Summary
Security is one of the biggest concerns for stakeholders at Contoso. There is some reluctance to running critical and sensitive systems "in the cloud." As system administrator, you need to address these concerns. In early research, you discovered that Azure provides change tracking and both inventory and file-integrity monitoring. You decided to investigate these security features to determine whether they could help to address your colleagues' concerns. In this module, you learned how to monitor Windows Server Azure IaaS VMs for changes in files and the registry, and other monitor modifications made to application software.
Learn more
You can learn more by reviewing the following documents.