Security and risk management
-
|
Deploying Microsoft Agent 365: How we’re extending our infrastructure to manage agents at Microsoft
The number and sophistication of agents that our employees are building here at Microsoft is growing rapidly. To help us and all enterprises respond to this new opportunity, the company just announced Microsoft Agent 365 at Microsoft Ignite. This product…
-
|
Moving from a ‘Scream Test’ to holistic lifecycle management: How we manage our Azure services at Microsoft
Nearly a decade ago, as we began our journey from relying on on-premises physical computing infrastructure to being a cloud-first organization, our engineers came up with a simple but effective technique to see if a relatively inactive server was really…
-
|
Hardening our digital defenses with Microsoft Baseline Security Mode
Engage with our experts! Customers or Microsoft account team representatives from Fortune 500 companies are welcome to request a virtual engagement on this topic with experts from our Microsoft Digital team. Security isn’t just a feature—it’s a foundation. As threats…
-
|
The agentic future: How we’re becoming an AI-first frontier firm at Microsoft
The rate of change for AI tools and technology continues to accelerate, and new opportunities to reimagine business processes and employees’ day-to-day work are emerging. Agents are the force driving this evolution forward. Agents are specialized AI tools built to…
-
|
Vuln.AI: Our AI-powered leap into vulnerability management at Microsoft
In today’s hyperconnected enterprise landscape, vulnerability management is no longer a back-office function—it’s a frontline defense. With thousands of devices from a multitude of vendors, and a relentless stream of Common Vulnerabilities and Exposures (CVEs), here at Microsoft we faced…
-
|
Keeping our in-house optical network safe with a Zero Trust mentality
When it comes to corporate connectivity at Microsoft, a minute of lost connection can lead to catastrophic disruptions for our product teams, sleepless nights for our network engineers, and millions of dollars of lost value for the company. That’s why…
-
|
Transforming security and compliance at Microsoft with Windows Hotpatch
Security updates are essential, and every security admin knows that when it comes to applying these updates, faster is better to mitigate the risk. However, security updates have always come with a catch: Windows needs to reboot to apply them.…
-
|
Transforming our VPN with Global Secure Access at Microsoft
Ensuring safe and secure access to resources in the enterprise has always been a delicate balance. Protecting corporate assets from intrusions and misuse is paramount. But a system that neglects usability for employees creates frustration and inefficiencies. At Microsoft, we’re…
-
|
Confidential by design: How we’re securing OneNote for the age of AI at Microsoft
Engage with our experts! Customers or Microsoft account team representatives from Fortune 500 companies are welcome to request a virtual engagement on this topic with experts from our Microsoft Digital team. Here at Microsoft and at workplaces around the world,…
-
|
Five principles that guided our network journey to Microsoft Azure and the cloud at Microsoft
At Microsoft, we operate one of the world’s largest IT infrastructures. So, when we embarked on the journey nearly a decade ago to move from a primarily on-premises network of physical servers to one that now operates almost entirely in…
-
|
Transforming our approach to patch management at Microsoft
Computer security updates, commonly referred to as “patches,” are a crucial aspect of the IT operations of every large organization today. As a global software company with more than 230,000 employees worldwide, we at Microsoft are no different. Like most…