{"id":19504,"date":"2025-07-10T09:00:00","date_gmt":"2025-07-10T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=19504"},"modified":"2025-12-03T07:00:39","modified_gmt":"2025-12-03T15:00:39","slug":"securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/","title":{"rendered":"Securing the borderless enterprise: How we\u2019re using AI to reinvent our network security"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">The modern enterprise network is complex, to say the least.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Enterprises like ours are increasingly adopting hybrid infrastructures that span on-premises data centers, multiple cloud environments, and a diverse array of remote users. In this context, traditional security tools are still playing checkers while the malicious actors are playing chess. To make matters worse, attacks are increasingly enabled by AI tools.<\/p>\n\n\n\n<aside class=\"wp-block-group aside-for-guide has-white-200-background-color has-background has-global-padding is-content-justification-right is-layout-constrained wp-container-core-group-is-layout-3f1abf08 wp-block-group-is-layout-constrained\" style=\"border-radius:10px;padding-top:var(--wp--preset--spacing--spacing-12);padding-right:var(--wp--preset--spacing--spacing-12);padding-bottom:var(--wp--preset--spacing--spacing-12);padding-left:var(--wp--preset--spacing--spacing-12)\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-298f84b7 wp-block-group-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:0;padding-bottom:0\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"132\" height=\"132\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/10\/Engage-with-our-experts_blogs.png\" alt=\"\" class=\"wp-image-20636\" style=\"width:48px\"\/><\/figure>\n\n\n\n<p class=\"has-body-lg-font-size wp-block-paragraph\"><strong>Engage with our experts!<\/strong><\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-4)\">Customers or Microsoft account team representatives from Fortune 500 companies are welcome to <a href=\"mailto:msitstaff@microsoft.com\">request a virtual engagement<\/a> on this topic with experts from our Microsoft Digital team.<\/p>\n<\/aside>\n\n\n\n<p class=\"wp-block-paragraph\">That\u2019s why here in Microsoft Digital, the company\u2019s IT organization, we\u2019re using a modern approach and toolset\u2014including AI\u2014to secure our network environment, turning complexity into clarity, one approach, tool, and insight at a time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Leaving traditional network security behind<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">For years, traditional network security relied on a simple but increasingly outdated assumption: everything inside the corporate perimeter can be trusted. This model made sense when networks were static, users were on-premises, and applications lived in a centralized data center.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">But that world is gone.<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Raghavendran_Venkatraman.png\" alt=\"A photo of Venkatraman.\" class=\"wp-image-19524\" style=\"object-fit:cover;width:150px;height:150px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Raghavendran_Venkatraman.png 500w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Raghavendran_Venkatraman-300x300.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Raghavendran_Venkatraman-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\">\u201cImplicit trust must be replaced with explicit verification. That means rethinking how we monitor, how we respond, and how we design for resilience from the start.\u201d<\/p>\n<cite>Raghavendran Venkatraman, principal cloud network engineering manager, Microsoft Digital<\/cite><\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">Today\u2019s enterprise is dynamic, decentralized, and borderless. Hybrid work has become the norm. Cloud adoption is accelerating. Teams are globally distributed. Devices and data move constantly across environments. In this new reality, the network perimeter hasn\u2019t just shifted\u2014it has effectively vanished.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">That\u2019s where the cracks in legacy security models become impossible to ignore.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Visibility becomes fragmented. Security teams struggle to track what\u2019s happening across a sprawling digital estate. Traditional monitoring tools focus on infrastructure uptime or device health\u2014not on the actual experience of the people using the network. That disconnect creates blind spots, and blind spots create risk.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We know that this model no longer meets the needs of a modern, AI-powered enterprise. Every enterprise needs a new approach\u2014one that assumes breach, enforces least-privilege access, and continuously verifies trust.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cImplicit trust must be replaced with explicit verification,\u201d says Raghavendran Venkatraman, a principal cloud network engineering manager in Microsoft Digital. \u201cThat means rethinking how we monitor, how we respond, and how we design for resilience from the start.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This shift is foundational to our security strategy. It\u2019s not just about securing infrastructure\u2014it\u2019s about securing the experience. Because in a world where users, data, and threats are everywhere, trust has to be proved, not assumed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Building a resilient and adaptive security strategy<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">To secure hybrid corporate networks effectively, organizations must go beyond traditional perimeter defenses. They need a comprehensive and adaptive security strategy\u2014one that evolves with the threat landscape and aligns with the complexity of modern enterprise environments. The diversity of hybrid networks introduces new vulnerabilities and expands the attack surface. A static, one-size-fits-all approach simply doesn\u2019t work anymore.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">At Microsoft Digital, we\u2019ve embraced a layered, cloud-first security model that integrates identity, access, encryption, and monitoring across every layer of the network. It\u2019s embedded in everything we do. This model includes these key strategies, which we\u2019ll expand upon in the following sections:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Adopting Zero Trust principles<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Establishing identity as the new perimeter&nbsp;<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Integrating AI and machine learning<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Enforcing network segmentation<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Embracing continuous monitoring<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Adopting Zero Trust principles<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Zero Trust Architecture (ZTA) operates on a strict principle: \u201cnever trust, always verify.\u201d That means no user, device, or application\u2014whether it\u2019s inside or outside the corporate network\u2014is inherently trusted as they are in the traditional network security model.<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Tom_McLeery.png\" alt=\"A photo of McCleery.\" class=\"wp-image-19525\" style=\"object-fit:cover;width:150px;height:150px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Tom_McLeery.png 500w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Tom_McLeery-300x300.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Tom_McLeery-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\">\u201cZero Trust isn\u2019t a product\u2014it\u2019s a mindset. It\u2019s about assuming breach and designing defenses that minimize impact and maximize resilience.&#8221;<\/p>\n<cite>Tom McCleery, principal group cloud network engineer, Microsoft Digital<\/cite><\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">Every access request is evaluated against dynamic policies. These policies consider several factors\u2014like user identity, device health, location, and how sensitive the data being accessed is. For example, if an employee tries to access a financial report from a corporate laptop at the office, they might get in, no problem. But that same request from a personal device in another country could get blocked or trigger extra authentication steps.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">At the heart of ZTA are policy enforcement points that authorize every data flow. These checkpoints only grant access when all conditions are met, and they log every interaction for auditing and threat detection. This kind of granular control reduces the attack surface and limits lateral movement if there is a breach.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Adopting Zero Trust isn\u2019t just a technical upgrade\u2014it\u2019s a strategic must. It boosts an organization\u2019s ability to defend against modern threats like ransomware, insider attacks, and supply chain compromises.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cZero Trust isn\u2019t a product\u2014it\u2019s a mindset,\u201d says Tom McCleery, a principal group cloud network engineer in Microsoft Digital. \u201cIt\u2019s about assuming breach and designing defenses that minimize impact and maximize resilience.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">By embracing Zero Trust, we strengthen our security posture, lowers the risk of data breaches, and responds more effectively to emerging threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Establishing identity as the new perimeter<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Identity is no longer just a component of security\u2014it has become the new perimeter. Traditional security models focused on defending the network edge, assuming that everything inside the perimeter could be trusted. But in today\u2019s hybrid and cloud-first environments, the perimeter has dissolved and that assumption is outdated and dangerous. Users, devices, and applications now operate across diverse locations and platforms, making perimeter-based defenses insufficient.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Identity-first security shifts the focus from securing the physical network to securing the identities\u2014both human and machine\u2014that interact with the network. This means every access request is treated as though it originates from an untrusted source, regardless of where it comes from. Whether it&#8217;s a remote employee logging in from a personal device or an automated workload accessing cloud resources, the system must verify who or what is making the request, assess the risk, and enforce least-privilege access across the user experience.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This approach enables organizations to implement more granular access controls. For example, a developer might be allowed to access a code repository but not production systems, and only during business hours from a managed device. &nbsp;Similarly, a service account used by a&nbsp;Continuous Integration and Continuous Deployment&nbsp;CI\/CD pipeline might be restricted to specific APIs and monitored for anomalous behavior.&nbsp;A CI\/CD pipeline is an automated workflow that takes code from development through testing and into production.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">By anchoring network security around verified identities, organizations reduce their attack surface and improve their ability to detect and respond to threats. This identity-centric model is not just a security enhancement\u2014it\u2019s a strategic shift that aligns with how modern enterprises operate.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Integrating AI and machine learning&nbsp;<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">AI and machine learning (ML) are foundational pillars in our network security strategy. Intelligent automation and advanced analytics help us not only detect and respond to threats, but also continuously improve our security posture in an ever-changing landscape. Here\u2019s how we\u2019re using AI and ML in some critical aspects of our approach to modern network security:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Threat detection and intelligence.<\/strong> We deploy AI-powered monitoring tools that sift through billions of network signals and logs across our hybrid infrastructure. By applying sophisticated ML algorithms, we can identify abnormal behaviors such as unusual login attempts or unexpected data transfers that could indicate a potential breach. These insights allow our security teams to focus on the most critical alerts, reducing noise and accelerating incident investigation.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Automated response and containment.<\/strong> Through automation, our security systems can respond to threats in real time. For example, if our AI models detect suspicious activity on a device, automated workflows can immediately isolate the affected endpoint, block malicious traffic, or revoke access privileges, all without waiting for manual intervention. This rapid response capability is essential for minimizing the potential impact of attacks and protecting our critical assets.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Predictive analysis and proactive defense.<\/strong> We use predictive analytics to forecast emerging vulnerabilities before they can be exploited. By continuously training our models on the latest threat intelligence and attack patterns, we can anticipate risks and strengthen our defenses proactively\u2014whether that means patching vulnerable systems, adjusting access controls, or updating our security policies.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>User experience monitoring.<\/strong> We use AI to assess the real experience of our users, a critical measurement in a network environment where identity is the perimeter. By correlating performance metrics with security signals, we ensure that our security mechanisms don\u2019t degrade productivity and that any anomalies impacting user experience are promptly addressed.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Continuous learning and improvement.<\/strong> Our AI and ML systems are designed to learn from every incident, adapt to new attack techniques, and evolve with the threat landscape. This continuous improvement loop enables our teams to stay ahead of sophisticated adversaries and maintain robust, resilient network security.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Advanced threats require advanced responses. By integrating AI and ML into our network security strategies, we&#8217;re enhancing our ability to detect and respond to threats swiftly, minimize potential damage, and foster a secure environment for innovation and collaboration across our global hybrid infrastructure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Isolating networks to minimize risk<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">In a hybrid infrastructure, isolating network segments is a foundational security principle. By segmenting networks, we limit the scope of potential breaches and reduce the risk of lateral movement by attackers. For example, separating employee productivity networks from customer-facing systems ensures that if a vulnerability is exploited in one area, it doesn\u2019t cascade across the entire environment.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This is especially critical in environments where sensitive customer data and internal development systems coexist. Our testing and development environments must remain completely isolated\u2014not only from customer-facing services but also from internal productivity tools like email, collaboration platforms, and identity systems. This prevents test code or experimental configurations from inadvertently exposing production systems to risk.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We also establish policy enforcement points (PEPs) within each network segment. These act as control gates, inspecting and filtering traffic between zones. By placing PEPs at strategic boundaries, we can tightly control what moves between segments and detect anomalies early. This architecture ensures that, if a breach occurs, the \u201cblast radius\u201d\u2014the scope of impact\u2014is minimal and contained.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This layered approach to segmentation and isolation is essential for maintaining the integrity of our production systems, minimizing risk, and ensuring that our hybrid infrastructure remains resilient in the face of evolving threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Embracing continuous monitoring&nbsp;<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">We\u2019ve stopped thinking of monitoring as a one-time check. Now, it\u2019s a continuous conversation with our network.<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Ragini_Singh.png\" alt=\"A photo of Singh.\" class=\"wp-image-19526\" style=\"object-fit:cover;width:150px;height:150px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Ragini_Singh.png 500w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Ragini_Singh-300x300.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Ragini_Singh-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\">\u201cConventional network performance monitoring\u2014monitoring the systems and infrastructure that support our network\u2014can only tell part of the story. To truly understand and meet our requirements, we must monitor user experiences directly.&#8221;<\/p>\n<cite>Ragini Singh, partner group engineering manager in Microsoft Digital<\/cite><\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">Continuous monitoring is how we stay ahead of issues before they impact our people. It\u2019s how we keep our hybrid infrastructure resilient, performant, and secure\u2014every second of every day.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We\u2019ve built a monitoring ecosystem that spans our entire global network from on-premises offices to cloud-based services in Azure and software-as-a-service (SaaS) platforms. With the mindset that identity is the new perimeter, we\u2019re using signals from all aspects of our environment and focusing on the user experience.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cConventional network performance monitoring\u2014monitoring the systems and infrastructure that support our network\u2014can only tell part of the story,\u201d says Ragini Singh, a partner group engineering manager in Microsoft Digital. \u201cTo truly understand and meet our requirements, we must monitor user experiences directly.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This isn\u2019t just about tools and dashboards. It\u2019s about insight. We\u2019re using synthetic and native metrics to build a hop-by-hop view of the user experience. That lets us pinpoint where things go wrong\u2014and fix them fast. We\u2019re even layering in automation to enable self-healing responses when thresholds are breached.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Continuous monitoring is a strategic shift that helps us protect our people, power our services, and deliver the seamless experience our employees expect.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Looking to the future<strong><\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">As enterprises continue to navigate the complexities of hybrid infrastructures, securing enterprise networks requires an agile, multifaceted approach that integrates Zero Trust principles, identity-first security, and advanced technologies like AI and ML. By shifting the focus from traditional perimeter defenses to a more holistic and adaptive security model, organizations can better protect their assets, maintain operational continuity, and foster innovation in an increasingly interconnected world.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Implementing these strategies not only enhances security but also positions organizations to leverage the full potential of their hybrid infrastructures, driving growth and success in the digital age.<\/p>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge.png\" alt=\"\" class=\"wp-image-19493\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Key takeaways<\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Here are five key actions you can take to strengthen your organization\u2019s network security and embrace a modern approach to network security:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Adopt an identity-first security model.<\/strong> Shift your focus from traditional perimeter-based defenses to verifying and securing every user and device identity\u2014regardless of location or network.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Integrate AI and machine learning into your security strategy.<\/strong> Continuously improve your security posture by using intelligent automation and analytics to detect, respond to, and predict threats more effectively.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Isolate network segments to minimize risk.<\/strong> Separate critical business functions, customer-facing services, and development environments to contain threats and ensure that any potential breach remains limited in scope.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Implement continuous monitoring across your hybrid infrastructure.<\/strong> Move beyond periodic checks by establishing real-time, user-centric monitoring to maintain resilience, performance, and rapid incident response.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Embrace a proactive, adaptive mindset.<\/strong> Regularly update your security policies, train your teams, and stay agile to address emerging threats and support innovation as your organization evolves.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge.png\" alt=\"\" class=\"wp-image-19492\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Try it out<\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/zero-trust\/?OCID=InsideTrack_Product_10695\" target=\"_blank\" rel=\"noreferrer noopener\">Learn about our Zero Trust security model, its principles, and how to implement a Zero Trust architecture at your company.<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge.png\" alt=\"\" class=\"wp-image-19491\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Related links<\/p>\n<\/div>\n\n\n\n<ul style=\"margin-top:var(--wp--preset--spacing--spacing-20)\" class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/zero-trust\/zero-trust-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Find out more about Zero Trust.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/implementing-a-zero-trust-security-model-at-microsoft\/\">Read how we&#8217;re implementing a Zero Trust security model at Microsoft.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/azure.microsoft.com\/en-us\/solutions\/confidential-compute\/?ef_id=_k_55cecd1f0c65138ac826a54aeb130e53_k_&amp;OCID=AIDcmme9zx2qiz_SEM__k_55cecd1f0c65138ac826a54aeb130e53_k_&amp;msclkid=55cecd1f0c65138ac826a54aeb130e53\" target=\"_blank\" rel=\"noreferrer noopener\">Learn how Microsoft Azure confidential computing helps protect data while it&#8217;s in use.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/keeping-our-in-house-optical-network-safe-with-a-zero-trust-mentality\/\">Keeping our in-house optical network safe with a Zero Trust mentality.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/responsible-ai-why-it-matters-and-how-were-infusing-it-into-our-internal-ai-projects-at-microsoft\/\">Check out how we\u2019re infusing Responsible AI into our internal AI projects at Microsoft.<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge.png\" alt=\"\" class=\"wp-image-19490\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">We&#8217;d like to hear from you!<\/p>\n<\/div>\n\n\n\n<ul style=\"margin-top:var(--wp--preset--spacing--spacing-20)\" class=\"wp-block-list is-style-list-no-bullets\">\n<li class=\"wp-block-list-item\"><a href=\"mailto:msitstaff@microsoft.com\">Want more information? Email us and include a link to this story and we\u2019ll get back to you.<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The modern enterprise network is complex, to say the least. Enterprises like ours are increasingly adopting hybrid infrastructures that span on-premises data centers, multiple cloud environments, and a diverse array of remote users. In this context, traditional security tools are still playing checkers while the malicious actors are playing chess. To make matters worse, attacks [&hellip;]<\/p>\n","protected":false},"author":92,"featured_media":19523,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_hide_featured_on_single":false,"_show_featured_caption_on_single":true,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[71,882],"tags":[383,115,849,689,419],"coauthors":[550],"class_list":["post-19504","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-featured","category-it-strategy","tag-azure-networking","tag-microsoft-azure","tag-network-and-infrastructure","tag-network-security","tag-zero-trust","m-blog-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing the borderless enterprise: How we\u2019re using AI to reinvent our network security - Inside Track Blog<\/title>\n<meta name=\"description\" content=\"Learn how we\u2019re using a modern approach and toolset\u2014including AI\u2014to secure our network environment one approach, tool, and insight at a time.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing the borderless enterprise: How we\u2019re using AI to reinvent our network security - Inside Track Blog\" \/>\n<meta property=\"og:description\" content=\"Learn how we\u2019re using a modern approach and toolset\u2014including AI\u2014to secure our network environment one approach, tool, and insight at a time.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Inside Track Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-10T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-03T15:00:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Hero_image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2300\" \/>\n\t<meta property=\"og:image:height\" content=\"1293\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jason Kellington\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jason Kellington\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/\"},\"author\":{\"name\":\"Jason Kellington\",\"@id\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/873dfaa69644d9b2e9861bc6dac478b6\"},\"headline\":\"Securing the borderless enterprise: How we\u2019re using AI to reinvent our network security\",\"datePublished\":\"2025-07-10T16:00:00+00:00\",\"dateModified\":\"2025-12-03T15:00:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/\"},\"wordCount\":2387,\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Hero_image.jpg\",\"keywords\":[\"Azure networking\",\"Microsoft Azure\",\"Network and infrastructure\",\"Network Security\",\"Zero Trust\"],\"articleSection\":[\"Featured\",\"IT strategy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/\",\"url\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/\",\"name\":\"Securing the borderless enterprise: How we\u2019re using AI to reinvent our network security - Inside Track Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Hero_image.jpg\",\"datePublished\":\"2025-07-10T16:00:00+00:00\",\"dateModified\":\"2025-12-03T15:00:39+00:00\",\"author\":{\"@id\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/873dfaa69644d9b2e9861bc6dac478b6\"},\"description\":\"Learn how we\u2019re using a modern approach and toolset\u2014including AI\u2014to secure our network environment one approach, tool, and insight at a time.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Hero_image.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Hero_image.jpg\",\"width\":2300,\"height\":1293,\"caption\":\"We\u2019re using a modern approach and toolset\u2014including AI\u2014to secure our internal network environment at Microsoft.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing the borderless enterprise: How we\u2019re using AI to reinvent our network security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/\",\"name\":\"Inside Track Blog\",\"description\":\"How Microsoft does IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/873dfaa69644d9b2e9861bc6dac478b6\",\"name\":\"Jason Kellington\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d4b158da36ed1724c7b9904b655dca8f848e188c9a11b293da2c41a62cd51391?s=96&d=mm&r=g194a4f0f478cef34134d870cc64e1068\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d4b158da36ed1724c7b9904b655dca8f848e188c9a11b293da2c41a62cd51391?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d4b158da36ed1724c7b9904b655dca8f848e188c9a11b293da2c41a62cd51391?s=96&d=mm&r=g\",\"caption\":\"Jason Kellington\"},\"url\":\"https:\/\/www.microsoft.com\/insidetrack\/blog\/author\/v-jaske\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing the borderless enterprise: How we\u2019re using AI to reinvent our network security - Inside Track Blog","description":"Learn how we\u2019re using a modern approach and toolset\u2014including AI\u2014to secure our network environment one approach, tool, and insight at a time.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/","og_locale":"en_US","og_type":"article","og_title":"Securing the borderless enterprise: How we\u2019re using AI to reinvent our network security - Inside Track Blog","og_description":"Learn how we\u2019re using a modern approach and toolset\u2014including AI\u2014to secure our network environment one approach, tool, and insight at a time.","og_url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/","og_site_name":"Inside Track Blog","article_published_time":"2025-07-10T16:00:00+00:00","article_modified_time":"2025-12-03T15:00:39+00:00","og_image":[{"width":2300,"height":1293,"url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Hero_image.jpg","type":"image\/jpeg"}],"author":"Jason Kellington","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jason Kellington","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/"},"author":{"name":"Jason Kellington","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/873dfaa69644d9b2e9861bc6dac478b6"},"headline":"Securing the borderless enterprise: How we\u2019re using AI to reinvent our network security","datePublished":"2025-07-10T16:00:00+00:00","dateModified":"2025-12-03T15:00:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/"},"wordCount":2387,"image":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Hero_image.jpg","keywords":["Azure networking","Microsoft Azure","Network and infrastructure","Network Security","Zero Trust"],"articleSection":["Featured","IT strategy"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/","name":"Securing the borderless enterprise: How we\u2019re using AI to reinvent our network security - Inside Track Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Hero_image.jpg","datePublished":"2025-07-10T16:00:00+00:00","dateModified":"2025-12-03T15:00:39+00:00","author":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/873dfaa69644d9b2e9861bc6dac478b6"},"description":"Learn how we\u2019re using a modern approach and toolset\u2014including AI\u2014to secure our network environment one approach, tool, and insight at a time.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/#primaryimage","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Hero_image.jpg","contentUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Hero_image.jpg","width":2300,"height":1293,"caption":"We\u2019re using a modern approach and toolset\u2014including AI\u2014to secure our internal network environment at Microsoft."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/securing-the-borderless-enterprise-how-were-using-ai-to-reinvent-our-network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/insidetrack\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing the borderless enterprise: How we\u2019re using AI to reinvent our network security"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/","name":"Inside Track Blog","description":"How Microsoft does IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/873dfaa69644d9b2e9861bc6dac478b6","name":"Jason Kellington","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d4b158da36ed1724c7b9904b655dca8f848e188c9a11b293da2c41a62cd51391?s=96&d=mm&r=g194a4f0f478cef34134d870cc64e1068","url":"https:\/\/secure.gravatar.com\/avatar\/d4b158da36ed1724c7b9904b655dca8f848e188c9a11b293da2c41a62cd51391?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d4b158da36ed1724c7b9904b655dca8f848e188c9a11b293da2c41a62cd51391?s=96&d=mm&r=g","caption":"Jason Kellington"},"url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/author\/v-jaske\/"}]}},"jetpack_featured_media_url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/10695_Hero_image.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9hcZA-54A","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/19504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/users\/92"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/comments?post=19504"}],"version-history":[{"count":17,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/19504\/revisions"}],"predecessor-version":[{"id":21307,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/19504\/revisions\/21307"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media\/19523"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media?parent=19504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/categories?post=19504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/tags?post=19504"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/coauthors?post=19504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}