Skip to main content
Skip to main content
Microsoft
Security
Security
  • Home
    • Solutions overview
    • Secure remote work
    • Zero Trust
    • Identity & access management
      • Identity and access management
      • Protect against identity compromise
      • Seamless user experiences
      • Unified identity and access management
      • Simplified identity governance
      • Secure seamless access to all your apps
      • Decentralized identity, blockchain and privacy
    • Threat protection
    • Information protection
    • Cloud security
    • App and email security
      • Microsoft Defender for Office 365
      • Microsoft Cloud App Security
      • Azure Key Vault
      • Azure Dedicated HSM
    • Compliance
      • Insider risk management
      • Information protection and governance
      • Advanced eDiscovery
      • Compliance management
    • Endpoint security
      • Microsoft Defender for Endpoint
      • Microsoft Endpoint Manager
      • Azure IoT Central
      • Azure Sphere
    • Identity and access management
      • Azure Active Directory
      • SSO solution: Secure app access with single sign-on
      • Multifactor authentication (MFA)
      • Conditional Access
      • Identity protection
      • Privileged Identity Management (PIM)
      • External identities
      • Passwordless Authentication
    • Network security
      • Azure Application Gateway
      • Azure VPN Gateway
      • Azure DDoS Protection
      • Azure Firewall manager
      • Azure Front-door
      • Azure Web Application Firewall
    • Security posture
      • Azure Security Center
      • Microsoft Secure Score
    • SIEM and XDR
      • Azure Sentinel
      • Microsoft 365 Defender
      • Azure Defender
      • SIEM and XDR overview
  • Operations
    • Partners Overview
    • Find a partner
    • Security Association
    • Government partners
    • Industry Alliances
    • Solorigate detection guidance
    • Security fundamentals
    • Webcasts, whitepapers & more
    • Security Technical Content Library
    • Intelligence
    • Events
    • Security blog
    • Trust Center
    • Security
    • Privacy
    • Compliance
    • Service Trust Portal
      • Microsoft 365
      • Azure
      • Office 365
      • Dynamics 365
      • Power Platform
      • Windows 10
    • Products & Services
      • Windows Server
      • Enterprise Mobility + Security
      • Power BI
      • Teams
      • Visual Studio
      • Microsoft Advertising
    • Emerging Technologies
      • AI
      • Internet of Things
      • Azure Cognitive Services
      • Quantum
      • Microsoft HoloLens
      • Mixed Reality
    • Developer & IT
      • Docs
      • Developer Center
      • Windows Dev Center
      • Windows IT Pro Center
      • FastTrack
      • Power Platform
    • Partner
      • Partner Network
      • Solution Providers
      • Partner Center
      • Cloud Hosting
    • Industries
      • Education
      • Financial services
      • Government
      • Health
      • Manufacturing & resources
      • Retail
    • Other
      • Security
      • Licensing
      • AppSource
      • Azure Marketplace
      • Events
      • Research
    • View Sitemap
    Sign in
    Man sitting at a community table in common area typing on a Surface laptop with a phone at his side. Secure unmanaged devices with Microsoft Defender for Endpoint now
    April 13, 2021

    Secure unmanaged devices with Microsoft Defender for Endpoint now

    New Microsoft Defender for Endpoint capabilities let organizations discover and secure unmanaged workstations, mobile devices, servers, and network devices.

    Read more Secure unmanaged devices with Microsoft Defender for Endpoint now
    Recent articles
      • See all
      • Azure Active Directory
      • Azure Defender
      • Azure Information Protection
      • Azure Sentinel
      • Microsoft 365 Defender
      • Microsoft 365 Security
      • Microsoft Authenticator
      • Microsoft Cloud App Security
      • Microsoft Defender for Endpoint
      • Microsoft Defender for Office 365
      • Microsoft Endpoint Manager
      • Microsoft Graph Security API
      • Office 365 Security
      • Secure Score
      • Windows Security
      • XDR
      • See all
      • AI and machine learning
      • Automation
      • Cloud Access Security Broker
      • Compliance
      • Cybersecurity policy
      • Data governance
      • Email security
      • Encryption
      • Endpoint security
      • GDPR
      • Identity and access management
      • Incident response
      • Information/data protection
      • IoT
      • Mobile security
      • Network security
      • Phishing
      • Ransomware
      • Security deployment
      • Security intelligence
      • Security management
      • Security operations
      • Security strategies
      • SIEM
      • Threat protection
      • XDR
      • Zero trust
      • See all
      • CISO series
      • Compliance
      • Identity and access management
      • Integrated Threat Protection
      • IoT security
      • Microsoft Detection and Response Team (DART)
      • Microsoft Intelligent Security Association (MISA)
      • Microsoft security intelligence
      • Secure remote work
      • Security deployment
      • Voice of the community
      • Voice of the customer
      • Azure Active Directory Identity
      • Enterprise Mobility + Security
      • Microsoft 365
      • Microsoft Endpoint Management
      • Microsoft Security Guidance
      • Microsoft Security Response Center
      • Security in Azure
      • Security Research & Defense
    Subscribe
    Two women working in lab. Featured image for CyberMDX and Microsoft: Protecting life-saving medical devices
    April 15, 2021

    CyberMDX and Microsoft: Protecting life-saving medical devices

    While hospitals continue to battle the COVID-19 pandemic, many are battling other “viruses” behind the scenes.
    Read more CyberMDX and Microsoft: Protecting life-saving medical devices
    Contextual image of woman touching screen while working on Black Surface Laptop2. Featured image for How far have we come? The evolution of securing identities
    April 13, 2021

    How far have we come? The evolution of securing identities

    What are today’s biggest identity challenges? Have I Been Pwned Founder Troy Hunt talks with Microsoft about the current state of identity.
    Read more How far have we come? The evolution of securing identities
    Featured image for Investigating a unique “form” of email delivery for IcedID malware
    April 9, 2021

    Investigating a unique “form” of email delivery for IcedID malware

    Microsoft threat analysts have been tracking activity where contact forms published on websites are abused to deliver malicious links to enterprises using emails with fake legal threats. The emails instruct recipients to click a link to review supposed evidence behind their allegations, but are instead led to the download of IcedID, an info-stealing malware.
    Read more Investigating a unique “form” of email delivery for IcedID malware
    IT professionals build and maintain server farm. Featured image for Threat matrix for storage services
    April 8, 2021

    Threat matrix for storage services

    Storage services are one of the most popular services in the cloud. In this blog, we outline potential risks that you should be aware of when deploying, configuring, or monitoring your storage environment.
    Read more Threat matrix for storage services
    Featured image for Gamifying machine learning for stronger security and AI models
    April 8, 2021

    Gamifying machine learning for stronger security and AI models

    We are open sourcing the Python source code of a research toolkit we call CyberBattleSim, an experimental research project that investigates how autonomous agents operate in a simulated enterprise environment using high-level abstraction of computer networks and cybersecurity concepts.
    Read more Gamifying machine learning for stronger security and AI models
    Featured image for Microsoft Defender for Endpoint now supports Windows 10 on Arm devices
    April 5, 2021

    Microsoft Defender for Endpoint now supports Windows 10 on Arm devices

    Today, we are excited to announce that Microsoft Defender for Endpoint support of Windows 10 on Arm devices is generally available. This expanded support is part of our continued efforts to extend Microsoft Defender for Endpoint capabilities across all the endpoints defenders need to secure.
    Read more Microsoft Defender for Endpoint now supports Windows 10 on Arm devices
    Over the shoulder photo of an adult woman at her dinning table looking at her Microsoft Outlook inbox. Featured image for Protect your business from email phishing with multi-factor authentication
    April 5, 2021

    Protect your business from email phishing with multi-factor authentication

    Cybersecurity has been in the news far more often in the past 12 months than in previous years, as cybercriminals escalated their activity during the COVID-19 pandemic lockdown.
    Read more Protect your business from email phishing with multi-factor authentication
    Adult male sitting in airport terminal working on his laptop. Featured image for BlueVoyant optimizes customer security with Microsoft security services
    April 1, 2021

    BlueVoyant optimizes customer security with Microsoft security services

    Exponential growth in remote users and accelerated digital transformation involving migration of applications and data to the cloud has expanded the organizations’ attack surface.
    Read more BlueVoyant optimizes customer security with Microsoft security services
    Featured image for Automating threat actor tracking: Understanding attacker behavior for intelligence and contextual alerting
    April 1, 2021

    Automating threat actor tracking: Understanding attacker behavior for intelligence and contextual alerting

    A probabilistic graphical modeling framework used by Microsoft 365 Defender research and intelligence teams for threat actor tracking enables us to quickly predict the likely threat group responsible for an attack, as well as the likely next attack stages.
    Read more Automating threat actor tracking: Understanding attacker behavior for intelligence and contextual alerting
    One male in small conference room being used for remote video meeting with Teams Meetings. Featured image for Zero Trust: 7 adoption strategies from security leaders
    March 31, 2021

    Zero Trust: 7 adoption strategies from security leaders

    How can your organization move to a Zero Trust security model? Ten executive security leaders met virtually to share strategies that been effective for them.
    Read more Zero Trust: 7 adoption strategies from security leaders
    Featured image for New Security Signals study shows firmware attacks on the rise; here’s how Microsoft is working to help eliminate this entire class of threats
    March 30, 2021

    New Security Signals study shows firmware attacks on the rise; here’s how Microsoft is working to help eliminate this entire class of threats

    The March 2021 Security Signals report showed that more than 80% of enterprises have experienced at least one firmware attack in the past two years, but only 29% of security budgets are allocated to protect firmware.
    Read more New Security Signals study shows firmware attacks on the rise; here’s how Microsoft is working to help eliminate this entire class of threats
    Black female developer working at enterprise office workspace. Featured image for How to build a successful application security program
    March 29, 2021

    How to build a successful application security program

    Tanya Janca, Founder of the We Hack Purple Academy, talks with Microsoft about how to build an application security program and measure its success.
    Read more How to build a successful application security program
    • 1
    • 2
    • 3
    • …
    • 223
    • Next

    Get started with Microsoft Security

    Microsoft is a leader in cybersecurity, and we embrace our responsibility to make the world a safer place.

    Learn more Get started with Microsoft Security
    Get all the news, updates, and more at
    @MSFTSecurity twitter
    What's new
    • Surface Laptop 4
    • Surface Laptop Go
    • Surface Go 2
    • Surface Pro X
    • Surface Duo
    • Microsoft 365
    • Windows 10 apps
    • HoloLens 2
    Microsoft Store
    • Account profile
    • Download Center
    • Microsoft Store support
    • Returns
    • Order tracking
    • Virtual workshops and training
    • Microsoft Store Promise
    • Financing
    Education
    • Microsoft in education
    • Office for students
    • Office 365 for schools
    • Deals for students & parents
    • Microsoft Azure in education
    Enterprise
    • Azure
    • AppSource
    • Automotive
    • Government
    • Healthcare
    • Manufacturing
    • Financial services
    • Retail
    Developer
    • Microsoft Visual Studio
    • Windows Dev Center
    • Developer Center
    • Microsoft developer program
    • Channel 9
    • Office Dev Center
    • Microsoft Garage
    Company
    • Careers
    • About Microsoft
    • Company news
    • Privacy at Microsoft
    • Investors
    • Diversity and inclusion
    • Accessibility
    • Security
    English (United States)
    • Sitemap
    • Contact Microsoft
    • Privacy
    • Manage cookies
    • Terms of use
    • Trademarks
    • Safety & eco
    • About our ads
    • © Microsoft 2021