Threat Intelligence

Host Microsoft Defender data locally in Switzerland

We are pleased to announce that local data residency support in Switzerland is now generally available for Microsoft Defender for Endpoint and Microsoft Defender for Identity. This announcement demonstrates our commitment to providing customers with the highest levels of security and compliance by offering services that are aligned to local data sovereignty requirements. Swiss customers […]

Host Microsoft Defender data locally in Switzerland Continue Reading

Microsoft Defender Experts for XDR recognized in the latest MITRE Engenuity ATT&CK® Evaluation for Managed Services

Microsoft Defender Experts for XDR demonstrated excellent managed extended detection and response (MXDR) by unifying our human-driven services and Microsoft Defender XDR in the MITRE Engenuity ATT&CK® Evaluations: Managed Services menuPass + ALPHV BlackCat.    Defender Experts for XDR offers a range of capabilities:  Managed detection and response: Let our expert analysts manage your Microsoft Defender

Microsoft Defender Experts for XDR recognized in the latest MITRE Engenuity ATT&CK® Evaluation for Managed Services Continue Reading

Windows Server 2025 Storage Performance with Diskspd

Spoiler (Highlight to read) Windows Server 2025 is the most secure and performant release yet! Download the evaluation now! Looking to migrate from VMware to Windows Server 2025? Contact your Microsoft account team! Windows Server 2025 is the most secure and performant release yet! Download the evaluation now! Looking to migrate from VMware to Windows Server 2025? Contact your

Windows Server 2025 Storage Performance with Diskspd Continue Reading

Detect suspicious processes running on hidden desktops

With ransomware campaigns continuing to grow, they remain top of mind for security leaders. Across these sophisticated cyberattacks, the use of remote desktop protocol (RDP) compromise has reached record levels, making it even more critical to provide analysts with full visibility into potentially malicious RDP session use.     That’s why today we are excited

Detect suspicious processes running on hidden desktops Continue Reading

Microsoft Incident Response tips for managing a mass password reset

Explore how effective incident response helps organizations detect, address, and stop cyberattacks Learn more As part of any robust incident response plan, organizations often work through potential security weaknesses by responding to hypothetical cyberthreats. In this blog post, we’ll imagine a scenario in which a threat actor uses malware to infect the network, moving laterally

Microsoft Incident Response tips for managing a mass password reset Continue Reading

Cloud security posture and contextualization across cloud boundaries from a single dashboard

Introduction:   Have you ever found yourself in a situation where you wanted to prioritize the riskiest misconfigurations on cloud workloads across Azure, AWS, and GCP? Have you ever wondered how to implement a unified dashboard for cloud security posture across a multicloud environment?   This article covers how you can achieve these scenarios by using

Cloud security posture and contextualization across cloud boundaries from a single dashboard Continue Reading

AI jailbreaks: What they are and how they can be mitigated

Generative AI systems are made up of multiple components that interact to provide a rich user experience between the human and the AI model(s). As part of a responsible AI approach, AI models are protected by layers of defense mechanisms to prevent the production of harmful content or being used to carry out instructions that

AI jailbreaks: What they are and how they can be mitigated Continue Reading

The four stages of creating a trust fabric with identity and network security

How implementing a trust fabric strengthens identity and network Read the blog At Microsoft, we’re continually evolving our solutions for protecting identities and access to meet the ever-changing security demands our customers face. In a recent post, we introduced the concept of the trust fabric. It’s a real-time approach to securing access that is adaptive

The four stages of creating a trust fabric with identity and network security Continue Reading

Azure AI Search Database Selection: Optimizing Performance and Scalability for Your Business

In today’s data-driven world, selecting the right database for your specific use case is crucial for optimizing performance, ensuring scalability, and maintaining security. Azure AI Search, combined with Azure OpenAI and the Retrieval Augmented Generation (RAG) pattern, provides a powerful framework for building advanced generative AI applications. These solutions are tailored to meet diverse needs

Azure AI Search Database Selection: Optimizing Performance and Scalability for Your Business Continue Reading

Exposed and vulnerable: Recent attacks highlight critical need to protect internet-exposed OT devices

Since late 2023, Microsoft has observed an increase in reports of attacks focusing on internet-exposed, poorly secured operational technology (OT) devices. Internet-exposed OT equipment in water and wastewater systems (WWS) in the US were targeted in multiple attacks over the past months by different nation-backed actors, including attacks by IRGC-affiliated “CyberAv3ngers” in November 2023, as

Exposed and vulnerable: Recent attacks highlight critical need to protect internet-exposed OT devices Continue Reading