Defender for Cloud | Cloud security explorer and Attack path analysis | Defender for Cloud in the Field

In this episode of Defender for Cloud in the Field, Tal Rosler joins Yuri Diogenes to talk about Cloud security explorer and Attack path analysis, two new capabilities in Defender for CSPM that were released at Ignite. The talk explains the rationale behind creating these features and how to use these features to prioritize what is more important to keep your environment more secure. Tal also demonstrates how to use these capabilities to quickly identify vulnerabilities and misconfigurations in cloud workloads.


  • 01:27 - The business case for Cloud Security Graph
  • 03:00 - What is Cloud Security Graph
  • 05:06 - Demonstration
  • 09:30 - How paths are created under attack path
  • 12:00 - Cloud Security explorer demonstration
  • 19:25 - Saving Cloud Security Explorer queries