Discover and manage shadow IT with Microsoft 365
Gain control of your shadow IT and enable employee productivity. Read our latest e-book, “Discover and manage Shadow IT,” to find out how.
Gain control of your shadow IT and enable employee productivity. Read our latest e-book, “Discover and manage Shadow IT,” to find out how.
Learn how compound detection can help you apply the law of data gravity and correlate insights across your security platforms.
A complex attack chain incorporating the CVE-2018-20250 exploit and multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 8.
User access can be simpler for your users and more secure for the enterprise. Read our latest e-book, “Secure access to your enterprise,” to find out how.
New capabilities for the Azure Security Center were announced this week at Hannover Messe 2019.
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 7.
Our discovery of two privilege escalation vulnerabilities in a driver highlights the strength of Microsoft Defender ATP’s sensors. These sensors expose anomalous behavior and give SecOps personnel the intelligence and tools to investigate threats, as we did.
Today at Ignite Amsterdam, we’re excited to announce two additions to our endpoint security platform.
Learn about more of the top feature updates for Microsoft Threat Protection announced at RSA.