General News
- Why a strong IAM strategy is key to your cybersecurity approach – Microsoft Security Blog
- Stop Ransomware digital event demos latest in threat intelligence – Microsoft Security Blog
- After a devastating cyberattack, the Eastern Band of Cherokee Indians became one of the world’s most technologically advanced nations | Transform (microsoft.com)
- Implementing a Zero Trust strategy after compromise recovery – Microsoft Security Blog
- Industry Expert Series: What keeps an AppSec CTO up at night? – Microsoft Tech Community
- Empower employees to flag security and regulatory concerns in Microsoft Teams – Microsoft Tech Community
Threat Intelligence
- ZINC weaponizing open-source software – Microsoft Security Blog
- Microsoft investigates Iranian attacks against the Albanian government – Microsoft Security Blog
- The art and science behind Microsoft threat hunting: Part 2 – Microsoft Security Blog
- Malicious OAuth applications abuse cloud email services to spread spam – Microsoft Security Blog
- RiskIQ Threat Intelligence Portal
Azure Security & Defender for Cloud News
- Strengthen your security with Policy Analytics for Azure Firewall | Azure Blog and Updates | Microsoft Azure
- How to take secure, on-demand backups on SQL Managed Instance (microsoft.com)
- Delete Passwords: Passwordless Connections for Java Apps to Azure Services – Microsoft Tech Community
- Passwordless Azure for CI/CD, Infrastructure and User Experiences (microsoft.com)
- Why WAF: Driving Technical Excellence in Delivery for your Organization – Microsoft Tech Community
- Automatically allow traffic to Office 365 endpoints on Azure Firewall (microsoft.com)
- Configuring Azure Firewall in Forced Tunneling mode – Microsoft Tech Community
- Scale your Azure Firewall monitoring with Azure Data Explorer – Microsoft Tech Community
- Protect Applications in Google Cloud Platform (GCP) using Azure WAF – Microsoft Tech Community
- Azure SQL Security: The What, Why & How of Securing your Data with Azure SQL (Ep. 6) | Data Exposed – Microsoft Tech Community
- Release notes for Microsoft Defender for Cloud | Microsoft Docs
Sentinel News
- Anomaly detection on SAP’s Audit Log Using Microsoft Sentinel
- Data Collection Rules Creation Impacting Sentinel UEBA ML Model – Microsoft Tech Community
- Introduction to Machine Learning Notebooks in Microsoft Sentinel
- Microsoft Sentinel customizable machine learning based anomalies is Generally Available
- Create and delete incidents in Microsoft Sentinel – Microsoft Tech Community
- Power of Threat Intelligence sprinkled across Microsoft Sentinel – Microsoft Tech Community
- What’s new in Microsoft Sentinel | Microsoft Docs
Defender for IoT
- IoT Microsoft Sentinel entity page
- What’s new in Microsoft Defender for IoT – Microsoft Defender for IoT | Microsoft Docs
Microsoft 365 Security (All Up News)
- Sysmon v14.1, Coreinfo v3.6, AccessEnum v1.35, BgInfo 4.32, and NotMyFault 4.21 – Microsoft Tech Community
- Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server – Microsoft Tech Community
- Security baseline for Microsoft Edge v105 – Microsoft Tech Community
- Get Ready for Basic Auth Deprecation in Exchange Online – Microsoft Tech Community
- Ask the Experts: Basic Auth Deprecation in Exchange Online – Microsoft Tech Community
- Securing Mail Flow in Exchange Online – Microsoft Tech Community
- Deep Dive: Increasing Mail Flow Security Posture – Microsoft Tech Community
- Email Protection Basics in Microsoft 365: Spoof and Impersonation – Microsoft Tech Community
- Messaging Security: Deep dive into Exchange Online Protection, Microsoft Defender for Office 365 etc – Microsoft Tech Community
- Exchange Online: Security Inspired by Law – Microsoft Tech Community
- End User Security and Exchange Server – Microsoft Tech Community
- Use Advanced Message Tracking to identify Junk Mail or Spoofing – Microsoft Tech Community
- How to Secure Exchange in an Interconnected World and a Never-Ending Battle Against Evil – Microsoft Tech Community
- New Windows 11 security features are designed for hybrid work – Microsoft Security Blog
- Protecting Mail Flow: A Practical Approach – Microsoft Tech Community
- Windows 11, version 22H2 Security baseline – Microsoft Tech Community
- Forensic artifacts in Office 365 and where to find them – Microsoft Tech Community
- Running Up the Score: Using Secure Score to Quickly Harden Your Exchange & Azure AD Environments – Microsoft Tech Community
Microsoft Entra (Azure AD, Verified Credentials, Permissions Management)
- Defend your users from MFA fatigue attacks – Microsoft Tech Community
- Microsoft named IAM Company of the Year – Microsoft Tech Community
- One step closer to modernization: The MFA Server Migration Utility – Microsoft Tech Community
- Say goodbye to unmanaged Azure AD accounts for B2B collaboration – Microsoft Tech Community
- Preview for verified coupons with Entra Verified ID – Microsoft Tech Community
- Azure AD Connect Health Version History – Microsoft Entra | Microsoft Learn
- Exchange Online Support for Continuous Access Evaluation – Microsoft Tech Community
- Announcing public preview of SSO and passwordless authentication for Azure Virtual Desktop – Microsoft Tech Community
- Secure Exchange Online with Privileged Identity Management – Microsoft Tech Community
- What’s new? Release notes – Azure Active Directory – Microsoft Entra | Microsoft Docs
Device Protection
- Windows Autopatch, How it Works | Automate updates to Windows PCs and devices (microsoft.com)
- What’s new in Microsoft Intune | Microsoft Docs
M365 Defender (Defender for Office, Defender for Endpoint, Defender for Identity, Defender for Cloud Apps)
- Attack Surface Reduction (ASR) Rules Report 2.0 (microsoft.com)
- Improved Device discoverability and classification using Defender for Endpoint and Defender for Identity (microsoft.com)
- The Gone Phishing Tournament tests your team’s security readiness – Microsoft Security Blog
- Microsoft Defender for Endpoint is now available on Android company-owned personally enabled devices
- Tamper protection turned on for all enterprise customers (microsoft.com)
- Protect passwords with enhanced phishing protection | Windows IT Pro Blog (microsoft.com)
- Measure and Change User Phishing Behavior in Four Easy Steps – Microsoft Tech Community
- Discover XDR integrations and services in the New Microsoft 365 Defender Partner Catalog – Microsoft Tech Community
- Top Threat Protection use cases in Microsoft Defender for Cloud Apps
- Introducing the Microsoft Defender for Office 365 Security Operations Guide – Microsoft Tech Community
- Combat Business Email Compromise using Powerful Integrated Workflows with Defender for Office 365 – Microsoft Tech Community
- Ask the Experts: Microsoft Defender for Office 365 – Microsoft Tech Community
- Deep Dive into Microsoft Defender for Office 365 – Microsoft Tech Community
- What’s new in Microsoft Defender for Cloud Apps | Microsoft Docs
- What’s new in Microsoft 365 Defender | Microsoft Docs
Azure/M365 Compliance & Governance
- Admin guide to auditing and reporting for the AIP Unified Labeling client – Microsoft Tech Community
- How to troubleshoot sensitivity Labels – Part 1 – Microsoft Tech Community
- Protect data in use with Azure Confidential Computing and Intel SGX (microsoft.com)
- Find Verified, Attested, and Certified apps with the Microsoft 365 App Compliance Program – Microsoft Tech Community
- Microsoft Purview and Exchange – Microsoft Tech Community
- Securing Microsoft 365 Data with Service Encryption – Microsoft Tech Community
- FedMake: Data Identification, Classification and Labelling to Meet Federal Compliance Mission (microsoft.com)
- Best Practices for Insider Risk and Communication Compliance in Exchange Online – Microsoft Tech Community
- What’s new in Microsoft Purview risk and compliance solutions – Microsoft Purview (compliance) | Microsoft Docs
Learning