{"id":18066,"date":"2025-01-30T09:00:00","date_gmt":"2025-01-30T17:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=18066"},"modified":"2026-03-24T13:33:33","modified_gmt":"2026-03-24T20:33:33","slug":"boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\/","title":{"rendered":"Boosting our Secure Future Initiative at Microsoft with a transformed approach to wired network security"},"content":{"rendered":"\n<figure class=\"wp-block-image alignright size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/ms-digital-technical-stories.png\" alt=\"Microsoft Digital technical stories\" style=\"width:300px\"\/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">If you asked Sean Adams, Justin Griffin, Sajith Balan, or Shyam Sunder Gogi to provide a one-word answer that describes their current focus, you\u2019d get the same answer:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cSecurity.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Adams, Griffin, Balan, and Gogi are all part of a team in Microsoft Digital, the company&#8217;s IT organization, that is implementing internet-first, policy-based security for every single wired network device here at Microsoft.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This immense effort spans our global network and ensures that every device connecting to our network\u2014regardless of how or where\u2014is identified, attested, authenticated, and placed on the proper network first.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cOur default network posture for any device that connects is internet-first,\u201d Adams says. \u201cThe majority of tools Microsoft employees use are cloud-based and internet-friendly in our modern workplace, so it only makes sense. The concept of a corporate network where we inherently trust physically connected devices is long gone\u2014and good riddance.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">It\u2019s one example of how we\u2019re demonstrating our organization-wide commitment to security.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In May 2024, <a href=\"https:\/\/blogs.microsoft.com\/blog\/2024\/05\/03\/prioritizing-security-above-all-else\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft CEO Satya Nadella committed to the idea that we would prioritize security above all else here at Microsoft<\/a>. At the center of that commitment is our <a href=\"https:\/\/www.microsoft.com\/en-us\/trust-center\/security\/secure-future-initiative\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Secure Future Initiative (SFI)<\/a>, which brings together every part of the company to advance cybersecurity protection across new products and our legacy infrastructure.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The SFI provides Microsoft with an overarching set of principles and pillars that we\u2019re building upon with everything we do, from the broadest reaches of our cloud networking infrastructure to each individual wired network port in our buildings and datacenters.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Secure Future Initiative commitment<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The SFI is the single largest cybersecurity initiative engineering project in our history, with more than 34,000 engineers committed to advancing the principles laid out in the SFI. Three principles define exactly how we\u2019re prioritizing cybersecurity in our products and infrastructure:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Secure by design.<\/strong> Security comes first when designing any product or service.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Secure by default.<\/strong> Security protections are enabled and enforced by default, require no extra effort, and aren\u2019t optional.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Secure operations.<\/strong> Security controls and monitoring will be continuously improved to meet current and future cyberthreats.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">These principles anchor our approach to security internally at Microsoft. We\u2019re continuously applying what we\u2019ve learned from incidents to improve our methods and practices, ensuring that security is paramount in everything we do, create, and provide.<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/01\/Sajith-Balan.png\" alt=\"A photo of Balan.\" class=\"wp-image-22650\" style=\"width:150px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/01\/Sajith-Balan.png 500w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/01\/Sajith-Balan-300x300.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/01\/Sajith-Balan-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\">\u201cThe SFI aligns seamlessly with Zero Trust principles. With Zero Trust, everything within the network is scrutinized and verified, which supports exactly how the SFI should impact our network.\u201d<\/p>\n<cite>Sajith Balan, principal cloud network engineering manager, Microsoft Digital<\/cite><\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">Applying practical pillars<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">We apply these principles through our security pillars, which are to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Protect identities and secrets.<\/strong> Reduce the risk of unauthorized access by implementing and enforcing best-in-class standards across all identity and secrets infrastructure, plus user and application authentication and authorization.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Protect tenants and isolate systems.<\/strong> Protect all our tenants and production environments using consistent, best-in-class security practices and strict isolation to minimize breadth of impact.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Protect engineering systems.<\/strong> Protect software assets and continuously improve code security through governance of the software supply chain and engineering systems infrastructure.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Monitor and detect cyberthreats.<\/strong> Provide comprehensive coverage and automatic detection of cyberthreats to our production infrastructure and services.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Accelerate response and remediation.<\/strong> Prevent exploitation of vulnerabilities discovered by external and internal entities through comprehensive and timely remediation.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Protect networks.<\/strong> Protect our production networks and implement network isolation of Microsoft and customer resources.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cThe SFI aligns seamlessly with Zero Trust principles,\u201d says Balan, a principal cloud network engineering manager in Microsoft Digital. \u201cWith Zero Trust, everything within the network is scrutinized and verified, which supports exactly how the SFI should impact our network. We started off with Zero Trust networking, which is now directly aligned with SFI. It&#8217;s about strengthening security while minimizing any employee disruption.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Based on the principle of verified trust\u2014to trust, you must first verify\u2014Zero Trust eliminates the inherent trust that is assumed inside the traditional corporate network. Zero Trust architecture reduces risk across all environments by establishing strong identity verification, validating device compliance prior to granting access, and ensuring least privilege access to only explicitly authorized resources.<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/01\/Justin-Griffin-2.png\" alt=\"A photo of Griffin.\" class=\"wp-image-22651\" style=\"width:150px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/01\/Justin-Griffin-2.png 500w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/01\/Justin-Griffin-2-300x300.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/01\/Justin-Griffin-2-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\">\u201cOur wired network security puts physically connected devices in almost the exact same position as wireless devices. With Zero Trust, being physically connected means nothing, as far as security goes. Every device, every connection, every resource request is authenticated, authorized, and monitored, from end to end.\u201d<\/p>\n<cite>Justin Griffin, principal group network engineering manager, Microsoft Digital<\/cite><\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">Zero Trust requires that every transaction between systems (user identity, device, network, and applications) be validated and proven trustworthy before the transaction can occur. In an ideal Zero Trust environment, the following behaviors are required:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Identities are validated and secure with multifactor authentication (MFA) everywhere<\/strong>. Using multifactor authentication eliminates password expirations and eventually will eliminate passwords.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Devices are managed and validated as healthy<\/strong>. Device health validation is required. All device types and operating systems must meet a required minimum health state as a condition of access to any Microsoft resource.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Telemetry is pervasive<\/strong>. Pervasive data and telemetry are used to understand the current security state, identify gaps in coverage, validate the impact of new controls, and correlate data across all applications and services in the environment.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Least privilege access is enforced<\/strong>. Limit access to only the applications, services, and infrastructure required to perform the job function.<\/li>\n<\/ul>\n\n\n\n<h1 class=\"wp-block-heading\">Enforced security for wired networking<\/h1>\n\n\n\n<p class=\"wp-block-paragraph\">Our wired network connectivity policy is rooted in the SFI and Zero Trust. The security posture that this policy creates for every wired network device at Microsoft is critical to applying the principles of SFI and Zero Trust.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cOur wired network security puts physically connected devices in almost the exact same position as wireless devices,\u201d says Griffin, a principal group network engineering manager in Microsoft Digital. \u201cWith Zero Trust, being physically connected means nothing, as far as security goes. Every device, every connection, every resource request is authenticated, authorized, and monitored, from end to end.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Using the internet as the default network for devices is at the core of Microsoft\u2019s wired network security. Unless the need is critical\u2014and authorized\u2014every device that connects to our network is routed to the internet, by default.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Griffin and the team have been working consistently for the past five years to implement comprehensive wired network security. The policy engines, networking hardware, and supporting technology for wired network security enforcement require time, effort, and\u2014in many cases\u2014physical presence to implement the solution properly.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The scope and impact are massive.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cThis is probably the single largest network change our enterprise has ever seen,\u201d Adams says.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">With more than 700 buildings, 4,000 network switches, and almost 300,000 wired network devices, getting a device onto the appropriate network segment happens multiple times every second across our network.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The network segmentation strategy for wired network security is a critical component of the overall security framework. This strategy involves several key practices and principles to ensure robust security and efficient network management.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We use macro-segmentation to create distinct segments within the corporate network. This approach restricts access to only the necessary systems within each segment, thereby reducing the risk of unauthorized access and lateral movement within the network.<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/01\/Shyam-Sunder-Gogi.png\" alt=\"\" class=\"wp-image-22652\" style=\"width:150px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/01\/Shyam-Sunder-Gogi.png 500w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/01\/Shyam-Sunder-Gogi-300x300.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/01\/Shyam-Sunder-Gogi-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\">\u201cUsing a phased approach isn\u2019t new at Microsoft. However, our success in rolling out wired port security depended directly on how we planned and structured our phases or, more accurately, our rings.&#8221;<\/p>\n<cite>Shyam Sunder Gogi, senior technical program manager, Microsoft Digital<\/cite><\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">Micro-segmentation is applied to further isolate network resources. Least-privilege access policies ensure that users and devices have only the minimum level of access required for their roles. This principle extends to both on-premises environments and cloud resources, including infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) resources.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Our layered defense approach includes using monitoring tools, access control lists (ACLs), network security groups, network address translation (NAT) gateways, and bastions to secure the network environment. These measures help to detect and prevent malicious activities, ensuring that the network remains secure even in the face of potential threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Using iteration and consistency in implementation<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Implementation of our wired network security used a phased approach, and it began more than five years ago.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">During the COVID-19 pandemic, significant testing was conducted to ensure that the supporting network infrastructure could continue to function independently and support all devices and networks without interruption, even when connectivity issues arose. The team created robust policies that allowed for seamless re-authentication and re-attestation after connectivity was restored.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In those initial phases, confirming configuration and monitoring results were important, so the team started small and learned from their progress.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cUsing a phased approach isn\u2019t new at Microsoft,\u201d says Gogi, a senior technical program manager in Microsoft Digital. \u201cHowever, our success in rolling out wired port security depended directly on how we planned and structured our phases or, more accurately, our rings.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The ring-based approach was designed to minimize disruptions and ensure that security measures were robust and reliable. Changes gradually rolled out in stages, starting with smaller, controlled environments before being expanded to the entire network. This approach allowed for continuous monitoring and adjustments, ensuring that any issues could be addressed promptly without affecting the entire network.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Adams highlights the importance of the iterative approach.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cAt our scale, we had to be efficient and accurate,\u201d he says. \u201cDowntime was out of the question, and we certainly didn\u2019t want gaps in service availability or applied security measures.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Automation played a crucial role in the implementation process. Automated tools were developed to standardize configurations across all network switches, ensuring a consistent and predictable user experience. Standardizing through automation helped maintain adequate security measures while also making the deployment process more efficient.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Automating user-initiated device onboarding<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Our GetConnected portal is an essential tool for securely connecting devices to our corporate network. The GetConnected portal, hosted on our internal corporate intranet site, ensures that all devices meet necessary security standards to protect employees, customers, and data.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The portal provides a centralized location for all network access needs, allowing our employees to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Register managed or personal devices to specific Microsoft networks<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Delete devices from Microsoft networks<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Move devices between different Microsoft networks<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Manage changes to both managed and personal devices<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">When connecting a managed device to the wired network in one of our buildings, devices are placed into an internet-connected segment with enterprise-quality connection and bandwidth. To access tools or services on the corporate network, devices must be registered at the GetConnected portal. <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\">\u201cWe\u2019ve learned a lot. There are some best practices that can make implementation much more efficient and simplify the transition to a secure, internet-first posture.\u201d<\/p>\n<cite>Sean Adams, principal network engineer, Microsoft Digital<\/cite><\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">The portal uses Microsoft Entra ID\u2019s Conditional Access capabilities to enforce user access based on device groupings and user profiles, connecting the user-directed registration process to our cloud-based identity management systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Getting your wired network security right<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Five years of network implementation comes with some lessons.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cWe\u2019ve learned a lot,\u201d says Adams, a principal network engineer in Microsoft Digital. \u201cThere are some best practices that can make implementation much more efficient and simplify the transition to a secure, internet-first posture.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">These practices were not only instrumental in achieving the desired security outcomes but also in ensuring the seamless operation of the entire network infrastructure through implementation. Here are some key strategies and methodologies that proved to be critical in the successful deployment of wired network security at Microsoft:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Plan for global reach<\/strong>. Wired network security efforts must span across the entire infrastructure, encompassing data centers, offices, and remote locations. This ensures that all network segments, regardless of their geographical location, adhere to the same high standards of security.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Comprehensive asset management.<\/strong> Our teams have identified, inventoried, and attributed accountability for more than 99.3% of its physical assets. This foundational step is crucial for implementing effective network security measures.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cThis is a critical component,\u201d Balan says. \u201cDevice accountability is a first line of defense. Knowing who owns every device on the network ensures faster security response, targeted containment, and accountability. When incidents strike, attribution means quicker resolution and stronger protection.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Service tagging and traffic identification.<\/strong> Service tagging for new IP address allocations helps to enable precise traffic identification across the network. This capability helps detect malicious activity and simplifies the management of ACLs for both infrastructure and services.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Harden network devices.<\/strong> We\u2019ve put significant effort into hardening network devices and improving lifecycle management policies. This includes developing scalable and automated methods for secret rotation, making secrets unique per device, and implementing unique per-device authentication and one-time passwords for service accounts.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Use micro-segmentation and access controls.<\/strong> Implementing microsegmentation ACLs further secures the management of the network. This approach limits access to a known scope of trusted production-ready locked-down machines, significantly reducing the impact of exposed secrets.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Embrace Zero Trust principles.<\/strong> Our entire network security strategy is aligned with Zero Trust principles, ensuring that every access request is thoroughly authenticated and authorized. This involves migrating resources to internet-facing environments and implementing strict access controls.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Scale efficiently with automation and standardization.<\/strong> Automation plays a critical role in maintaining a consistent and predictable user experience across all network switches. Standardizing configurations ensures that the network behaves uniformly at every site, facilitating efficient management and security.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\">&#8220;This is a significant advancement in our security posture and demonstrates our commitment to protecting our assets against unauthorized access. Our internet-first posture and alignment with Zero Trust principles ensure that we&#8217;ll continuously examine and iterate our network environment to improve our security posture and remain prepared for the future.&#8221;<\/p>\n<cite>Sajith Balan, principal cloud network engineering manager, Microsoft Digital<\/cite><\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">Looking forward<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Our future efforts in wired network security will continue to evolve, focusing on supporting Zero Trust principles and the Secure Foundation Initiative (SFI), enhancing security, improving user experience, and ensuring the resilience of our network infrastructure as we go.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We\u2019re continuously improving the employee experience, building on the success of the GetConnected portal. We want to maintain a balance between security and employee experience as we improve the security posture of our network, ensuring that security measures don\u2019t hinder productivity.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The team is excited about the future of wired network security and the SFI at Microsoft.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">&#8220;This is a significant advancement in our security posture and demonstrates our commitment to protecting our assets against unauthorized access,\u201d Balan says. \u201cOur internet-first posture and alignment with Zero Trust principles ensure that we&#8217;ll continuously examine and iterate our network environment to improve our security posture and remain prepared for the future.&#8221;<\/p>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge.png\" alt=\"\" class=\"wp-image-19493\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Key takeaways<\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Consider the following best practices when planning to implement wired network security at your own organization:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Plan for global reach<\/strong> by ensuring that your network security efforts span across all locations, including data centers, offices, and remote sites.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Conduct comprehensive asset management<\/strong> by identifying, inventorying, and attributing accountability for physical assets to implement effective security measures.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Use service tagging for new IP address allocations<\/strong> to enable precise traffic identification and simplify the management of ACLs.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Harden your network devices<\/strong> by developing scalable and automated methods for secret rotation, unique per-device authentication, and one-time passwords for service accounts.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Implement micro-segmentation and access controls<\/strong> to limit access to trusted, production-ready, locked-down machines, thereby reducing the impact of exposed secrets.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Embrace Zero Trust principles<\/strong> by thoroughly authenticating and authorizing every access request and migrating resources to internet-facing environments with strict access controls.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Scale efficiently with automation and standardization<\/strong> to maintain a consistent and predictable user experience across all network switches and ensure uniform behavior at every site.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge.png\" alt=\"\" class=\"wp-image-19492\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Try it out<\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/fundamentals\/whatis?OCID=InsideTrack_Product_10665\" target=\"_blank\" rel=\"noreferrer noopener\">Get started with Microsoft Entra ID.<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge.png\" alt=\"\" class=\"wp-image-19491\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Related links<\/p>\n<\/div>\n\n\n\n<ul style=\"margin-top:var(--wp--preset--spacing--spacing-20)\" class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/modernizing-it-infrastructure-at-microsoft-a-cloud-native-journey-with-azure\/\">Read about our cloud-native network journey with Microsoft Azure.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/keeping-our-network-infrastructure-healthy-at-microsoft-with-an-employee-built-ai-agent\/\">See how we&#8217;re keeping our network infrastructure healthy at Microsoft with an employee-built AI agent<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/hardening-our-digital-defenses-with-microsoft-baseline-security-mode\/\">Learn how we&#8217;re hardening our digital defenses with Microsoft Baseline Security Mode.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/implementing-a-zero-trust-security-model-at-microsoft\/\">Explore how we\u2019re implementing a Zero Trust security model at Microsoft.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-our-vpn-with-global-secure-access-at-microsoft\/\">Find out how we\u2019re transforming our VPN with Global Secure Access at Microsoft.<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge.png\" alt=\"\" class=\"wp-image-19490\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">We&#8217;d like to hear from you!<\/p>\n<\/div>\n\n\n\n<ul style=\"margin-top:var(--wp--preset--spacing--spacing-20)\" class=\"wp-block-list is-style-list-no-bullets\">\n<li class=\"wp-block-list-item\"><a href=\"mailto:msitstaff@microsoft.com\">Want more information? Email us and include a link to this story and we\u2019ll get back to you.<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>If you asked Sean Adams, Justin Griffin, Sajith Balan, or Shyam Sunder Gogi to provide a one-word answer that describes their current focus, you\u2019d get the same answer: \u201cSecurity.\u201d Adams, Griffin, Balan, and Gogi are all part of a team in Microsoft Digital, the company&#8217;s IT organization, that is implementing internet-first, policy-based security for every [&hellip;]<\/p>\n","protected":false},"author":92,"featured_media":18068,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_hide_featured_on_single":false,"_show_featured_caption_on_single":true,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[71],"tags":[89,849,689,848,419],"coauthors":[550],"class_list":["post-18066","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-featured","tag-digital-transformation","tag-network-and-infrastructure","tag-network-security","tag-security-and-risk-management","tag-zero-trust","m-blog-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Boosting our Secure Future Initiative at Microsoft with a transformed approach to wired network security - Inside Track Blog<\/title>\n<meta name=\"description\" content=\"Learn how we\u2019re supporting Zero Trust Networking and our Secure Future Initiative internally here at Microsoft with wired network security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Boosting our Secure Future Initiative at Microsoft with a transformed approach to wired network security - Inside Track Blog\" \/>\n<meta property=\"og:description\" content=\"Learn how we\u2019re supporting Zero Trust Networking and our Secure Future Initiative internally here at Microsoft with wired network security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Inside Track Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-30T17:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-24T20:33:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/01\/10665_social_image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"740\" \/>\n\t<meta property=\"og:image:height\" content=\"417\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jason Kellington\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jason Kellington\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\\\/\"},\"author\":{\"name\":\"Jason Kellington\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/873dfaa69644d9b2e9861bc6dac478b6\"},\"headline\":\"Boosting our Secure Future Initiative at Microsoft with a transformed approach to wired network security\",\"datePublished\":\"2025-01-30T17:00:00+00:00\",\"dateModified\":\"2026-03-24T20:33:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\\\/\"},\"wordCount\":2691,\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2025\\\/01\\\/10665_hero_image.jpg\",\"keywords\":[\"digital transformation\",\"Network and infrastructure\",\"Network Security\",\"Security and risk management\",\"Zero Trust\"],\"articleSection\":[\"Featured\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\\\/\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\\\/\",\"name\":\"Boosting our Secure Future Initiative at Microsoft with a transformed approach to wired network security - Inside Track Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2025\\\/01\\\/10665_hero_image.jpg\",\"datePublished\":\"2025-01-30T17:00:00+00:00\",\"dateModified\":\"2026-03-24T20:33:33+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/873dfaa69644d9b2e9861bc6dac478b6\"},\"description\":\"Learn how we\u2019re supporting Zero Trust Networking and our Secure Future Initiative internally here at Microsoft with wired network security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2025\\\/01\\\/10665_hero_image.jpg\",\"contentUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2025\\\/01\\\/10665_hero_image.jpg\",\"width\":2300,\"height\":1293,\"caption\":\"We\u2019re upholding our Zero Trust Networking vision and fulfilling our Secure Future Initiative commitments by rethinking our wired network security.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Boosting our Secure Future Initiative at Microsoft with a transformed approach to wired network security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/\",\"name\":\"Inside Track Blog\",\"description\":\"How Microsoft does IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/873dfaa69644d9b2e9861bc6dac478b6\",\"name\":\"Jason Kellington\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d4b158da36ed1724c7b9904b655dca8f848e188c9a11b293da2c41a62cd51391?s=96&d=mm&r=g194a4f0f478cef34134d870cc64e1068\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d4b158da36ed1724c7b9904b655dca8f848e188c9a11b293da2c41a62cd51391?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d4b158da36ed1724c7b9904b655dca8f848e188c9a11b293da2c41a62cd51391?s=96&d=mm&r=g\",\"caption\":\"Jason Kellington\"},\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/author\\\/v-jaske\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Boosting our Secure Future Initiative at Microsoft with a transformed approach to wired network security - Inside Track Blog","description":"Learn how we\u2019re supporting Zero Trust Networking and our Secure Future Initiative internally here at Microsoft with wired network security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/insidetrack\/blog\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\/","og_locale":"en_US","og_type":"article","og_title":"Boosting our Secure Future Initiative at Microsoft with a transformed approach to wired network security - Inside Track Blog","og_description":"Learn how we\u2019re supporting Zero Trust Networking and our Secure Future Initiative internally here at Microsoft with wired network security.","og_url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\/","og_site_name":"Inside Track Blog","article_published_time":"2025-01-30T17:00:00+00:00","article_modified_time":"2026-03-24T20:33:33+00:00","og_image":[{"width":740,"height":417,"url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/01\/10665_social_image.jpg","type":"image\/jpeg"}],"author":"Jason Kellington","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jason Kellington","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\/"},"author":{"name":"Jason Kellington","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/873dfaa69644d9b2e9861bc6dac478b6"},"headline":"Boosting our Secure Future Initiative at Microsoft with a transformed approach to wired network security","datePublished":"2025-01-30T17:00:00+00:00","dateModified":"2026-03-24T20:33:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\/"},"wordCount":2691,"image":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/01\/10665_hero_image.jpg","keywords":["digital transformation","Network and infrastructure","Network Security","Security and risk management","Zero Trust"],"articleSection":["Featured"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\/","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\/","name":"Boosting our Secure Future Initiative at Microsoft with a transformed approach to wired network security - Inside Track Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/01\/10665_hero_image.jpg","datePublished":"2025-01-30T17:00:00+00:00","dateModified":"2026-03-24T20:33:33+00:00","author":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/873dfaa69644d9b2e9861bc6dac478b6"},"description":"Learn how we\u2019re supporting Zero Trust Networking and our Secure Future Initiative internally here at Microsoft with wired network security.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/insidetrack\/blog\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\/#primaryimage","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/01\/10665_hero_image.jpg","contentUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/01\/10665_hero_image.jpg","width":2300,"height":1293,"caption":"We\u2019re upholding our Zero Trust Networking vision and fulfilling our Secure Future Initiative commitments by rethinking our wired network security."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/boosting-our-secure-future-initiative-at-microsoft-with-a-transformed-approach-to-wired-network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/insidetrack\/blog\/"},{"@type":"ListItem","position":2,"name":"Boosting our Secure Future Initiative at Microsoft with a transformed approach to wired network security"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/","name":"Inside Track Blog","description":"How Microsoft does IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/873dfaa69644d9b2e9861bc6dac478b6","name":"Jason Kellington","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d4b158da36ed1724c7b9904b655dca8f848e188c9a11b293da2c41a62cd51391?s=96&d=mm&r=g194a4f0f478cef34134d870cc64e1068","url":"https:\/\/secure.gravatar.com\/avatar\/d4b158da36ed1724c7b9904b655dca8f848e188c9a11b293da2c41a62cd51391?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d4b158da36ed1724c7b9904b655dca8f848e188c9a11b293da2c41a62cd51391?s=96&d=mm&r=g","caption":"Jason Kellington"},"url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/author\/v-jaske\/"}]}},"jetpack_featured_media_url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/01\/10665_hero_image.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9hcZA-4Ho","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/18066","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/users\/92"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/comments?post=18066"}],"version-history":[{"count":15,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/18066\/revisions"}],"predecessor-version":[{"id":22690,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/18066\/revisions\/22690"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media\/18068"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media?parent=18066"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/categories?post=18066"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/tags?post=18066"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/coauthors?post=18066"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}