Skip to main content
This site uses cookies for analytics, personalized content and ads. By continuing to browse this site, you agree to this use.
Learn more
Skip to main content
Microsoft
Microsoft Security
Microsoft Security
Microsoft Security
Home
Operations
Operations Overview
Intelligence
Intelligence report
Technology
Technology Overview
Identity and access management
Identity and access management overview
Conditional access
Passwordless
Threat protection
Information protection
Security management
Partnerships
Partnerships Overview
Security API
Security Association
Find a partner
Security fundamentals
Resources
Resources Overview
Security blog
Events
Trust Center
Trust Center
Security
Privacy
Compliance
Service Trust Portal
More
All Microsoft
Microsoft 365
Azure
Office 365
Dynamics 365
SQL
Windows 10
Products & Services
Windows Server
Enterprise Mobility + Security
Power BI
Teams
Visual Studio
Microsoft Advertising
Emerging Technologies
AI
Internet of Things
Azure Cognitive Services
Quantum
Microsoft HoloLens
Mixed Reality
Developer & IT
Docs
TechNet
Developer Network
Windows Dev Center
Windows IT Pro Center
FastTrack
Partner
Partner Network
Solution Providers
Partner Center
Cloud Hosting
Industries
Education
Financial services
Government
Health
Manufacturing & resources
Retail
Other
Security
Licensing
AppSource
Azure Marketplace
Events
Research
View Sitemap
Search
Cancel
Sign in
Featured image for Introducing the security configuration framework: A prioritized guide to hardening Windows 10
April 11, 2019
Introducing the security configuration framework: A prioritized guide to hardening Windows 10
The security configuration framework is designed to help simplify security configuration while still allowing enough flexibility to allow you to balance security, productivity, and user experience. We are defining discrete prescriptive Windows 10 security configurations (levels 5 through 1) to meet many of the common device scenarios we see today in the enterprise.
Read more
Introducing the security configuration framework: A prioritized guide to hardening Windows 10
Featured image for Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability
April 10, 2019
Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability
A complex attack chain incorporating the CVE-2018-20250 exploit and multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.
Read more
Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability
Featured image for Steer clear of tax scams
April 5, 2019
Steer clear of tax scams
In the month of February, we saw an average of 300,000 phishing attempts across Microsoft’s browsing platforms daily. Our security experts expect these attempted scams to become increasingly more prevalent through the April 15 tax day.
Read more
Steer clear of tax scams
Featured image for From alert to driver vulnerability: Microsoft Defender ATP investigation unearths privilege escalation flaw
March 25, 2019
From alert to driver vulnerability: Microsoft Defender ATP investigation unearths privilege escalation flaw
Our discovery of two privilege escalation vulnerabilities in a driver highlights the strength of Microsoft Defender ATP’s sensors. These sensors expose anomalous behavior and give SecOps personnel the intelligence and tools to investigate threats, as we did.
Read more
From alert to driver vulnerability: Microsoft Defender ATP investigation unearths privilege escalation flaw
Featured image for Announcing Microsoft Threat Experts
February 28, 2019
Announcing Microsoft Threat Experts
Microsoft Threat Experts is a new managed threat hunting service in Windows Defender Advanced Threat Protection. It provides proactive hunting, prioritization, and additional context and insights that further empower security operations centers (SOCs) to identify and respond to threats quickly and accurately. It is an additional layer of expertise and optics that Microsoft customers can utilize to augment security operations capabilities as part of Microsoft 365.
Read more
Announcing Microsoft Threat Experts
Featured image for Recommendations for deploying the latest Attack surface reduction rules for maximum impact
February 22, 2019
Recommendations for deploying the latest Attack surface reduction rules for maximum impact
Attack surface reduction is a technique to remove or constrain exploitable behaviors in your systems. In this blog, we discuss the two attack surface reduction rules introduced in the most recent release of Windows and cover suggested deployment methods and best practices.
Read more
Recommendations for deploying the latest Attack surface reduction rules for maximum impact
Featured image for Windows Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices
January 17, 2019
Windows Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices
This integration empowers Windows to natively understand Azure Information Protection sensitivity labels, to provide visibility into sensitive data on endpoints, to protect sensitive data based on its content, and to detect and respond to post-breach malicious activity that involves or affects sensitive data.
Read more
Windows Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices
Featured image for Windows Defender ATP has protections for USB and removable devices
December 19, 2018
Windows Defender ATP has protections for USB and removable devices
We recommend a layered approach for device control security, which incorporates multiple avenues of protection, including each of the above.
Read more
Windows Defender ATP has protections for USB and removable devices
Featured image for Tackling phishing with signal-sharing and machine learning
December 19, 2018
Tackling phishing with signal-sharing and machine learning
Across services in Microsoft Threat Protection, the correlation of security signals enhances the comprehensive and integrated security for identities, endpoints, user data, cloud apps, and infrastructure.
Read more
Tackling phishing with signal-sharing and machine learning
Featured image for Microsoft AI competition explores the next evolution of predictive technologies in security
December 13, 2018
Microsoft AI competition explores the next evolution of predictive technologies in security
Predictive technologies are already effective at detecting and blocking malware at first sight. A new malware prediction competition on Kaggle will challenge the data science community to push these technologies even further—to stop malware before it is even seen.
Read more
Microsoft AI competition explores the next evolution of predictive technologies in security
1
2
3
…
17
Next