{"id":32974,"date":"2016-07-21T09:00:40","date_gmt":"2016-07-21T16:00:40","guid":{"rendered":""},"modified":"2025-12-05T14:13:08","modified_gmt":"2025-12-05T22:13:08","slug":"new-microsoft-azure-security-capabilities-now-available","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/","title":{"rendered":"New Microsoft Azure Security Capabilities Now Available"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">In November, Microsoft CEO Satya Nadella outlined a <a href=\"http:\/\/blogs.microsoft.com\/blog\/2015\/11\/17\/enterprise-security-for-our-mobile-first-cloud-first-world\/#sm.00010e5mvh18bjfb1zjwzo3fx0r3w\">new comprehensive, cross company approach to security<\/a> for our mobile-first, cloud-first world. To support this approach, Microsoft invests more than a billion dollars in security research and development, every year. Today we are<strong> announcing the general availability <\/strong>of key security capabilities in the Microsoft Cloud, which are products of this research and development investment: <strong>Azure Security Center, Azure Active Directory Identity Protection, <\/strong>and<strong> Azure Active Directory Privileged Identity Management.<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">These investments strengthen our efforts in three important areas:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">To deliver a <strong>holistic security platform<\/strong> where our products and services work in concert with each other, and with our<strong> partners<\/strong> in the security ecosystem, to protect our customers.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Microsoft\u2019s unique insights into the threat landscape, informed by trillions of signals from billions of sources, create an <strong>intelligent security graph<\/strong> that we use to inform how we protect all endpoints, better detect attacks and accelerate our response.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">To ensure that when your organization leverages the Microsoft Cloud, it can improve your security posture, versus what you are doing to protect your on-premises IT environment alone.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"azure-security-center-is-generally-available\"><strong>Azure Security Center is generally available<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">We are announcing that Azure Security Center is generally available. Azure Security Center provides customers around the world with security management and monitoring capabilities for the millions of resources they run in Microsoft Azure helping them keep pace with rapidly evolving threats in ways they likely could not achieve in their own datacenters.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Driven by Microsoft\u2019s new approach to security, Azure Security Center is transforming how customers protect their cloud workloads. Powered by advanced analytics and a rich set of protection capabilities built into Azure, Security Center helps customers protect, detect, and respond to threats.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Since the preview launched in December 2015, Azure Security Center has helped protect over a 100,000 Azure subscribers and hundreds of thousands of virtual machines \u2013 providing our customers with a unified view of the security state of all their cloud workloads, recommending ways to strengthen their security posture in accordance with their company policies, and using behavioral analysis and machine learning to detect threats.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In addition, Azure Security Center integrates with an ecosystem of partners like Barracuda.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">&#8220;Microsoft is an important partner to Barracuda as we look to help customers improve security for their deployments in Azure. Azure Security Center is just one part of the compelling security agenda we have seen from Microsoft, and we believe the way it integrates Barracuda solutions will be a great benefit to our customers,\u201d said Nicole Napiltonia, VP Strategic Alliances at Barracuda.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In addition to announcing general availability, Azure Security Center includes a number of new features today:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Integrated vulnerability assessment from partners like Qualys<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Options for integrating Security Center recommendations and alerts with existing operations and security information event management (SIEM) solutions<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Expanded support for Linux and Cloud Services VMs<\/li>\n\n\n\n<li class=\"wp-block-list-item\">New algorithms which detect lateral movement, internal reconnaissance, outgoing attacks, malicious scripts, and more<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Alerts are now mapped against cyber kill chain patterns to provide customers with a single view of an attack campaign and all of the related alerts \u2013 so they can quickly understand what actions the attacker took and what resources were impacted<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">You can get more details on new security capabilities for Azure customers from the <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-now-generally-available-proven-to-improve-security\/\">blog post<\/a> by Sarah Fender, Principal Program Manager, Azure Cybersecurity. The blog provides information on how to quickly get started with Azure Security Center to get better control and protection for your Azure resources.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"azure-active-directory-identity-protection\"><strong>Azure Active Directory Identity Protection<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Another great example of a new Microsoft security investment is Azure Active Directory Identity Protection. Azure Active Directory security capabilities are built on Microsoft\u2019s long experience protecting identities used to access Microsoft\u2019s consumer and enterprise services, and gains tremendous accuracy by analyzing the signal from over 14 billion logins every day to help identify potentially compromised user accounts.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Azure Active Directory Identity Protection builds on these capabilities and detects suspicious activities for end users and privileged identities based on signals like brute force attacks, leaked credentials, logins from unfamiliar locations and infected devices. Based on these suspicious activities, a user risk severity is calculated and risk-based policies can be configured allowing the service to automatically protect the identities of your organization from future threats.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Azure Active Directory Identity Protection will become generally available later in the quarter. <\/strong>Enterprise customers should evaluate the <a href=\"https:\/\/azure.microsoft.com\/en-us\/updates\/public-preview-azure-active-directory-identity-protection\/\">preview of Azure Active Directory Identity Protection<\/a> now, so that they are ready to use it when it becomes generally available.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"azure-active-directory-privileged-identity-management\"><strong>Azure Active Directory Privileged Identity Management<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Some of the threats that keep Chief Information Security Officers up at night include threats to privileged identities like administrator accounts. Some examples of these threats include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Malicious or rogue administrators<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Administrator credentials leaked via phishing attacks<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Administrator credentials cached on compromised systems<\/li>\n\n\n\n<li class=\"wp-block-list-item\">User accounts that are granted temporary elevated privileges that become permanent.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">More and more organizations are realizing that they have to strictly manage privileged accounts and monitor their activities because of the risk associated with their misuse. With Azure AD Privileged Identity Management you can manage, control, and monitor access to resources in Azure AD as well as other Microsoft online services like Office 365 or Microsoft Intune.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Azure Active Directory Privileged Identity Management will become generally available later in the quarter. <\/strong>I encourage you to evaluate the preview that became available in May so that you are ready to adopt this great new cloud security capability when it is generally available next month.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">More good news is that we\u2019ve made it super easy and cost effective for enterprise customers to get Azure Active Directory Identity Protection and Azure AD Privileged Identity Management by including them in the new Microsoft Enterprise Mobility + Security (EMS) E5 suite. You can get all the details, including all the other mobility and security related products and services included in EMS that were just announced, <a href=\"https:\/\/blogs.technet.microsoft.com\/enterprisemobility\/2016\/07\/07\/introducing-enterprise-mobility-security\/\">here<\/a>. If your security strategy reaches more broadly to include Office 365, Windows 10 Enterprise, and EMS, consider the recently announced offering called <a href=\"https:\/\/blogs.microsoft.com\/blog\/2016\/07\/07\/empower-your-employees-with-the-secure-productive-enterprise\/#sm.000148g0l45afdwkzux2gkqe55tto\">Secure Productive Enterprise<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">These key cloud security capabilities are a big step forward, and will help our customers protect, detect and respond to threats in a mobile-first, cloud-first world. To learn more about our security strategy and investments, visit the Microsoft Secure <a href=\"http:\/\/aka.ms\/Svuyyc\">website<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Michal Braverman-Blumenstyk<br>General Manager, Azure Security<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In November, Microsoft CEO Satya Nadella outlined a new comprehensive, cross company approach to security for our mobile-first, cloud-first world. To support this approach, Microsoft invests more than a billion dollars in security research and development, every year.<\/p>\n","protected":false},"author":49,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3898],"threat-intelligence":[],"content-type":[3662],"job-role":[],"product":[3690,3691,3702,3703],"topic":[3667],"coauthors":[1957],"class_list":["post-32974","post","type-post","status-publish","format-standard","hentry","tag-elevation-of-privilege","content-type-news","product-microsoft-defender","product-microsoft-defender-for-cloud","product-microsoft-entra","product-microsoft-entra-id","topic-cloud-security","review-flag-1694638265-83","review-flag-gener-1694638270-216","review-flag-machi-1694638272-641","review-flag-new-1694638263-340","review-flag-partn-1694638263-177"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New Microsoft Azure Security Capabilities Now Available | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Microsoft Azure Security Capabilities Now Available | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"In November, Microsoft CEO Satya Nadella outlined a new comprehensive, cross company approach to security for our mobile-first, cloud-first world. To support this approach, Microsoft invests more than a billion dollars in security research and development, every year.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-21T16:00:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-05T22:13:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-microsoft_logo_element.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft Secure Blog Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Secure Blog Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/trustedcloudteam\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Secure Blog Staff\"}],\"headline\":\"New Microsoft Azure Security Capabilities Now Available\",\"datePublished\":\"2016-07-21T16:00:40+00:00\",\"dateModified\":\"2025-12-05T22:13:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/\"},\"wordCount\":1047,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"keywords\":[\"Elevation of privilege\"],\"articleSection\":[\"Azure Information Protection\",\"Cloud Computing\",\"Microsoft Defender for Cloud\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/\",\"name\":\"New Microsoft Azure Security Capabilities Now Available | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"datePublished\":\"2016-07-21T16:00:40+00:00\",\"dateModified\":\"2025-12-05T22:13:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Microsoft Azure Security Capabilities Now Available\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/f34e90395a0c3fdc34bc65fbcccf2b96\",\"name\":\"Microsoft Secure Blog Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/5b41733c2b0f037c216d2b77ef40db4702a3b7a24a01085e2ba5658eb28efd04?s=96&d=microsoft&r=g9ba4896519acf014ccc8e2e5e6aa8f70\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5b41733c2b0f037c216d2b77ef40db4702a3b7a24a01085e2ba5658eb28efd04?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5b41733c2b0f037c216d2b77ef40db4702a3b7a24a01085e2ba5658eb28efd04?s=96&d=microsoft&r=g\",\"caption\":\"Microsoft Secure Blog Staff\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/trustedcloudteam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Microsoft Azure Security Capabilities Now Available | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/","og_locale":"en_US","og_type":"article","og_title":"New Microsoft Azure Security Capabilities Now Available | Microsoft Security Blog","og_description":"In November, Microsoft CEO Satya Nadella outlined a new comprehensive, cross company approach to security for our mobile-first, cloud-first world. To support this approach, Microsoft invests more than a billion dollars in security research and development, every year.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/","og_site_name":"Microsoft Security Blog","article_published_time":"2016-07-21T16:00:40+00:00","article_modified_time":"2025-12-05T22:13:08+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-microsoft_logo_element.png","type":"image\/png"}],"author":"Microsoft Secure Blog Staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Microsoft Secure Blog Staff","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/trustedcloudteam\/","@type":"Person","@name":"Microsoft Secure Blog Staff"}],"headline":"New Microsoft Azure Security Capabilities Now Available","datePublished":"2016-07-21T16:00:40+00:00","dateModified":"2025-12-05T22:13:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/"},"wordCount":1047,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"keywords":["Elevation of privilege"],"articleSection":["Azure Information Protection","Cloud Computing","Microsoft Defender for Cloud"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/","name":"New Microsoft Azure Security Capabilities Now Available | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"datePublished":"2016-07-21T16:00:40+00:00","dateModified":"2025-12-05T22:13:08+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/07\/21\/new-microsoft-azure-security-capabilities-now-available\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"New Microsoft Azure Security Capabilities Now Available"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/f34e90395a0c3fdc34bc65fbcccf2b96","name":"Microsoft Secure Blog Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5b41733c2b0f037c216d2b77ef40db4702a3b7a24a01085e2ba5658eb28efd04?s=96&d=microsoft&r=g9ba4896519acf014ccc8e2e5e6aa8f70","url":"https:\/\/secure.gravatar.com\/avatar\/5b41733c2b0f037c216d2b77ef40db4702a3b7a24a01085e2ba5658eb28efd04?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5b41733c2b0f037c216d2b77ef40db4702a3b7a24a01085e2ba5658eb28efd04?s=96&d=microsoft&r=g","caption":"Microsoft Secure Blog Staff"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/trustedcloudteam\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/32974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/49"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=32974"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/32974\/revisions"}],"predecessor-version":[{"id":144228,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/32974\/revisions\/144228"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=32974"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=32974"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=32974"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=32974"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=32974"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=32974"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=32974"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=32974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}