HAFNIUM targeting Exchange Servers with 0-day exploits

https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/ Update [03/08/2021]: Microsoft continues to see multiple actors taking advantage of unpatched systems to attack organizations with on-premises Exchange Server. To aid defenders in investigating these attacks where Microsoft security products and tooling may not be deployed, we are releasing a feed of observed indicators of compromise (IOCs). The feed of malware hashes andContinue reading “HAFNIUM targeting Exchange Servers with 0-day exploits”

Microsoft Cloud App Security (MCAS) Activity Log in Azure Sentinel

Microsoft Cloud App Security (MCAS) Activity Log in Azure Sentinel – Microsoft Tech Community Overview The Microsoft Cloud App Security (MCAS) connector lets you stream alerts and Cloud Discovery logs from MCAS into Azure Sentinel. This will enable you to gain visibility into your cloud apps, get sophisticated analytics to identify and combat cyberthreats, and control how your dataContinue reading “Microsoft Cloud App Security (MCAS) Activity Log in Azure Sentinel”

Microsoft 365 Defender enriches the Microsoft Defender for Identity experience

https://techcommunity.microsoft.com/t5/microsoft-security-and/microsoft-365-defender-enriches-the-microsoft-defender-for/ba-p/1808275?fbclid=IwAR3XdbGMeKmiiehQOpMe2MP2pOR1rKHufuYfGX5Fwv6_4iNhORIZfTo3Qhk To all identity focused customers, we’re giving you further capabilities and recommend you begin using the Microsoft 365 Defender portal as your focal point for everything threat protection. Microsoft Defender for Identity feeds into Microsoft 365 Defender, Microsoft’s end to end experience which correlates signals from Microsoft Defender for Endpoints, Microsoft Defender for OfficeContinue reading “Microsoft 365 Defender enriches the Microsoft Defender for Identity experience”

Priority Accounts in Microsoft 365

https://techcommunity.microsoft.com/t5/microsoft-365-blog/priority-accounts-in-microsoft-365/ba-p/1704707#.X2ukxCtGAMo.twitter Timely email is critical for certain people within an organization, such as the CEO and other leaders and managers. These people are often considered to be priority accounts, as they are essential to running your organization and often have access to sensitive and high priority information. We are thrilled to announce that organizations that meetContinue reading “Priority Accounts in Microsoft 365”

Microsoft Advanced Compliance Solutions in Zero Trust Architecture

Zero Trust revolves around three key principles:  verify explicitly, use least privileged access, and assume breach.  Microsoft’s Advanced Compliance Solutions are an important part of Zero Trust. This post applies a Zero Trust lens to protecting an organization’s sensitive data and maintaining compliance with relevant standards. Ultimately, Zero Trust architecture is a modern approach to security thatContinue reading “Microsoft Advanced Compliance Solutions in Zero Trust Architecture”

Best practices for defending Azure Virtual Machines

https://www.microsoft.com/security/blog/2020/10/07/best-practices-for-defending-azure-virtual-machines/ One of the things that our Detection and Response Team (DART) and Customer Service and Support (CSS) security teams see frequently during investigation of customer incidents are attacks on virtual machines from the internet. This is one area in the cloud security shared responsibility model where customer tenants are responsible for security. Security isContinue reading “Best practices for defending Azure Virtual Machines”

Advanced protection for web applications in Azure with Radware’s Microsoft Security integration

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA here. https://www.microsoft.com/security/blog/2020/10/12/advanced-protection-for-web-applications-in-azure-with-radwares-microsoft-security-integration/ The state of application security Companies face a wide range of security challenges, such as Open Source Foundation for Application Security Project (OWASP) vulnerabilities, advanced BOT threats and the need to manage BOTs, securing APIs, and protecting againstContinue reading “Advanced protection for web applications in Azure with Radware’s Microsoft Security integration”

Announcing the Zero Trust Deployment Center

https://www.microsoft.com/security/blog/2020/10/15/announcing-the-zero-trust-deployment-center/ Organizations have been digitally transforming at warp speed in response to the way businesses operate and how people work. As a result, digital security teams have been under immense pressure to ensure their environments are resilient and secure. Many have turned to a Zero Trust security model to simplify the security challenges from this transformation and the shift to remoteContinue reading “Announcing the Zero Trust Deployment Center”

Design a site like this with WordPress.com
Get started