{"version":"1.0","provider_name":"Microsoft Security Blog","provider_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","author_name":"Debbie Seres","author_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/debbie-seres\/","title":"Protecting user identities | Microsoft Security Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"5SZdNRCluL\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/09\/04\/protecting-user-identities\/\">Protecting user identities<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/09\/04\/protecting-user-identities\/embed\/#?secret=5SZdNRCluL\" width=\"600\" height=\"338\" title=\"&#8220;Protecting user identities&#8221; &#8212; Microsoft Security Blog\" data-secret=\"5SZdNRCluL\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/10\/Security-Deployment-thumbnail.png","thumbnail_width":1400,"thumbnail_height":839,"description":"This is a blog series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series you\u2019ll find context, answers, and guidance for deployment and driving adoption within your organization. In this blog, we explain how Microsoft 365 security solutions help you protect your users and their identities."}