Microsoft Defender
Microsoft Defender helps prevent, detect, and respond to attacks across devices, identities, apps, email, data, workloads, and clouds. Explore threat intelligence, capabilities, and real-world guidance to help you get more out of Defender.
Refine results
Topic
Products and services
Publish date
-
Learn about new Microsoft Threat Protection capabilities now in public preview. -
Investigating identity threats in hybrid cloud environments
Announcing a new identity threat investigation experience. -
Ensuring security of your Microsoft Teams apps with Microsoft Cloud App Security
The app certification program provides a public cloud app risk assessment catalog and allows partners to provide the latest information about their apps’ security. -
Step 10. Detect and investigate security incidents: top 10 actions to secure your environment
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. -
Secure your journey to the cloud with free DMARC monitoring for Office 365
Not knowing who is sending email “from” your organization is an enormous problem for IT managers. -
Uncovering Linux based cyberattack using Azure Security Center
As detection capabilities advance, attackers are using new and stealthier techniques to stay undetected and persist with their motives. -
New browser extensions for integrating Microsoft’s hardware-based isolation
The hardware-based isolation technology on Windows 10 that allows Microsoft Edge to isolate browser-based attacks is now available as a browser extension for Google Chrome and Mozilla Firefox. -
Step 9. Protect your OS: top 10 actions to secure your environment
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. -
Ovum recommends Microsoft security to safeguard your hybrid and multi cloud environments
Read why Ovum believes Microsoft 365 and Azure can protect enterprises who use multiple cloud providers. -
Executing on the vision of Microsoft Threat Protection
Learn about how we’re already executing on the vision of Microsoft Threat Protection—the premier solution for securing the modern workplace across identities, endpoints, user data, apps, and infrastructure. -
Detecting credential theft through memory access modelling with Microsoft Defender ATP
Microsoft Defender ATP instruments memory-related function calls such as VirtualAlloc and VirtualProtect to catch in-memory attack techniques like reflective DLL loading. -
Safeguard your most sensitive data with Microsoft 365
Protect your most privileged data and comply with GDPR.