Skip to main content
Microsoft Security

Microsoft Security Blog

Published
1 minute read

New Guidance for Securing Public Key Infrastructure 

<p>Public Key Infrastructure (PKI) is used as a building block to provide key security controls, such as data protection and authentication for organizations. Many organizations operate their own PKI to support things like remote access, network authentication and securing communications.</p> <p>The threat of compromise to IT infrastructures from attacks is evolving. The motivations behind these attacks are varied, and compromising an organization’s PKI can significantly help an attacker gain access to the sensitive data and systems they are after.</p> <p>To help enterprises design PKI and protect it from emerging threats, Microsoft IT has released a detailed technical reference document - “<strong><a href="/controlpanel/blogs/posteditor.aspx/<strong>http:/aka.ms/securingpkidl</strong>">Securing Public Key Infrastructure</a></strong>.” <a href="/b/security/archive/2014/06/11/new-guidance-for-securing-public-key-infrastructure.aspx">Read more</a></p>

Published
1 minute read

5 ways to protect your Microsoft account 

Your Microsoft account (formerly your Windows Live ID) is the combination of an email address and a password that you use to sign in to services such as Xbox LIVE and Outlook.com, as well as devices such as Windows Phone and computers running Windows 8. A Microsoft account is free and you can use it […]

New Microsoft Threat Modeling Tool 2014 Now Available 

<p>Today we’re announcing the release of the <strong><a href="http://download.microsoft.com/download/3/8/0/3800050D-2BE7-4222-8B22-AF91D073C4FA/MSThreatModelingTool2014.msi">Microsoft Threat Modeling Tool 2014</a></strong>. This is the latest version of the free <a href="/b/security/archive/2012/08/23/microsoft-s-free-security-tools-threat-modeling.aspx">Security Development Lifecycle Threat Modeling Tool </a>that was previously released back in 2011.</p> <p>More and more of the customers I have been talking to have been leveraging threat modeling as a systematic way to find design-level security and privacy weaknesses in systems they are building and operating. Threat modeling is also used to help identify mitigations that can reduce the overall risk to a system and the data it processes. Once customers try threat modeling, they typically find it to be a useful addition to their approach to risk management.  </p> <p>We have been threat modeling at Microsoft for more than 10 years. It is a key piece of the design phase of the <a href="http://www.microsoft.com/security/sdl/default.aspx">Microsoft Security Development Lifecycle </a>(SDL).  In 2011 we released the SDL Threat Modeling Tool, free of charge, to make it easier for customers and partners to threat model as part of their software development processes. The tool has been very popular and we have received a lot of positive customer feedback in addition to suggestions for improvement. <a href="/b/security/archive/2014/04/15/new-microsoft-threat-modeling-tool-2014-now-available.aspx">Read more</a></p>

Adware: A new approach 

Protecting the modern workplace from a wide range of undesirable software Our evaluation criteria describe the characteristics and behavior of malware and potentially unwanted applications and guide the proper identification of threats. Learn how we classify malicious software, unwanted software, and potentially unwanted applications. Read the blog post. ​Here at the Microsoft Malware Protection Center […]

Streamline privacy management with Microsoft Priva

Protect and govern personal information, reduce privacy risks, and manage subject rights requests at scale with Microsoft Priva privacy risk management solutions.

Published
3 min read

Reliability Series #1: Reliability vs. resilience 

Whenever I speak to customers and partners about reliability I’m reminded that while objectives and priorities differ between organizations and customers, at the end of the day, everyone wants their service to work. As a customer, you want to be able to do things online, at a time convenient to you. As an organization – […]

Published
6 min read

Enterprise Threat Encounters: Scenarios and Recommendations – Part 1 

<p>Many of the IT Professionals that contact our customer service and support group have common questions related to security incidents and are seeking guidance on how to mitigate threats from determined adversaries.  Given the level of interest in this information and common scenarios that exist amongst different organizations, we are publishing a multi-part series which will detail common security incidents organizations face and provide recommended mitigations based on guidance from our Security Support team. </p> <p>It is important to note that each phase has one or more technical and, more importantly, administrative controls that could have been used to block or slow down the attack. These mitigations are listed after each phase.  Each mitigation addresses specific behaviors and attack vectors that have been seen previously in multiple security incidents. <a href="/b/security/archive/2013/12/18/enterprise-threat-encounters-scenarios-and-recommendations-part-1.aspx">Read more.</a></p>

Published
<1 minute read

Detect and remove spyware 

Spyware is a general term used to describe software that performs certain actions—generally without appropriately obtaining your consent—such as: Advertising Collecting personal information Changing the configuration of your computer If your computer is running Windows 8, you can use the built-in Windows Defender to help you detect and get rid of spyware and other malware. If your […]

Published
1 minute read

Parental controls in Xbox One 

Xbox One is the newest all-in-one games and entertainment system from Microsoft. If you’ve already purchased one, or if you plan to, it’s a good idea to learn more about the built-in privacy and safety parental controls. Control the content your children play and watch Customize your children’s access to specifically rated games, movies, TV shows, and music […]