Microsoft Defender
Microsoft Defender helps prevent, detect, and respond to attacks across devices, identities, apps, email, data, workloads, and clouds. Explore threat intelligence, capabilities, and real-world guidance to help you get more out of Defender.
Refine results
Topic
Products and services
Publish date
-
In recent years, malicious actors have started attacking industrial control systems and key sectors of nations’ critical infrastructure to inflict damage that transcends the cyber world and traditional IT assets. -
How Microsoft can help reduce insider risk during the Great Reshuffle
These are exciting and demanding days for organizations adapting to hybrid work realities, including a wider distributed workforce and more rapid change in employee roles. -
Microsoft Security delivers new multicloud capabilities
In times of great change, challenges and opportunities can be found in many directions. -
4 best practices to implement a comprehensive Zero Trust security approach
Learn how to create a comprehensive, integrated Zero Trust approach that enables simplified security and compliance across your enterprise. -
Detect active network reconnaissance with Microsoft Defender for Endpoint
Active network reconnaissance is a critical component of the cybersecurity kill chain allowing for network topography and endpoint services to be mapped and used in targeted campaigns. -
Cyber Signals: Defending against cyber threats with the latest research, insights, and trends
We’re excited to introduce Cyber Signals, a cyber threat intelligence brief informed by the latest Microsoft threat data and research. -
Gartner® names Microsoft a Leader in the 2022 Magic Quadrant™ for Enterprise Information Archiving
We are honored that Gartner has listed Microsoft as a Leader in its 2022 Magic Quadrant for Enterprise Information Archiving in recognition of our ability to execute and completeness of vision. -
Measure the effectiveness of your Microsoft security with AttackIQ
Microsoft and AttackIQ are working together to automate testing using MITRE ATT&CK and a threat-informed defense. -
Learn about 4 approaches to comprehensive security that help leaders be fearless
The last 18 months have put pressure on organizations to speed up their digital transformation as hybrid work continues to become the new normal. -
New macOS vulnerability, “powerdir,” could lead to unauthorized user data access
A new macOS vulnerability, “powerdir,” could allow an attacker to bypass the operating system’s TCC technology and gain unauthorized access to a user’s protected data.