Trace Id is missing

Maximize the everyday with Microsoft 365

Get online protection, secure cloud storage, and innovative apps designed to fit your needs—all in one plan.
A young woman works on a Surface laptop while Microsoft 365 App icons whirl around her head.

Determined Adversaries and Targeted Attacks

This paper shares Microsoft’s insights into the threat that Determined Adversaries and Targeted Attacks pose, identifies challenges for organizations seeking to combat this threat category and provides a context for other papers that will directly address each of those.

Important! Selecting a language below will dynamically change the complete page content to that language.

  • Version:

    1.0

    Date Published:

    10/29/2012

    File Name:

    Determined Adversaries and Targeted Attacks_EN.docx

    Determined Adversaries and Targeted Attacks_EN.pdf

    File Size:

    1.6 MB

    411.4 KB

    Microsoft has a unique perspective on Targeted Attacks, as both a potential target of attacks and a service and solution provider to potential victims. This paper shares Microsoft’s insights into the threat that Determined Adversaries and Targeted Attacks pose, identifies challenges for organizations seeking to combat this threat category and provides a context for other papers that will directly address each of those.
  • Supported Operating Systems

    Windows 2000, Windows 7, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP

    Any supported Operating System
  • Download the PDF.

Follow Microsoft