Skip to main content
Skip to main content
Microsoft
Microsoft Security
Microsoft Security
Microsoft Security
Home
Solutions
Cloud security
Frontline workers
Identity & access
Industrial & critical infrastructure
Information protection & governance
IoT security
Passwordless authentication
Phishing
Ransomware
Risk management
Secure remote work
SIEM & XDR
Small & medium business
Zero Trust
Products
Product families
Product families
Microsoft Defender
Microsoft Entra
Microsoft Intune
Microsoft Priva
Microsoft Purview
Microsoft Sentinel
Identity & access
Identity & access
Azure Active Directory part of Microsoft Entra
Microsoft Entra Identity Governance
Microsoft Entra Permissions Management
Microsoft Entra Verified ID
Microsoft Entra Workload Identities
Azure Key Vault
SIEM & XDR
SIEM & XDR
Microsoft Sentinel
Microsoft Defender for Cloud
Microsoft 365 Defender
Microsoft Defender for Endpoint
Microsoft Defender for Office 365
Microsoft Defender for Identity
Microsoft Defender for Cloud Apps
Microsoft Defender Vulnerability Management
Microsoft Defender Threat Intelligence
Cloud security
Cloud security
Microsoft Defender for Cloud
Microsoft Defender Cloud Security Posture Mgmt
Microsoft Defender for DevOps
Microsoft Defender External Attack Surface Management
Azure Firewall
Azure Web App Firewall
Azure DDoS Protection
GitHub Advanced Security
Endpoint security
Endpoint security
Microsoft 365 Defender
Microsoft Defender for Endpoint
Microsoft Defender for IoT
Microsoft Defender for Business
Microsoft Defender Vulnerability Management
Risk management & privacy
Risk management & privacy
Microsoft Purview Insider Risk Management
Microsoft Purview Communication Compliance
Microsoft Purview eDiscovery
Microsoft Purview Compliance Manager
Microsoft Purview Audit
Microsoft Priva Risk Management
Microsoft Priva Subject Rights Requests
Information protection
Information protection
Microsoft Purview Information Protection
Microsoft Purview Data Lifecycle Management
Microsoft Purview Data Loss Prevention
Endpoint management
Endpoint management
Microsoft Intune
Services
Microsoft Security Experts
Microsoft Defender Experts for Hunting
Microsoft Security Services for Enterprise
Microsoft Security Services for Incident Response
Microsoft Security Services for Modernization
Partners
Resources
Get started
Get started
Cybersecurity awareness
Customer stories
Security 101
Product trials
How we protect Microsoft
Reports and analysis
Reports and analysis
Industry recognition
Microsoft Security Insider
Microsoft Digital Defense Report
Security Response Center
Community
Community
Microsoft Security Blog
Microsoft Security Events
Microsoft Tech Community
Documentation and training
Documentation and training
Documentation
Technical Content Library
Training & certifications
Additional sites
Additional sites
Compliance Program for Microsoft Cloud
Microsoft Trust Center
Security Engineering Portal
Service Trust Portal
Contact sales
More
Start free trial
All Microsoft
Global
Microsoft Security
Azure
Dynamics 365
Microsoft 365
Microsoft Teams
Windows 365
Tech & innovation
Tech & innovation
Microsoft Cloud
AI
Azure Space
Mixed reality
Microsoft HoloLens
Microsoft Viva
Quantum computing
Sustainability
Industries
Industries
Education
Automotive
Financial services
Government
Healthcare
Manufacturing
Retail
All industries
Partners
Partners
Find a partner
Become a partner
Partner Network
Find an advertising partner
Become an advertising partner
Azure Marketplace
AppSource
Resources
Resources
Blog
Microsoft Advertising
Developer Center
Documentation
Events
Licensing
Microsoft Learn
Microsoft Research
View Sitemap
Search
Search Microsoft Security
No results
Cancel
Sign in
Security Strategies
Featured image for Introducing the security configuration framework: A prioritized guide to hardening Windows 10
April 11, 2019
• 5 min read
Introducing the security configuration framework: A prioritized guide to hardening Windows 10
The security configuration framework is designed to help simplify security configuration while still allowing enough flexibility to allow you to balance security, productivity, and user experience. We are defining discrete prescriptive Windows 10 security configurations (levels 5 through 1) to meet many of the common device scenarios we see today in the enterprise.
Read more
Introducing the security configuration framework: A prioritized guide to hardening Windows 10
Featured image for Announcing the new Security Engineering website
February 4, 2019
• 2 min read
Announcing the new Security Engineering website
The new Security Engineering website includes security practices to help improve the security of products or cloud services.
Read more
Announcing the new Security Engineering website
December 20, 2018
• 4 min read
The challenges of adopting a consistent cybersecurity framework in the insurance industry
How the U.S. insurance industry is aligning behind a cybersecurity framework in a fragmented, state-by-state, regulatory environment.
Read more
The challenges of adopting a consistent cybersecurity framework in the insurance industry
Featured image for CISO series: Strengthen your organizational immune system with cybersecurity hygiene
December 6, 2018
• 4 min read
CISO series: Strengthen your organizational immune system with cybersecurity hygiene
Cybersecurity hygiene is about maintaining cyberhealth by developing and implementing a set of tools, policies, and practices to increase your organization's resiliency in the face of attacks and exploits.
Read more
CISO series: Strengthen your organizational immune system with cybersecurity hygiene
Featured image for CISO series: Partnering with the C-Suite on cybersecurity
October 24, 2018
• 4 min read
CISO series: Partnering with the C-Suite on cybersecurity
In my last blog, we looked at five communication techniques that can help engage business managers in the work of cybersecurity. This week, we’ll look at how to use those techniques to bring the C-Suite into the conversation.
Read more
CISO series: Partnering with the C-Suite on cybersecurity
August 16, 2018
• 4 min read
Finding the signal of community in all the noise at Black Hat
Over the last few years, Microsoft has been expanding and redefining what makes up our security community. We attended Black Hat to help educate our peers on notable vulnerabilities and exploits, and share knowledge following major security events.
Read more
Finding the signal of community in all the noise at Black Hat
August 9, 2018
• 2 min read
Building on experience: a framework for cybersecurity policy
Each year more and more governments are developing policies to address security challenges presented by an increasingly digitized world. We are excited to announce the release of Microsoft’s new Cybersecurity Policy Framework—an indispensable resource for the policymakers joining this work.
Read more
Building on experience: a framework for cybersecurity policy
July 31, 2018
• 3 min read
How Microsoft 365 Security integrates with your broader IT ecosystem—part 2
In part 1 of our blog series, we shared the Microsoft 365 Security strategy for integrating with the broader security community. Today, we cover the services Microsoft 365 Security offers customers to protect assets beyond the Microsoft ecosystem.
Read more
How Microsoft 365 Security integrates with your broader IT ecosystem—part 2
Featured image for Enable your users to work securely from anywhere, anytime, across all of their devices
July 18, 2018
• 3 min read
Enable your users to work securely from anywhere, anytime, across all of their devices
This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 Security solutions. In this series you’ll find context, answers, and guidance for deployment and driving adoption within your organization.
Read more
Enable your users to work securely from anywhere, anytime, across all of their devices
June 19, 2018
• 4 min read
Driving data security is a shared responsibility, here’s how you can protect yourself
You’re driving a long, dark road on a rainy night. If you’re driving 20 miles over the speed limit and you don’t step on the brakes when the car in front of you comes to a sudden stop, is it your fault or your car manufacturer’s fault if you rear-end the car that is in…
Read more
Driving data security is a shared responsibility, here’s how you can protect yourself
1
2
3
…
7
Next Page