Zero Trust
-
Lessons learned at Microsoft: Five steps you can take to reduce your ransomware risk
As a part of our journey to reduce our ransomware risk internally here at Microsoft, we’ve identified five principles that we believe every enterprise should follow to make themselves more secure from these attacks. We call these our Foundational Five…
-
Seamless and secure cloud printing with Universal Print
There are few office tasks that are as ubiquitous—or potentially as frustrating—as needing to print a document. Whatever your role and wherever you are, it’s likely that you’ll need to utilize the shared office printer next time you’re on site.…
-
Sharing what we learned deploying our secure federal environment
At Microsoft, we serve a diverse range of customers, from individual users and large businesses to sovereign governments with specific regulatory requirements. Our platform products such as Microsoft Azure and our Microsoft 365 productivity suite perform extremely well for these…
-
The future of Group Member Management: How Microsoft is leading the way with automation
Just as it is for everyone, maintaining accurate groups for email and apps such as Microsoft Viva and Microsoft Teams is challenging for us internally at Microsoft. Adding and removing employees from groups has been mostly a hand-cramping manual task,…
-
Sensitivity labeling: A new layer of security for Microsoft Teams Premium meetings
Microsoft Teams is where collaboration and connection happen. The wide array of digital artifacts that come from our employees’ day-to-day meetings—things like recordings, transcripts, and shared documents—need the same level of enterprise protection as the rest of our organization’s proprietary…
-
Unpacking Microsoft’s internal deployment of the first major update to Windows 11
[Editor’s note: This content was written to highlight a particular event or moment in time. Although that moment has passed, we’re republishing it here so you can see what our thinking and experience was like at the time.] Improvements to…
-
Finding and remediating rogue access points on the Microsoft corporate network
Finding rogue access points on Microsoft’s network is an important mission for our IT teams. Networked devices have come to dominate the IT world, and their prevalence has led to more complex and vulnerable gateways. As a result, employees within…
-
Make it easy but secure: Our journey to frictionless device management at Microsoft
With more than 200,000 employees each utilizing a handful of work and personal devices to get work done, the device management landscape at Microsoft is immense, complicated, and fraught with security risk. In short, the point at which our administrator…
-
|
Jamming to a new tune: Transforming Microsoft’s printing infrastructure with Universal Print
[Editor’s note: This content was written to highlight a particular event or moment in time. Although that moment has passed, we’re republishing it here so you can see what our thinking and experience was like at the time.] Most people…
-
Building an anti-ransomware program at Microsoft focused on an Optimal Ransomware Resiliency State
We periodically update our stories, but we can’t verify that they represent the full picture of our current situation at Microsoft. We leave them on the site so you can see what our thinking and experience was at the time.…
-
Why Microsoft uses a playbook to guard against ransomware
We periodically update our stories, but we can’t verify that they represent the full picture of our current situation at Microsoft. We leave them on the site so you can see what our thinking and experience was at the time.…
-
Sharing how Microsoft protects against ransomware
We periodically update our stories, but we can’t verify that they represent the full picture of our current situation at Microsoft. We leave them on the site so you can see what our thinking and experience was at the time.…