Microsoft Defender
Microsoft Defender helps prevent, detect, and respond to attacks across devices, identities, apps, email, data, workloads, and clouds. Explore threat intelligence, capabilities, and real-world guidance to help you get more out of Defender.
Refine results
Topic
Products and services
Publish date
-
Most machine learning models are trained on a mix of malicious and clean features. -
Microsoft’s Threat & Vulnerability Management now helps thousands of customers to discover, prioritize, and remediate vulnerabilities in real time
Microsoft’s Threat & Vulnerability Management solution is generally available! -
Delivering major enhancements in Windows Defender Application Control with the Windows 10 May 2019 Update
With the Windows 10 May 2019 Update we delivered several important features for Windows Defender Application Control. -
Inside out: Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection
While Windows Defender Antivirus makes catching 5 billion threats on devices every month look easy, multiple advanced detection and prevention technologies work under the hood to make this happen. -
The evolution of Microsoft Threat Protection, June update
Learn about new Microsoft Threat Protection capabilities now in public preview. -
Investigating identity threats in hybrid cloud environments
Announcing a new identity threat investigation experience. -
Ensuring security of your Microsoft Teams apps with Microsoft Cloud App Security
The app certification program provides a public cloud app risk assessment catalog and allows partners to provide the latest information about their apps’ security. -
Step 10. Detect and investigate security incidents: top 10 actions to secure your environment
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. -
Secure your journey to the cloud with free DMARC monitoring for Office 365
Not knowing who is sending email “from” your organization is an enormous problem for IT managers. -
Uncovering Linux based cyberattack using Azure Security Center
As detection capabilities advance, attackers are using new and stealthier techniques to stay undetected and persist with their motives. -
New browser extensions for integrating Microsoft’s hardware-based isolation
The hardware-based isolation technology on Windows 10 that allows Microsoft Edge to isolate browser-based attacks is now available as a browser extension for Google Chrome and Mozilla Firefox. -
Step 9. Protect your OS: top 10 actions to secure your environment
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions.