security
-
The future of Group Member Management: How Microsoft is leading the way with automation
Just as it is for everyone, maintaining accurate groups for email and apps such as Microsoft Viva and Microsoft Teams is challenging for us internally at Microsoft. Adding and removing employees from groups has been mostly a hand-cramping manual task,…
-
Sensitivity labeling: A new layer of security for Microsoft Teams Premium meetings
Microsoft Teams is where collaboration and connection happen. The wide array of digital artifacts that come from our employees’ day-to-day meetings—things like recordings, transcripts, and shared documents—need the same level of enterprise protection as the rest of our organization’s proprietary…
-
Sharing Microsoft’s Zero Trust networking lessons for leaders
Today we want to share the lessons we’re learning from deploying Zero Trust networking across Microsoft. In many enterprises, network security has traditionally focused on strictly secured and monitored corporate network perimeters. Today, in a mobile-first and cloud-first world, business…
-
Unpacking Microsoft’s internal deployment of the first major update to Windows 11
[Editor’s note: This content was written to highlight a particular event or moment in time. Although that moment has passed, we’re republishing it here so you can see what our thinking and experience was like at the time.] Improvements to…
-
Harnessing first-party patching technology to drive innovation at Microsoft
We live in a world where network security is a foundational concern for large enterprises like ours that are trusted with sensitive customer data. This creates an environment where we all need to ensure that we have high patching compliance…
-
Boosting Windows internally at Microsoft with a transformed approach to patching
You’re only as secure as your most vulnerable machine. That leaves enterprises like ours at risk when our employees don’t update to the latest software version on a timely basis. Bad actors are tirelessly pursuing the smallest of vulnerabilities, so…
-
Building an anti-ransomware program at Microsoft focused on an Optimal Ransomware Resiliency State
We periodically update our stories, but we can’t verify that they represent the full picture of our current situation at Microsoft. We leave them on the site so you can see what our thinking and experience was at the time.…
-
Why Microsoft uses a playbook to guard against ransomware
We periodically update our stories, but we can’t verify that they represent the full picture of our current situation at Microsoft. We leave them on the site so you can see what our thinking and experience was at the time.…
-
Sharing how Microsoft protects against ransomware
We periodically update our stories, but we can’t verify that they represent the full picture of our current situation at Microsoft. We leave them on the site so you can see what our thinking and experience was at the time.…
-
How Microsoft narrows the threat funnel on over 600 billion monthly security events
At Microsoft, we typically see around 600 billion security events each month. Security events are innocuous actions that happen all the time, ranging from adding a user to a Microsoft SharePoint site, to creating a file, to deleting a folder,…