Microsoft Defender
Microsoft Defender helps prevent, detect, and respond to attacks across devices, identities, apps, email, data, workloads, and clouds. Explore threat intelligence, capabilities, and real-world guidance to help you get more out of Defender.
Refine results
Topic
Products and services
Publish date
-
Business continuity is an imperative, and you must rely on your employees to stay connected and productive outside of the traditional digital borders of business. -
Mobile security—the 60 percent problem
What percentage of endpoints in your organization are currently protected? -
Microsoft shares new threat intelligence, security guidance during global crisis
Our threat intelligence shows that COVID-19 themed threats are retreads of existing attacks that have been slightly altered to tie to the pandemic. -
Enable remote work while keeping cloud deployments secure
Azure Security Center security controls can help you monitor your security posture as usage of cloud assets increases. -
Security guidance for remote desktop adoption
As the volume of remote workers quickly increased over the past two to three months, IT teams in many companies have been scrambling to figure out how their infrastructures and technologies will be able to handle the increase in remote connections. -
MITRE ATT&CK APT 29 evaluation proves Microsoft Threat Protection provides deeper end to end view of advanced threats
During the MITRE ATT&CK evaluation, Microsoft Threat Protection delivered on providing the deepest optics, near real time detection, and a complete view of the attack story. -
Managing risk in today’s IoT landscape: not a one-and-done
Connectivity empowers organizations to unlock the full potential of IoT—but it also introduces new cybersecurity attack vectors. -
Data governance matters now more than ever
Today we are excited to announce the general availability of Microsoft 365 Records Management, which can help organizations to secure and govern their most critical data. -
Mitigating vulnerabilities in endpoint network stacks
Learn how the Microsoft Security Assurance and Vulnerability Research team secures critical products. -
CISO Series: Lessons learned from the Microsoft SOC—Part 3c: A day in the life part 2
This blog wraps up the day in the life of a SOC analyst on the investigation team with insights on remediating incidents, post-incident cleanup, and impact of COVID-19 on the SOC. -
How to gain 24/7 detection and response coverage with Microsoft Defender ATP
Security incidents don’t happen exclusively during business hours: attackers often wait until the late hours of the night to breach an environment. -
Cybersecurity best practices to implement highly secured devices
If an internet-connected device performs a non-critical function, why does it need to be highly secured? Because any device can be the target of a hacker, and any hacked device can be weaponized.