Microsoft Defender
Microsoft Defender helps prevent, detect, and respond to attacks across devices, identities, apps, email, data, workloads, and clouds. Explore threat intelligence, capabilities, and real-world guidance to help you get more out of Defender.
Refine results
Topic
Products and services
Publish date
-
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. -
Ovum recommends Microsoft security to safeguard your hybrid and multi cloud environments
Read why Ovum believes Microsoft 365 and Azure can protect enterprises who use multiple cloud providers. -
Executing on the vision of Microsoft Threat Protection
Learn about how we’re already executing on the vision of Microsoft Threat Protection—the premier solution for securing the modern workplace across identities, endpoints, user data, apps, and infrastructure. -
Detecting credential theft through memory access modelling with Microsoft Defender ATP
Microsoft Defender ATP instruments memory-related function calls such as VirtualAlloc and VirtualProtect to catch in-memory attack techniques like reflective DLL loading. -
Safeguard your most sensitive data with Microsoft 365
Protect your most privileged data and comply with GDPR. -
Get security beyond Microsoft products with Microsoft 365
Read the “Security beyond Microsoft products” e-book to learn how Microsoft 365 Enterprise E5 safeguards a diverse digital ecosystem. -
Updates for Microsoft 365 help strengthen data privacy
Updates for Microsoft 365 provide organizations with more control and options to strengthen their data privacy practices. -
Understand and improve your security posture with Microsoft 365
Instill confidence in your board with a stronger security posture. -
The evolution of Microsoft Threat Protection, April update
Learn about the latest updates to Microsoft Threat Protection and the details of its foundation built on supporting Zero Trust. -
Defend your digital landscape with Microsoft 365
Detect a security breach in real-time and respond immediately to reduce damage. -
Discover and manage shadow IT with Microsoft 365
Gain control of your shadow IT and enable employee productivity. -
Building the security operations center of tomorrow—better insights with compound detection
Learn how compound detection can help you apply the law of data gravity and correlate insights across your security platforms.