Microsoft Defender
Microsoft Defender helps prevent, detect, and respond to attacks across devices, identities, apps, email, data, workloads, and clouds. Explore threat intelligence, capabilities, and real-world guidance to help you get more out of Defender.
Refine results
Topic
Products and services
Publish date
-
When we started developing Azure Security Center, our mission was clear: be the best solution to protect Azure Resources. -
Blue Cedar partners with Microsoft to combat BYOD issues
IT and security teams have been searching for a solution to accommodate BYOD that won’t compromise network security. -
Increasing resilience against Solorigate and other sophisticated attacks with Microsoft Defender
This blog is a guide for security administrators using Microsoft 365 Defender and Azure Defender to identify and implement security configuration and posture improvements that harden enterprise environments against Solorigate’s attack patterns. -
Privacy breaches: Using Microsoft 365 Advanced Audit and Advanced eDiscovery to minimize impact
GDPR, HIPPA, GLBA, all 50 U.S. States, and many countries have privacy breach reporting requirements. -
Using Microsoft 365 Defender to protect against Solorigate
This blog is a comprehensive guide for security operations and incident response teams using Microsoft 365 Defender to identify, investigate, and respond to the Solorigate attack if it’s found in your environment. -
Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers
We, along with the security industry and our partners, continue to investigate the extent of the Solorigate attack. -
A “quick wins” approach to securing Azure Active Directory and Office 365 and improving your security posture
This blog post will explain simple Microsoft security defaults and Secure Score—two features you should take advantage of that are easy to utilize and can significantly improve security in Azure AD and Office 365 configurations. -
Terranova Security Gone Phishing Tournament reveals continued weak spot in cybersecurity
See which industries had the highest click rates, as well as results sorted by organization size, previous training, and more. -
New cloud-native breadth threat protection capabilities in Azure Defender
As the world adapts to working remotely, the threat landscape is constantly evolving, and security teams struggle to protect workloads with multiple solutions that are often not well integrated nor comprehensive enough. -
EDR in block mode stops IcedID cold
Endpoint detection and response (EDR) in block mode in Microsoft Defender for Endpoint turns EDR detections into real-time blocking of threats. -
Digital Defense integrates with Microsoft to detect attacks missed by traditional endpoint security
Cybercriminals have ramped up their initial compromises through phishing and pharming attacks using a variety of tools and tactics that, while numerous, are simple and can often go undetected. -
Protect your SQL Server on-premises, in Azure, and in multicloud
Azure Defender for SQL is now generally available for use with SQL Server on premises, in multicloud deployments on Amazon Web Services (AWS), and Google Cloud Platform (GCP), and in virtual machines on Azure.