anomaly detection using machine learning
Help detect anomalies across cloud workloads which could help present a potential breach.
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP) (2)
Multi-cloud visibility
Offers a unified view of all cloud assets across multi-cloud platforms such as AWS, Azure, GCP etc.
Cloud Security Posture Management (CSPM)
Continuously scans cloud environments for any misconfigurations, and provide benchmarks and guided remediation.
Agentic AI - Cloud Security Monitoring and Analytics (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Cloud-Native Application Protection Platform (CNAPP) (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Adaptive Learning
Improves performance based on feedback and experience
Agentic AI - Cloud Detection and Response (CDR) (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Services - Cloud Detection and Response (CDR) (1)
Managed Services
Offers managed detection and response services.
Model Protection - AI Security Solutions (4)
Input Hardening
Provides specific capability to defend AI assets from adversarial attacks (including prompt injection, data poisoning, model inversion or extraction) without requiring retraining of the underlying model.
Input/Output Inspection
Enables automatic inspection of model inputs (prompts) and/or outputs (responses) to prevent unsafe, sensitive or manipulated content.
Integrity Monitoring
Monitors the integrity of model weights, dependencies or metadata (for example via SBOM/AIBOM) to detect tampering, drift or unauthorised modification.
Model Access Control
Verifies the ability to enforce who or what (users, agents, systems) may access a model or LLM asset.
Runtime Monitoring - AI Security Solutions (2)
AI Behavior Anomaly Detection
Detects unusual or harmful runtime behaviour of AI models, agents or workflows (such as unexpected output patterns, excessive permissions use, or unknown agents).
Audit Trail
Provides a persistent, searchable audit log of AI‑asset inputs, outputs and interactions (including who/what invoked the model, when, and with what data) for forensics and compliance.
Policy Enforcement and Compliance - AI Security Solutions (4)
Scalable Governance
Ensures that the AI‑security platform supports scaling of AI‑asset protection (models, agents, multi‑cloud deployments) and applies governance/compliance frameworks as AI usage grows.
Integrations
Enables integration of the AI‑security solution with traditional security stacks (SIEM, SOAR, cloud security, application security, identity/access management) to unify visibility and response.
Shadow AI
Offers visibility into unmanaged or unauthorized AI/agent use (“shadow AI”) across the organisation and enforces control over such usage (e.g., agent creation, LLM‑based services).
Policy‑as‑Code for AI Assets
Supports codified, machine‑enforceable security policies targeting AI models/agents (for example, blocking certain categories of prompts, enforcing least‑privilege for model use, enforcing “no external data” rules).
Functionality - AI Security Posture Management (AI-SPM) Tools (5)
Security Ecosystem Integration
Integrate with existing security infrastructure (SIEM, CASB, IAM, DSPM/CSPM/SSPM) to bring AI‑SPM into the wider security ecosystem.
AI Asset Discovery
Discover AI applications, agents, chatbots and integrations across SaaS, APIs and other environments.
Adaptive Policy Updates
Support continuous updates to policies and controls as AI‑tool usage evolves and new threats emerge.
Access and Permissions Monitoring
Monitor data flows, permissions and resource access associated with AI integrations and tools.
Policy Enforcement
Enforce AI‑specific security policies in real time, such as limiting agent permissions and blocking unauthorized AI activity.
Risk Assessment - AI Security Posture Management (AI-SPM) Tools (2)
AI Risk Assessment
Continuously assess AI integration risks including misconfigurations, policy violations and exposure to external AI services.
AI Asset Posture Scoring
Provide dashboards, risk scores and prioritisation for remediation across the AI‑asset estate.
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools (2)
AI‑Generated Content Controls
Monitor AI‑generated content for sensitive/regulated information and apply remediation or blocking controls.
Audit Trails
Maintain audit logs, governance controls and reporting tied specifically to AI assets, agent behaviours and integrations.





