Incident response
Incident response is the process of detecting, investigating, and responding to cyberattacks, security breaches, or IT incidents. Explore the latest trends and intelligence-driven strategies that help you prevent future attacks.
Refine results
Topic
Products and services
Publish date
-
This blog post will explain simple Microsoft security defaults and Secure Score—two features you should take advantage of that are easy to utilize and can significantly improve security in Azure AD and Office 365 configurations. -
Empower your analysts to reduce burnout in your security operations center
Strategic use of automation and metrics can help you create a continuous learning culture that keeps your team engaged in the work. -
Hello open source security! Managing risk with software composition analysis
Software composition analysis guides the selection and management of open source components to help you reduce your security risk. -
How to gain 24/7 detection and response coverage with Microsoft Defender ATP
Security incidents don’t happen exclusively during business hours: attackers often wait until the late hours of the night to breach an environment. -
CISO Series: Lessons learned from the Microsoft SOC—Part 3c: A day in the life part 2
This blog wraps up the day in the life of a SOC analyst on the investigation team with insights on remediating incidents, post-incident cleanup, and impact of COVID-19 on the SOC. -
Defending the power grid against supply chain attacks: Part 3 – Risk management strategies for the utilities industry
By working with governments, trade organizations, and suppliers, the utility industry can improve security across the supply chain. -
MITRE ATT&CK APT 29 evaluation proves Microsoft Threat Protection provides deeper end to end view of advanced threats
During the MITRE ATT&CK evaluation, Microsoft Threat Protection delivered on providing the deepest optics, near real time detection, and a complete view of the attack story. -
Microsoft shares new threat intelligence, security guidance during global crisis
Our threat intelligence shows that COVID-19 themed threats are retreads of existing attacks that have been slightly altered to tie to the pandemic. -
Ghost in the shell: Investigating web shell attacks
Web shell attacks allow adversaries to run commands and steal data from an Internet-facing server or use the server as launch pad for further attacks against the affected organization. -
CISO series: Lessons learned from the Microsoft SOC—Part 3b: A day in the life
In this next post in our series, we provide insight into a day in the life of our SOC analysts investigating common front door attacks. -
Norsk Hydro responds to ransomware attack with transparency
Aluminum supplier Norsk Hydro was attacked by LockerGoga, a form of ransomware. -
Ransomware response
As part of Microsoft’s Detection and Response Team (DART) Incident Response engagements, we regularly get asked by customers about “paying the ransom” following a ransomware attack.