General News
- Cybersecurity awareness tips from Microsoft to empower your teams – Microsoft Security Blog
- Detecting and preventing LSASS credential dumping attacks – Microsoft Security Blog
- Microsoft publishes report on holistic insider risk management – Microsoft Security Blog
- 5 cybersecurity capabilities announced at Microsoft Ignite 2022 – Microsoft Security Blog
- Cybersecurity is for everyone—this October and all year – Microsoft Community Hub
- Delivering consistency and transparency for cloud hardware security | Azure Blog and Updates | Microsoft Azure
- Defenders beware: A case for post-ransomware investigations – Microsoft Security Blog
- Microsoft named a Leader in the 2022 Gartner® Magic Quadrant™ for Security Information and Event Management – Microsoft Security Blog
- New “Prestige” ransomware impacts organizations in Ukraine and Poland – Microsoft Security Blog
- DEV-0832 (Vice Society) opportunistic ransomware campaigns impacting US education sector – Microsoft Security Blog
- New OpenSSL v3 vulnerability: prepare with Microsoft Defender for Cloud – Microsoft Community HubHow Microsoft works to grow the next generation of cyber defenders – Microsoft Security Blog
Threat Intelligence & ESAM
- How Microsoft Defender Threat Intelligence Enables Threat Hunting Success
- How Internet Telemetry Data Becomes Threat Intelligence (microsoft.com)
- Exploring Target User Functions and Use Cases (microsoft.com)
- Get to Know the Datasets and How to Use Them During Investigations (microsoft.com)
- Defender TI Detections in Microsoft Sentinel
- Getting Started with Microsoft Defender Threat Intelligence
- Microsoft Defender Threat Intelligence Overview, Concepts, and Vocabulary
- Using Reputation and Analyst Insights Features For Quick Indicator Assessments (microsoft.com)
- What’s in a Microsoft Defender TI Web Crawl?
- Understanding and Using Finished Threat Intelligence (microsoft.com)
- Introducing Microsoft Defender Threat Intelligence CommunityGetting the Most Out of Projects in Defender TI (microsoft.com)
Azure Security & Defender for Cloud News
- Azure DDoS Standard Protection Now Supports APIM in VNET Integration – Microsoft Community Hub
- Azure Firewall Basic now in preview | Azure Blog and Updates | Microsoft Azure
- Deploying and Managing Microsoft Defender for Cloud as Code – Microsoft Community Hub
- Enhance your cloud security with new Microsoft Defender for Cloud features – Microsoft Security Blog
- DevOps Security Workbook – Microsoft Community Hub
- What’s New in Sentinel Threat Hunting – Microsoft Community Hub
- Announcing Microsoft cloud security benchmark (Public Preview)
- Compliance for Exposed Secrets Discovered by Defender for DevOps – Microsoft Community Hub
- Announcing Azure DNS Private Resolver general availability | Azure Blog and Updates | Microsoft Azure
- Best practices to harden your AKS environment – Microsoft Community Hub
- Secure your digital payment system in the cloud with Azure Payment HSM—now generally available | Azure Blog and Updates | Microsoft AzureRelease notes for Microsoft Defender for Cloud | Microsoft Learn
Sentinel News
- Microsoft Sentinel AWS CloudTrail solution
- Microsoft Sentinel: What’s New at Microsoft Ignite – Microsoft Community Hub
- Upcoming changes to the CommonSecurityLog table – Microsoft Community Hub
- What’s new in Microsoft Sentinel | Microsoft Learn
Defender for IoT
- Public Preview Announcement: OT-Enabled SOC with Microsoft Sentinel and Defender for IoT
- Public preview announcement: Defender for IOT solution for Microsoft Sentinel
- Securing IoT devices against attacks that target critical infrastructure – Microsoft Security BlogWhat’s new in Microsoft Defender for IoT – Microsoft Defender for IoT | Microsoft Learn
Microsoft 365 Security (All Up News)
- What’s new in Security and Management in SharePoint, OneDrive, and Teams – Microsoft Ignite 2022
- Website typo protection defends against fraud including phishing, malware, and other scams – Microsoft Edge Blog (windows.com)
- Windows 10, version 22H2 Security baseline – Microsoft Community Hub
- How to stop lateral movement attacks using Microsoft 365 DefenderHow to prevent lateral movement attacks using Microsoft 365 Defender – Microsoft Security Blog
- Announcing enhanced control for configuring Firewall rules with Windows Defender – Microsoft Community HubUsing Microsoft Security APIs for Incident Response – Part 2 – Microsoft Community Hub
Microsoft Entra (Azure AD, Verified Credentials, Permissions Management)
- Apply Zero Trust Principles to Authentication Session Management with Continuous Access Evaluation – Microsoft Community Hub
- Use Authentication Policies to Fight Password Spray Attacks – Microsoft Community Hub’
- Protect against hybrid identity attacks (microsoft.com)
- New Azure Active Directory integrations that strengthen your security – Microsoft Community Hub
- Announcing a New Azure AD, part of Microsoft Entra, region in Japan – Microsoft Community Hub
- Use Azure AD Workload Identity for Kubernetes with a User-Assigned Managed Identity – Microsoft Community Hub
- Azure AD Certificate-based Authentication (CBA) on Mobile – Microsoft Community Hub
- New Microsoft Entra Innovations Announced at Ignite! – Microsoft Community Hub
- Authentication strength – choose the right auth method for your scenario! – Microsoft Community Hub
- Do more with less—Discover the latest Microsoft Entra innovations – Microsoft Security Blog
- Identity Protection alerts are coming to Microsoft 365 Defender – Microsoft Community Hub
- Advanced Microsoft Authenticator security features are now generally available! – Microsoft Community Hub
- Azure AD B2C, B2C, Custom Policy (microsoft.com)
- Empowering SOCs with Azure AD Identity Protection in Microsoft 365 Defender – Microsoft Community Hub
- Public Preview: Conditional Access filters for apps – Microsoft Community Hub
- Advances in Azure AD resilience – Microsoft Community HubCreate Emergency Access Accounts for AAD and Use Log Analytics to Monitor Sign-ins from them (microsoft.com)
Device Protection
- Increase security, enable quality collaboration for Linux desktops – Microsoft Community Hub
- Just in Time Registration for iOS/iPadOS with Microsoft Intune – Microsoft Community Hub
- What’s new in Microsoft Intune – 2210 (October) edition – Microsoft Community HubNew device control capabilities to manage removable storage media access in Microsoft Intune – Microsoft Community Hub
M365 Defender (Defender for Office, Defender for Endpoint, Defender for Identity, Defender for Cloud Apps)
- Introducing Identity Theft Monitoring in Microsoft Defender for individuals – Microsoft Community Hub
- Detection and response to command and control attacks. (microsoft.com)
- Microsoft Defender for Endpoint Announcements at Microsoft Ignite 2022
- Build custom email security reporting with Microsoft Defender for Office 365 and PowerBI – Microsoft Community HubIntroducing the Microsoft Defender for Cloud Apps data protection series – Microsoft Community Hub
Azure/M365 Compliance & Governance
- Microsoft Purview – Compliance Score (Part 1) – Overview – Microsoft Community Hub
- Microsoft Purview – Compliance Score (Part 2) – Sample Assessment Scoring – Microsoft Community Hub
- Microsoft Purview – Compliance Score (Part 3) – HITRUST – Microsoft Community Hub
- Microsoft Purview – Compliance Score (Part 4) – HIPAA / HITECH – Microsoft Community Hub
- Microsoft Purview – Compliance Score (Part 5) – GDPR – Microsoft Community Hub
- Microsoft Purview – Compliance Score (Part 6) – CCPA – Microsoft Community Hub
- Microsoft Purview – Compliance Score (Part 7) – Data Protection Baseline – Microsoft Community Hub
- Microsoft Purview – Compliance Score (Part 8) – ARMA GARP – Microsoft Community Hub
- Microsoft Purview – Compliance Score (Part 9) – NIST Privacy Framework – Microsoft Community Hub
- Microsoft Purview – Compliance Score (Part 10) – ISO 15489 – Microsoft Community Hub
- How Microsoft Purview and Priva help simplify data protection – Microsoft Security Blog
- Report Manual Data lineage with few clicks in Microsoft Purview – Microsoft Community Hub
- How Microsoft Purview and Priva help simplify data protection – Microsoft Security Blog
- How businesses are gaining integrated data protection with Microsoft Purview – Microsoft Security BlogHow compliance, data protection, and privacy come together – Microsoft Community Hub
Learning
- Microsoft Security Learning
- The Microsoft Purview Data Loss Prevention Ninja Training is here! – Microsoft Community Hub
- The 2-Minute Recap: Everything new with security, compliance, and identity on Microsoft Learn – Microsoft Community HubWe Are Pleased To Introduce the Microsoft Defender Threat Intelligence Ninja Training Series!