ASD's Blueprint for Secure Cloud

Threat policies

This section describes the configuration of threat policies within Microsoft Defender settings associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.

Estimated reading time: 1 minute


Safe attachments

This section describes the configuration of safe attachments within Microsoft Defender associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.

Safe links

This section describes the configuration of safe links within Microsoft Defender associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.

Quarantine policies

This section describes the configuration of quarantine policies within Microsoft Defender associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.

Do you have a suggestion on how the above page could be improved? Get in touch! ASD's Blueprint for Secure Cloud is an open source project, and we would love to get your input. Submit an issue on our GitHub, or send us an email at blueprint@asd.gov.au

Acknowledgement of Country icon

Acknowledgement of Country
We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities. We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia's First Peoples' enduring contribution to Australia's national security.

Authorised by the Australian Government, Canberra