Microsoft Security Saturday – 06/12/2021 (Monday Morning Edition)

Welcome to Microsoft 365 Defender!We are excited by the reception you have given us on Microsoft 365 Defender and many customers have already made the transition to the new experience. Starting July 6, 2021, the default experience for Microsoft Defender for Endpoint will shift to Microsoft 365 Defender.

Azure Security Center and Azure Sentinel: Better TogetherAs a starting point, refresh your understanding of Azure Security Center, Azure Defender, and Azure Sentinel by checking out this article: What’s the difference between Azure Security Center, Azure Defender and Azure Sentinel? – Microsoft …  

Microsoft Defender for Endpoint for Linux is coming soon to Azure DefenderNow, Azure Defender is about to augment its existing integration with Microsoft Defender for Endpoint and support the Linux version as well – so your Linux servers can be natively protected against advanced threats.

Microsoft Azure Defender for IoT TrainingThis training program includes over 22 modules. For each module, the post includes a video, and/or a presentation, along with supporting information when relevant: product documentation, blog posts, and additional resources. 

Introducing Azure AD access reviews for service principalsWith this public preview, you can require a review of service principals and applications that are assigned to privileged directory roles in Azure AD. In addition, you can also create reviews of roles in your Azure subscriptions to which a service principal is assigned.

MIP and MIG Scenario Based Demos! We are proudly announcing the official launch of our Microsoft 365 Compliance Scenario Based Demos (SBD) video series. Through the series, we will demonstrate how Microsoft Information Protection (MIP) and Microsoft Information Governance (MIG) components can be implemented in a scripted walk-through to provide end-to-end Information protection and governance solution to enforce privacy and ensure compliance with regulatory requirements.

Zero Trust for Endpoints and Applications – Essentials Series – Episode 3See how you can apply Zero Trust principles and policies to your endpoints and apps; the conduits for users to access your data, network, and resources. Jeremy Chapman walks through your options, controls, and recent updates to implement the Zero Trust security model.

What is a purple team, and how can they can embrace hacker culture to improve security?In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Matthew Hickey, co-founder, CEO, and writer for Hacker House. In this blog post, Matthew talks about the benefits of a purple team and offers best practices for building a successful one.

How-To: Automated Company-Wide IP Blocking via Azure Firewall and Azure FunctionsThe Microsoft CE DSE team came up with a solution leveraging Azure Firewall Policy and Azure Function Apps to enforce a parent Network Rule policy that is based on automatically updating IP Groups to control traffic to these embargoed locations across their global enterprise.