Complete the code to enable Microsoft Defender for Cloud on a subscription.
az security pricing create --name [1] --tier 'Standard' --subscription 'my-subscription-id'
To enable Microsoft Defender for Cloud protection on virtual machines, use the 'VirtualMachines' pricing name.
Complete the code to list all security alerts in Microsoft Defender for Cloud.
az security alert list --subscription [1]The command requires the subscription ID to list alerts for that subscription.
Fix the error in the command to disable Microsoft Defender for Cloud on Storage Accounts.
az security pricing create --name [1] --tier 'Free' --subscription 'sub-id-123'
To disable Defender for Cloud on Storage Accounts, set the pricing tier to 'Free' for 'StorageAccounts'.
Fill both blanks to create a custom security policy assignment with Microsoft Defender for Cloud.
az policy assignment create --name 'DefenderPolicy' --policy [1] --scope [2]
The policy definition ID for Defender is 'DeployIfNotExistsSecurityCenter'. The scope is the subscription ID where the policy applies.
Fill all three blanks to create a security automation that triggers on high severity alerts.
az security automation create --name 'HighSeverityAlertAutomation' --resource-group 'SecurityRG' --location 'eastus' --trigger [1] --condition [2] --action [3]
The trigger is on security alerts, the condition filters for high severity, and the action runs a playbook automation.