Select Page
Step 6. Manage mobile apps: top 10 actions to secure your environment

Step 6. Manage mobile apps: top 10 actions to secure your environment

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 6. Manage mobile apps,” you’ll learn how to complete your Unified Endpoint Management (UEM) strategy ... continue reading
App-V Auto Sequencing - Retrieve the password

App-V Auto Sequencing – Retrieve the password

First published on MSDN on Sep 06, 2018Connecting to the Auto Sequencer VM can be done using the Connect-AppVSequencerVM cmdletIf you want to use a remote desktop connection to the machine, or just open it up from hyper-V, you'll need ... continue reading
Recommendations for deploying the latest Attack surface reduction rules for maximum impact

Recommendations for deploying the latest Attack surface reduction rules for maximum impact

The keystone to good security hygiene is limiting your attack surface. Attack surface reduction is a technique to remove or constrain exploitable behaviors in your systems. In this blog, we discuss the two attack surface reduction rules introduced in the ... continue reading
Figure 1. SOC analyst tiers plus automation.

Lessons learned from the Microsoft SOC—Part 1: Organization

Were frequently asked how we operate our Security Operations Center (SOC) at Microsoft (particularly as organizations are integrating cloud into their enterprise estate). This is the first in a three part blog series designed to share our approach and experience, ... continue reading
Graph showing ContosoCars locations, device ownership, groups, platforms, and requirements. All part of their use-case management plan.

Step 5. Set up mobile device management: top 10 actions to secure your environment

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 5. Set up mobile device management, youll learn how to plan your Microsoft Intune deployment ... continue reading
Screenshot of the new Azure AD Identity Protection Security Overview dashboard.

The evolution of Microsoft Threat Protection, February update

February is an exciting month of enhancements for Microsoft Threat Protection. For those who have followed our monthly updates (November, December, and January), youre aware that Microsoft Threat Protection helps provide users optimal security from the moment they sign in, ... continue reading

Solving the TLS 1.0 problem

The use of Transport Layer Security (TLS) encryption for data in transit is a common way to help ensure the confidentiality and integrity of data transmitted between devices, such as a web server and a computer. However, in recent years ... continue reading

Securing the future of AI and machine learning at Microsoft

Artificial intelligence (AI) and machine learning are making a big impact on how people work, socialize, and live their lives. As consumption of products and services built around AI and machine learning increases, specialized actions must be undertaken to safeguard ... continue reading

Defending critical infrastructure is imperative

The Cybersecurity Tech Accords upcoming webinar and the importance of public-private partnership Today, cyberattacks from increasingly sophisticated actors threaten organizations across every sector, and whether a Fortune 500 company or a local bakery, organizations of all sizes need to take ... continue reading

CISO series: Talking cybersecurity with the board of directors

In today’s threat landscape, boards of directors are more interested than ever before in their company’s cybersecurity strategy. If you want to maintain a board’s confidence, you can’t wait until after an attack to start talking to them about how ... continue reading