Microsoft Defender
Microsoft Defender helps prevent, detect, and respond to attacks across devices, identities, apps, email, data, workloads, and clouds. Explore threat intelligence, capabilities, and real-world guidance to help you get more out of Defender.
Refine results
Topic
Products and services
Publish date
-
CISO Stressbusters: CISO guidance and support from around the world. -
Microsoft continues to extend security for all with mobile protection for Android
Announcing the public preview of Microsoft Defender ATP for Android! In the rapidly evolving world of mobile threats, Microsoft is taking a holistic approach to tackling these challenges and to securing enterprises and their data with our new mobile threat defense capabilities. -
Microsoft acquires CyberX to accelerate and secure customers’ IoT deployments
Today, we’re excited to announce that Microsoft has acquired the comprehensive, network-based IoT security platform CyberX. -
Modernizing the security operations center to better secure a remote workforce
The modern SOC will use machine learning to help humans protect organizations in a multi-cloud, IoT world. -
Inside Microsoft 365 Defender: Mapping attack chains from cloud to endpoint
In the first blog in the Inside Microsoft Threat Protection series, we will show how MTP provides unparalleled end-to-end visibility into the activities of nation-state level attacks like HOLMIUM. -
Stay ahead of multi-cloud attacks with Azure Security Center
Stay ahead of attacks and protect your workloads with Azure Security. -
What’s new in Microsoft 365 Compliance and Risk Management
Check out some of the investments we’ve made to help you to get the most out of Microsoft 365 Compliance and take a more integrated approach to secure, protect, and manage your data, while mitigating risk. -
Inside Microsoft 365 Defender: Attack modeling for finding and stopping lateral movement
Microsoft Threat Protection uses a data-driven approach for identifying lateral movement, combining industry-leading optics, expertise, and data science to deliver automated discovery of some of the most critical threats today. -
4 identity partnerships to help drive better security
Microsoft identity engineering has expanded product partnerships to help customers transform digitally with Azure AD-integrated solutions. -
Cybersecurity best practices to implement highly secured devices
If an internet-connected device performs a non-critical function, why does it need to be highly secured? Because any device can be the target of a hacker, and any hacked device can be weaponized. -
How to gain 24/7 detection and response coverage with Microsoft Defender ATP
Security incidents don’t happen exclusively during business hours: attackers often wait until the late hours of the night to breach an environment. -
CISO Series: Lessons learned from the Microsoft SOC—Part 3c: A day in the life part 2
This blog wraps up the day in the life of a SOC analyst on the investigation team with insights on remediating incidents, post-incident cleanup, and impact of COVID-19 on the SOC.