Skip to main content
Microsoft
Microsoft Security
Microsoft Security
Microsoft Security
Home
Solutions
AI for cybersecurity
Cloud security
Data security
Identity & network access
Privacy & risk management
Secure & govern AI
Unified SecOps
Zero Trust
Products
Product families
Product families
Microsoft Defender
Microsoft Entra
Microsoft Intune
Microsoft Priva
Microsoft Purview
Microsoft Sentinel
Security AI
Security AI
Microsoft Copilot for Security
Identity & access
Identity & access
Microsoft Entra ID (Azure Active Directory)
Microsoft Entra External ID
Microsoft Entra ID Governance
Microsoft Entra ID Protection
Microsoft Entra Internet Access
Microsoft Entra Private Access
Microsoft Entra Permissions Management
Microsoft Entra Verified ID
Microsoft Entra Workload ID
Microsoft Entra Domain Services
Azure Key Vault
SIEM & XDR
SIEM & XDR
Microsoft Sentinel
Microsoft Defender for Cloud
Microsoft Defender XDR
Microsoft Defender for Endpoint
Microsoft Defender for Office 365
Microsoft Defender for Identity
Microsoft Defender for Cloud Apps
Microsoft Security Exposure Management
Microsoft Defender Vulnerability Management
Microsoft Defender Threat Intelligence
Cloud security
Cloud security
Microsoft Defender for Cloud
Microsoft Defender Cloud Security Posture Mgmt
Microsoft Defender External Attack Surface Management
Azure Firewall
Azure Web App Firewall
Azure DDoS Protection
GitHub Advanced Security
Endpoint security & management
Endpoint security & management
Microsoft Defender for Endpoint
Microsoft Defender XDR
Microsoft Defender for Business
Microsoft Intune core capabilities
Microsoft Defender for IoT
Microsoft Defender Vulnerability Management
Microsoft Intune Advanced Analytics
Microsoft Intune Endpoint Privilege Management​
Microsoft Intune Enterprise Application Management
Microsoft Intune Remote Help
Microsoft Cloud PKI
Risk management & privacy
Risk management & privacy
Microsoft Purview Insider Risk Management
Microsoft Purview Communication Compliance
Microsoft Purview eDiscovery
Microsoft Purview Compliance Manager
Microsoft Purview Audit
Microsoft Priva Risk Management
Microsoft Priva Subject Rights Requests
Microsoft Purview Data Governance
Information protection
Information protection
Microsoft Purview Information Protection
Microsoft Purview Data Lifecycle Management
Microsoft Purview Data Loss Prevention
Services
Microsoft Security Experts
Microsoft Defender Experts for XDR
Microsoft Defender Experts for Hunting
Microsoft Incident Response
Microsoft Security Enterprise Services
Partners
Resources
Get started
Get started
Cybersecurity awareness
Customer stories
Security 101
Product trials
How we protect Microsoft
Reports and analysis
Reports and analysis
Industry recognition
Microsoft Security Insider
Microsoft Digital Defense Report
Security Response Center
Community
Community
Microsoft Security Blog
Microsoft Security Events
Microsoft Tech Community
Documentation and training
Documentation and training
Documentation
Technical Content Library
Training & certifications
Additional sites
Additional sites
Compliance Program for Microsoft Cloud
Microsoft Trust Center
Security Engineering Portal
Service Trust Portal
Microsoft Secure Future Initiative
Business Solutions Hub
Contact Sales
Start free trial
More
All Microsoft
Global
Microsoft Security
Azure
Dynamics 365
Microsoft 365
Microsoft Teams
Windows 365
Tech & innovation
Tech & innovation
Microsoft Cloud
AI
Azure Space
Mixed reality
Microsoft HoloLens
Microsoft Viva
Quantum computing
Sustainability
Industries
Industries
Education
Automotive
Financial services
Government
Healthcare
Manufacturing
Retail
All industries
Partners
Partners
Find a partner
Become a partner
Partner Network
Azure Marketplace
AppSource
Resources
Resources
Blog
Microsoft Advertising
Developer Center
Documentation
Events
Licensing
Microsoft Learn
Microsoft Research
View Sitemap
Search
Search Microsoft Security
No results
Cancel
Blog home
Scott Charney
Search the Microsoft security blog
Submit
Scott Charney Posts
Scott Charney
Nothing found
It seems we can’t find what you’re looking for. Perhaps searching can help.
Search the Microsoft security blog
Submit