Microsoft Defender for Cloud Features
Management (3)
Dashboards and Reports
This feature was mentioned in 45 Microsoft Defender for Cloud reviews.
Access pre-built and custom reports and dashboards.
Workflow Management
Based on 45 Microsoft Defender for Cloud reviews.
Creates new or streamlines existing workflows to better handle IT support tickets and service.
Administration Console
44 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Provides Administration tools/console that are easy to use and learn for routine maintenance tasks
Operations (3)
Governance
As reported in 44 Microsoft Defender for Cloud reviews.
Allows users to create, edit, and relinquish user access privileges.
Logging and Reporting
Based on 44 Microsoft Defender for Cloud reviews.
Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
API / Integrations
Based on 45 Microsoft Defender for Cloud reviews.
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Security Controls (4)
Anomaly Detection
Based on 45 Microsoft Defender for Cloud reviews.
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data Loss Prevention
Based on 44 Microsoft Defender for Cloud reviews.
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Security Auditing
Based on 44 Microsoft Defender for Cloud reviews.
Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.
Cloud Gap Analytics
This feature was mentioned in 44 Microsoft Defender for Cloud reviews.
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Administration (10)
Risk Scoring
Based on 22 Microsoft Defender for Cloud reviews.
Provides risk scoring for suspicious activity, vulnerabilities, and other threats.
Secrets Management
As reported in 21 Microsoft Defender for Cloud reviews.
Provides tools for managing authentication credentials such as keys and passwords.
Security Auditing
As reported in 22 Microsoft Defender for Cloud reviews.
Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.
Configuration Management
As reported in 22 Microsoft Defender for Cloud reviews.
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Policy Enforcement
This feature was mentioned in 92 Microsoft Defender for Cloud reviews.
Allows administrators to set policies for security and data governance.
Auditing
As reported in 94 Microsoft Defender for Cloud reviews.
Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices.
Workflow Management
As reported in 93 Microsoft Defender for Cloud reviews.
Creates new or streamlines existing workflows to better handle IT support tickets and service.
Security Automation
60 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Security Integration
Based on 61 Microsoft Defender for Cloud reviews.
Integrates additional security tools to automate security and incident response processes.
Multicloud Visibility
This feature was mentioned in 60 Microsoft Defender for Cloud reviews.
Allows users to track and control activity across cloud services and providers.
Monitoring (7)
Continuous Image Assurance
As reported in 20 Microsoft Defender for Cloud reviews.
Provides image verification features to establish container approval requirements and continuously monitor for policy violations to identify containers with known vulnerabilities, malware, and other threats.
Behavior Monitoring
20 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.
Observability
As reported in 20 Microsoft Defender for Cloud reviews.
Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.
Resource utilization
Optimizes resource allocation.
Real-time monitoring
Consistently monitors processes for applications and IT infrastructure to detect anomalies in real-time.
Performance baseline
Sets up standard performance baseline to compare live container activities.
API monitoring
Traces connections between different containerized environments and detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Protection (4)
Dynamic Image Scanning
This feature was mentioned in 19 Microsoft Defender for Cloud reviews.
Scans application and image source code for security flaws without executing it in a live environment
Runtime Protection
This feature was mentioned in 21 Microsoft Defender for Cloud reviews.
Monitors container activities and detects threats across containers, networks, and cloud service providers.
Workload Protection
As reported in 22 Microsoft Defender for Cloud reviews.
Protects compute resources across a networks and cloud service providers. Serves as Firewall and prompts additional authentication for suspicious users.
Network Segmentation
This feature was mentioned in 21 Microsoft Defender for Cloud reviews.
Allows administrative control over network components, mapping, and segmentation.
Security (10)
Compliance Monitoring
As reported in 97 Microsoft Defender for Cloud reviews.
Monitors data quality and sends alerts based on violations or misuse.
Anomoly Detection
97 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data Loss Prevention
As reported in 95 Microsoft Defender for Cloud reviews.
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Cloud Gap Analytics
Based on 95 Microsoft Defender for Cloud reviews.
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance Monitoring
As reported in 62 Microsoft Defender for Cloud reviews.
Monitors data quality and send alerts based on violations or misuse.
Risk Analysis
This feature was mentioned in 60 Microsoft Defender for Cloud reviews.
Identifies potential network security risks, vulnerabilities, and compliance impacts.
Reporting
62 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Creates reports outlining log activity and relevant metrics.
False Positives
Based on 15 Microsoft Defender for Cloud reviews.
Does not falsely indicate vulnerable code when no vulnerabilitiy legitimately exists.
Custom Compliance
Based on 17 Microsoft Defender for Cloud reviews.
Allows users to set custom code standards to meet specific compliances.
Agility
15 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Detects vulnerabilities at a rate suitable to maintain security, or allows collaborators to do the same.
Compliance (3)
Governance
97 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Allows users to create, edit, and relinquish user access privileges.
Data Governance
Based on 93 Microsoft Defender for Cloud reviews.
Ensures user access management, data lineage, and data encryption.
Sensitive Data Compliance
Based on 94 Microsoft Defender for Cloud reviews.
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Functionality - Software Composition Analysis (3)
Language Support
As reported in 12 Microsoft Defender for Cloud reviews.
Supports a useful and wide variety of programming languages.
Integration
As reported in 12 Microsoft Defender for Cloud reviews.
Integrates seamlessly with the build environment and development tools like repositories, package managers, etc.
Transparency
As reported in 12 Microsoft Defender for Cloud reviews.
Grants comprehensive user-friendly insight into all open source components.
Effectiveness - Software Composition Analysis (3)
Remediation Suggestions
Based on 12 Microsoft Defender for Cloud reviews.
Provides relevant and helpful suggestions for vulnerability remediation upon detection.
Continuous Monitoring
Based on 12 Microsoft Defender for Cloud reviews.
Monitors open source components proactively and continuously.
Thorough Detection
Based on 12 Microsoft Defender for Cloud reviews.
Comprehensively identifies all open source version updates, vulnerabilities, and compliance issues.
Activity Monitoring (4)
Usage Monitoring
63 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Tracks infrastructure resource needs and alerts administrators or automatically scales usage to minimize waste.
Database Monitoring
As reported in 62 Microsoft Defender for Cloud reviews.
Monitors performance and statistics related to memory, caches and connections.
API Monitoring
This feature was mentioned in 63 Microsoft Defender for Cloud reviews.
Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Activity Monitoring
Based on 61 Microsoft Defender for Cloud reviews.
Actively monitors status of work stations either on-premise or remote.
Documentation (3)
Feedback
This feature was mentioned in 16 Microsoft Defender for Cloud reviews.
Provides thorough, actionable feedback regarding security vulnerabilities, or allows collaborators to do the same.
Prioritization
Based on 16 Microsoft Defender for Cloud reviews.
Prioritizes detected vulnerabilities by potential risk, or allows collaborators to do the same.
Remediation Suggestions
Based on 15 Microsoft Defender for Cloud reviews.
Provides suggestions for remediating vulnerable code, or allows collaborators to do the same.
Configuration (5)
DLP Configuration
This feature was mentioned in 62 Microsoft Defender for Cloud reviews.
Offers data loss prevention tools to protect data from leaving the environments it is allowed to.
Configuration Monitoring
As reported in 63 Microsoft Defender for Cloud reviews.
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Unified Policy Management
59 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Allows users to track and control security policies across cloud services and providers.
Adaptive Access Control
As reported in 60 Microsoft Defender for Cloud reviews.
Provides a risk-based approach to determining trust within the network.
API / Integrations
As reported in 65 Microsoft Defender for Cloud reviews.
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Visibility (2)
Multicloud Visibility
This feature was mentioned in 63 Microsoft Defender for Cloud reviews.
Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
Asset Discovery
Based on 59 Microsoft Defender for Cloud reviews.
Detect new assets as they enter a cloud environments and networks to add to asset inventory.
Vulnerability Management (4)
Threat Hunting
As reported in 62 Microsoft Defender for Cloud reviews.
Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.
Vulnerability Scanning
61 reviewers of Microsoft Defender for Cloud have provided feedback on this feature.
Analyzes your existing cloud, network, and IT infrastructure to outline access points that can be easily compromised.
Vulnerability Intelligence
As reported in 62 Microsoft Defender for Cloud reviews.
Stores information related to new and common vulnerabilities and how to resolve them once incidents occur.
Risk-Prioritization
This feature was mentioned in 62 Microsoft Defender for Cloud reviews.
Allows for vulnerability ranking by customized risk and threat priorities.
Alerts management (3)
Multi-mode alerts
Alerts over email, text, phone call, or more to multiple parties.
Opimization alerts
Provides information related to unnecessary spending and unused resources.
Incident alerts
Gives alerts when incidents arise.
Automation (2)
Resolution automation
Diagnoses and resolves incidents without the need for human interaction.
Automation
Efficiently scales resource usage to optimize spend whith increased or decreased resource usage requirements.
Analysis (4)
Search
Allows users to search logs for troubleshooting and open-ended exploration of data.
Reporting
Creates reports outlining resource, underutilization, cost trends, and/or functional overlap.
Visualization
Presents information and analytics in a digestible, intuitive, and visually appealing way.
Track trends
Allows users to track log trends.
Issue Resolution (3)
Root cause identification
Directly identifies, or increases identification speed for, root causes for container issues.
Resolution guidance
Provides paths, suggestions, or other general assistance towards issue resolution.
Proactive identification
Proactively identifies trends on container systems that could lead to failures or errors.
Security - Cloud-Native Application Protection Platform (CNAPP) (4)
Workload and container security
Scans containers, workloads, and kubernetes clusters for any misconfigurations or vulnerabilities.
Threat detection and response
Monitor live environments for anomalies, risks and threats to ensure rapid response.
DevSecOps Integrations
Integrates with CI/CD pipelines to detect security risks early in the development life cycle.
Unified Visibility
Consolidate all security data across the tech and cloud stacks into one dashboard.
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP) (3)
Intelligent remediations and suggestions
Offers an AI-powered engine to provide remediation guidance to the user based on the type of threat.
Risk prioritization
Uses context-aware analysis to identify critical and non-critical risks across vulnerabilities.
Anomaly detection using machine learning
Help detect anomalies across cloud workloads which could help present a potential breach.
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP) (2)
Multi-cloud visibility
Offers a unified view of all cloud assets across multi-cloud platforms such as AWS, Azure, GCP etc.
Cloud Security Posture Management (CSPM)
Continuously scans cloud environments for any misconfigurations, and provide benchmarks and guided remediation.
Agentic AI - Cloud Security Monitoring and Analytics (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Cloud-Native Application Protection Platform (CNAPP) (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Adaptive Learning
Improves performance based on feedback and experience
Agentic AI - Cloud Detection and Response (CDR) (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Services - Cloud Detection and Response (CDR) (1)
Managed Services
Offers managed detection and response services.
Model Protection - AI Security Solutions (4)
Input Hardening
Provides specific capability to defend AI assets from adversarial attacks (including prompt injection, data poisoning, model inversion or extraction) without requiring retraining of the underlying model.
Input/Output Inspection
Enables automatic inspection of model inputs (prompts) and/or outputs (responses) to prevent unsafe, sensitive or manipulated content.
Integrity Monitoring
Monitors the integrity of model weights, dependencies or metadata (for example via SBOM/AIBOM) to detect tampering, drift or unauthorised modification.
Model Access Control
Verifies the ability to enforce who or what (users, agents, systems) may access a model or LLM asset.
Runtime Monitoring - AI Security Solutions (2)
AI Behavior Anomaly Detection
Detects unusual or harmful runtime behaviour of AI models, agents or workflows (such as unexpected output patterns, excessive permissions use, or unknown agents).
Audit Trail
Provides a persistent, searchable audit log of AI‑asset inputs, outputs and interactions (including who/what invoked the model, when, and with what data) for forensics and compliance.
Policy Enforcement and Compliance - AI Security Solutions (4)
Scalable Governance
Ensures that the AI‑security platform supports scaling of AI‑asset protection (models, agents, multi‑cloud deployments) and applies governance/compliance frameworks as AI usage grows.
Integrations
Enables integration of the AI‑security solution with traditional security stacks (SIEM, SOAR, cloud security, application security, identity/access management) to unify visibility and response.
Shadow AI
Offers visibility into unmanaged or unauthorized AI/agent use (“shadow AI”) across the organisation and enforces control over such usage (e.g., agent creation, LLM‑based services).
Policy‑as‑Code for AI Assets
Supports codified, machine‑enforceable security policies targeting AI models/agents (for example, blocking certain categories of prompts, enforcing least‑privilege for model use, enforcing “no external data” rules).
Functionality - AI Security Posture Management (AI-SPM) Tools (5)
Security Ecosystem Integration
Integrate with existing security infrastructure (SIEM, CASB, IAM, DSPM/CSPM/SSPM) to bring AI‑SPM into the wider security ecosystem.
AI Asset Discovery
Discover AI applications, agents, chatbots and integrations across SaaS, APIs and other environments.
Adaptive Policy Updates
Support continuous updates to policies and controls as AI‑tool usage evolves and new threats emerge.
Access and Permissions Monitoring
Monitor data flows, permissions and resource access associated with AI integrations and tools.
Policy Enforcement
Enforce AI‑specific security policies in real time, such as limiting agent permissions and blocking unauthorized AI activity.
Risk Assessment - AI Security Posture Management (AI-SPM) Tools (2)
AI Risk Assessment
Continuously assess AI integration risks including misconfigurations, policy violations and exposure to external AI services.
AI Asset Posture Scoring
Provide dashboards, risk scores and prioritisation for remediation across the AI‑asset estate.
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools (2)
AI‑Generated Content Controls
Monitor AI‑generated content for sensitive/regulated information and apply remediation or blocking controls.
Audit Trails
Maintain audit logs, governance controls and reporting tied specifically to AI assets, agent behaviours and integrations.




