Microsoft Security Intelligence Report

Welcome to the interactive Microsoft Security Intelligence Report. We created this site as a complement to our annual report to enable you to dig into the data in more detail.

Some key highlighted takeaways may differ from the written report as we add new data monthly. Come back and visit often to check in on the latest security trends.

For a deeper assessment and recommendations on how to protect against threats, download the Microsoft Security Intelligence Report at

Cloud provider DDoS Attacks

Distributed denial of service (DDoS) attacks are some of the largest availability and security concerns facing customers that are moving their applications to the cloud. A DDoS attack attempts to exhaust an application’s resources, making the application unavailable to legitimate users. This can be costly to the business in terms of time, resources and even customer attrition. DDoS attacks can be targeted at any endpoint that is publicly reachable through the internet.

DDoS is an ever-growing problem, and the types of attacks are getting increasingly sophisticated. More importantly, DDoS attacks are often used as a “smokescreen,” masking more malicious and harmful infiltration of your resources. Unfortunately, although the technology to set up DDoS attacks continues to increase in sophistication, the costs and ability to launch these attacks are not. This is driving up the frequency and ease with which criminals can wreak havoc on businesses and users.

In analyzing cloud-based DDoS incoming attacks, Microsoft threat researchers found such attacks have been significant in terms of volume and occur on a regular basis.

The charts show the number of TCP-based DDoS attacks and number of UDP-based DDoS attacks that Azure DDoS Protection detected and mitigated.

As they adopt cloud, and cloud services and apps, businesses must adopt strong cloud-based DDoS threat protection to prevent exposure of workloads to the Internet. Azure DDoS Protection Standard provides enhanced DDoS mitigation capabilities for your application and resources deployed in your virtual networks.

To learn what you can do to protect your business against cloud-based DDoS attacks during any time of the year, and not just when these attacks are at the peak during the holidays, read this blog.

Next section

Click to interact with DDoS attack dashboard
Click to interact with dashboard