Microsoft Defender
Microsoft Defender helps prevent, detect, and respond to attacks across devices, identities, apps, email, data, workloads, and clouds. Explore threat intelligence, capabilities, and real-world guidance to help you get more out of Defender.
Refine results
Topic
Products and services
Publish date
-
Microsoft’s Threat & Vulnerability Management solution is generally available! -
New machine learning model sifts through the good to unearth the bad in evasive malware
Most machine learning models are trained on a mix of malicious and clean features. -
The evolution of Microsoft Threat Protection—July update
Learn about the latest enhancements to Microsoft Threat Protection, the premier solution for securing the modern workplace across identities, endpoints, user data, apps, and infrastructure. -
How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection
The deep integration of Windows Defender Antivirus with hardware-based isolation capabilities allows the detection of artifacts of attacks that tamper with kernel-mode agents at the hypervisor level. -
A case study in industry collaboration: Poisoned RDP vulnerability disclosure and response
Through a cross-company, cross-continent collaboration, we discovered a vulnerability, secured customers, and developed fix, all while learning important lessons that we can share with the industry. -
From unstructured data to actionable intelligence: Using machine learning for threat intelligence
Machine learning and natural language processing can automate the processing of unstructured text for insightful, actionable threat intelligence. -
Gartner names Microsoft a Leader in 2019 Endpoint Protection Platforms Magic Quadrant
Gartner named Microsoft a Leader in the 2019 Gartner Magic Quadrant for Endpoint Protection Platforms, positioned highest in execution. -
Improve security and simplify operations with Windows Defender Antivirus + Morphisec
Learn how Towne Properties uses Windows Defender Antivirus and Morphisec to protect against advanced memory-based attacks while simplifying operations. -
Automated incident response in Office 365 ATP now generally available
Powerful automation capabilities help improve the effectiveness and efficiency of investigating and responding to Office 365 alerts. -
Foundations of Flow—secure and compliant automation, part 2
In part 2 of our two-part series, we go deeper into how Microsoft Flow secures your users and data, as well as enhances the IT experience. -
Top 5 use cases to help you make the most of your Cloud Access Security Broker
We explore five use cases for CASBs that give you an immediate return on your investment with very little deployment effort. -
How to prevent phishing attacks that target your customers with DMARC and Office 365
DMARC security protocol helps you take control of who can send email messages on your behalf, eliminating the ability for cybercriminals to use your domain to send their illegitimate messages.