Implementing a new feature for the newsletter going forward with the addition of educational videos that are noted with a -V.
General
- Everything Old Is New Again: Hardening the Trust Boundary of VBS Enclaves
- Meet the IMS team
- IMS Efficient Migration Methods
- Exploring the Extensibility of Active Directory Migration Service (ADMS) Device Migration
- Introducing the Secure Future Initiative Tech Tips show!
- Navigating Mergers and Acquisitions: IT Consolidation Best Practices and Approach
- Blog Series: Charting Your Path to Cyber Resiliency
- AI innovation requires AI security: Hear what’s new at Microsoft Secure
- Transforming public sector security operations in the AI era
- Securing generative AI models on Azure AI Foundry
- Microsoft’s Zero Trust approach – V
Threat Intelligence & ESAM
- Analyzing open-source bootloaders: Finding vulnerabilities faster with AI
- StilachiRAT analysis: From system reconnaissance to cryptocurrency theft
- Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware
- New XCSSET malware adds new obfuscation, persistence techniques to infect Xcode projects
- Malvertising campaign leads to info stealers hosted on GitHub
- Silk Typhoon targeting IT supply chain
Azure Security & Defender for Cloud News
- Secure containers software supply chain across the SDLC
- Microsoft Defender for Cloud Customer Newsletter
- Integrating Security into DevOps Workflows with Microsoft Defender CSPM
- Public Preview: Key Attestation for Azure Managed HSM
- New innovations to protect custom AI applications with Defender for Cloud
- Enhance AI security and governance across multi-model and multi-cloud environments
- All Key Vaults Are Critical, But Some Are More Critical Than Others: Finding the Crown Jewels
- Securing your organization from ‘IngressNightmare’ using Microsoft Security capabilities
- Implementing Multi-Layered Security with Azure DDoS Protection and Azure WAF -V
- API Security Posture with Defender for Cloud -V
- Secure your AI application transformation with Microsoft Defender for Cloud-V
- Manage cloud security posture with Microsoft Defender for Cloud -V
- What’s new in Defender for Cloud features
- Sentinel News
- New capabilities coming to Microsoft Sentinel this Spring
- Microsoft Sentinel – Custom ASIM Parser for Solarwind Data source
- Microsoft Sentinel Project Deployment Tracker
- Ingesting Akamai Audit Logs into Microsoft Sentinel using Azure Function Apps
- Integrating Radware WAF Logs with Microsoft Sentinel Using Logic Apps
- Case Management is now Generally Available
- What’s new in Microsoft Sentinel
Defender for IoT
- Sensor Disconnection Notifications with Microsoft Defender for IoT and Microsoft Sentinel
- What’s new in Microsoft Defender for IoT?
Microsoft 365 Security (All Up News)
Microsoft Entra
- ADSS TSync vs Entra Cross-Tenant Sync: A Comprehensive Comparison
- Introducing Microsoft Entra Health alerts: An enhancement to tenant health monitoring
- Exploring the Extensibility of Active Directory Migration Service (ADMS)
- Tell us what you think: The Microsoft Entra blog team wants to hear from you!
- New innovations in Microsoft Entra to strengthen AI security and identity protection
- Insights from the Secure Employee Access report reveal the need for unified access security
- New user experience for consumer authentication
- Replace your legacy VPN with an identity-centric ZTNA
- Securing B2B Collaboration with Microsoft Entra ID -V
- Microsoft Entra External ID: User activity insights -V
- Quick Setup – Microsoft Entra Verified ID -V
- Help Desk & Account Recovery – Face Check with Microsoft Entra Verified ID -V
- Remote Onboarding – Face Check with Microsoft Entra Verified ID -V
- Secure Access to Resources – Face Check with Microsoft Entra Verified ID -V
- Using phishing resistant creds | Protect identities and secrets -V
- How do Microsoft Entra ID Protection Risk Signals Work? -V
- Configure API driven Provisioning in Microsoft Entra ID Governance -V
- Configure auto-assignment policies in Microsoft Entra ID Governance using Entitlement Management -V
- Microsoft Entra custom authentication extension overview -V
- Implementing managed identities | Protect identities and secrets -V
- Create Custom reports for Microsoft Entra ID Governance data using Azure Data Explorer -V
- What’s new in Entra ID
Device Management & Protection (Intune)
- Fortify your security posture with Microsoft Intune and Windows
- Stay ahead of evolving threats with the latest AI in Intune
- Expand endpoint visibility across device platforms
- Microsoft Intune provides key advantages for macOS management
- What’s New in Azure Firewall – March 2025 -V
- Configure Entra Private Access and Quick Access in Microsoft Entra Global Secure Access -V
- What’s new in Microsoft Intune
M365 Defender (Defender for Office, Defender for Endpoint, Defender for Identity, Defender for Cloud Apps)
- Built-in report button is available in Microsoft Outlook across platforms
- Monthly news – March 2025
- Defending Against OAuth-Based Attacks with Automatic Attack Disruption
- Level Up Your App Governance With Microsoft Defender for Cloud Apps Workshop Series
- Strengthening Email Security: Our New Approach to Non-RFC Compliant Emails
- Unveiling the Shadows: Extended Critical Asset Protection with MSEM
- Level up your defense: protect against attacks using stale user accounts
- Discover and protect Service Accounts with Microsoft Defender for Identity
- Protect SaaS apps from OAuth threats with attack path, advanced hunting and more
- General Availability for Collaboration Security for Microsoft Teams
- Transition to the Unified SOC Platform: Deep Dive and Interactive Q&A for SOC Professionals – V
- Microsoft Defender for Endpoint Client Analyzer overview – V
- Connecting your Apps to Defender for Cloud Apps – V
- Resolving high CPU utilization in Microsoft Defender Antivirus – V
- Mastering endpoint security settings issues with Defender for Endpoint Client Analyzer – V
- Mastering onboarding issues with Defender for Endpoint Client Analyzer – V
- Microsoft Defender for Endpoint Client Analyzer overview –https://www.youtube.com/watch?v=GnqDsvYYL6w&t=702s
- What’s new in Microsoft Defender XDR
- What’s new in Microsoft Defender for Endpoint
- What’s new in Microsoft Defender for Office 365
- What’s new in Microsoft Defender for Identity
What’s new in Microsoft Defender for Cloud Apps
Copilot for Security
- Empowering Security Copilot with NL2KQL: Transforming Natural Language into Insightful KQL queries
- Advancing Security Copilot with MAGIC: Automating Self-Correction in NL2KQL and Beyond
- Take Flight with Microsoft Security Copilot Flight School
- Automate cybersecurity at scale with Microsoft Security Copilot agents
- Announcing Alert Triage Agents in Microsoft Purview, powered by Security Copilot
- What’s new in Microsoft Security Copilot?
Purview – Compliance & Governance
- Improve your DLP maturity with DLP Analytics
- 1000 Data Map Collections
- Microsoft Purview – Data Security Posture Management (DSPM) for AI
- Protecting sensitive information in the era of AI with Microsoft Purview Information Protection
- Strengthen data security posture in the era of AI with Microsoft Purview
- Prevent data loss across your ever-expanding data estate with Microsoft Purview Data Loss Prevention
- Mitigating insider risks in the age of AI with Microsoft Purview Insider Risk Management
- New innovations in Microsoft Purview for protected, AI-ready data
- Unlocking the Power of Microsoft Purview for ChatGPT Enterprise -V
- Inheriting Sensitivity Labels from Shared Files to Teams Meetings -V
- Export Search Results in eDiscovery -V
- Microsoft Purview AMA – Data Security, Compliance, and Governance -V
- What’s new in Microsoft Purview
Learning