Select Page

Azure resources to assess risk and compliance

This blog post was co-authored by Lucy Raikova, Senior Program Manager, Azure Global – Financial Services. It is vital for our customers in the Financial Services Industry to deliver innovation and value to their customers while adhering to strict security ... continue reading
Grafana dashboard using Azure Monitor as a data source to display metrics for Contoso dev environment.

Deploying Grafana for production deployments on Azure

This blog is co-authored by Nick Lopez, Technical Advisor at Microsoft. Grafana is one of the popular and leading open source tools for visualizing time series metrics. Grafana has quickly become the preferred visualization tool of choice for developers and ... continue reading
Secure score in Microsoft Defender ATP

Introducing the security configuration framework: A prioritized guide to hardening Windows 10

In the past, we left defining the security configuration for Windows 10 as a task for every customer to sort out. As a result, we saw as many different configurations as we saw customers. Standardization has many advantages, so we ... continue reading

4 tried-and-true prevention strategies for enterprise-level security

Why is it that dentists advise people over and over to floss, yet so few do it? It only takes a minute of your time, yet if you’re running late or feeling tired, you may be tempted to skip it ... continue reading
Attack chain diagram

Analysis of a targeted attack exploiting the WinRar CVE-2018-20250 vulnerability

In early March, we discovered a cyberattack that used an exploit for CVE-2018-20250, an old WinRar vulnerability disclosed just several weeks prior, and targeted organizations in the satellite and communications industry. A complex attack chain incorporating multiple code execution techniques ... continue reading
Step 8. Protect your documents and email: top 10 actions to secure your environment

Step 8. Protect your documents and email: top 10 actions to secure your environment

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 8. Protect your documents and email,” you’ll learn how to deploy Azure Information Protection and ... continue reading
Infographic showing a Shadow IT discovery lifecycle. Phase one: discover and identify. Phase two: evaluate and analyze. Phase three: manage and continuous monitoring.

Step 7. Discover shadow IT and take control of your cloud apps: Top 10 actions to secure your environment

This series outlines the most fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 7. Discover shadow IT and take control of cloud apps,” you’ll learn how to set up Microsoft Cloud App Security ... continue reading
figure-01-WannaCry-user-APC-injection-technique-schematic-diagram

From alert to driver vulnerability: Microsoft Defender ATP investigation unearths privilege escalation flaw

With Microsoft continuously improving kernel mitigations and raising the bar for exploiting native kernel components, third-party kernel drivers are becoming a more appealing target for attackers and an important area of research for security analysts. A vulnerability in a signed ... continue reading
Screenshot of fusion and two composite alerts

Reducing security alert fatigue using machine learning in Azure Sentinel

Last week we launched Azure Sentinel, a cloud native SIEM tool. Machine learning (ML) in Azure Sentinel is built-in right from the beginning. We have thoughtfully designed the system with ML innovations aimed to make security analysts, security data scientists, ... continue reading
PAW deployment guide

PAW deployment guide

First published on TECHNET on Apr 30, 2018 After running the PAW TAP program on the solution explained in this blogpost , I received tons of interests and great feedback. While the team is investigating on a plan, a lot ... continue reading