General News
Microsoft Security | Fall 2020 Public Webinars edition
Microsoft Security: What cybersecurity skills do I need to become a CISO?
Microsoft Security: How to cultivate a diverse cybersecurity team
Rethinking IoT/OT Security to Mitigate Cyberthreats
How do I implement a Zero Trust security model for my Microsoft remote workforce?
Zero Trust: From security option to business imperative overnight
How to organize your security team: The evolution of cybersecurity roles and responsibilities
Afternoon Cyber Tea: Revisiting social engineering: The human threat to cybersecurity
How Microsoft Mission Critical team helped secure AAD
Microsoft joins Open Source Security Foundation
Azure Security & Compliance News
Become an Azure Security Center Ninja
Automation to Block Brute-force Attacked IP detected by Azure Security Center
Threat Protection for SQL IaaS VMs running on-premises using Azure Security Center
Threat Protection for SQL IaaS VMs hosted on Azure Arc using Azure Security Center
Built-in vulnerability assessment for VMs in Azure Security Center
Azure Security Center Secure Score Reduction Alert
Best practices for layering on cloud security through Azure Marketplace
Detect attacks using Application Gateway and Web Application Firewall
Remediate Vulnerable Secure Channel Connections with the Insecure Protocols Workbook
What’s New: Query line numbering, Azure Sentinel in the schema pane
MSTIC Notebooklets - Fast Tracking CyberSec Jupyter Notebooks
Monitoring Azure Kubernetes Service (AKS) with Azure Sentinel
Guided Hunting Notebook: Base64-Encoded Linux Commands
Ingesting log files from AWS S3 using AWS Lambda
Azure Sentinel Insecure Protocols Workbook Reimagined
What’s new: SOC operational metrics now available in Azure Sentinel
Whats new: Azure Sentinel and Microsoft Defender ATP improved alert integration
Microsoft 365 Security (All Up News)
Microsoft Office 365—Do you have a false sense of cloud security?
Security baseline for Microsoft Edge version 85
Security baseline (FINAL): Windows 10 and Windows Server, version 2004
Application Guard for M365 Apps public preview
Security best practices for Windows Server Update Services (WSUS)
Managing BitLocker with Microsoft Endpoint Manager
M365 Identity & Data Protection (Azure AD, Intune, AIP, MCAS)
Conditional Access policies now apply to all client applications by default
Microsoft Authenticator app lock now enabled by default
Automated user provisioning from SAP SuccessFactors is now GA
ALERT! New Blog Series: Automation in Cloud App Security
New study by Forrester shows customers who deploy Azure AD can benefit from a 123% ROI
Assigning groups to Azure AD roles is now in public preview!
Using Azure PIM for the AIP Super User feature management
Let's Talk About Azure Active Directory and the Microsoft Identity Platform
Gartner announces the 2020 Magic Quadrant for Unified Endpoint Management
M365 Threat Protection (Office ATP, Windows Defender ATP, Azure ATP/ATA)
Microsoft Defender ATP Ninja Training: August 2020 update
Webinar: How to maximize Microsoft Defender ATP configuration using attack simulations
On-demand webcast series: “Tracking the adversary”
Pull in more intelligence and act fast while you hunt
Microsoft Defender ATP Daily Operation - Part 1
Microsoft Threat Protection now uses more descriptive incident names
Introducing an improved timeline investigation with event flagging
Introducing EDR in block mode: Stopping attacks in their tracks
Microsoft Defender ATP: Web Content Filtering
A new look for threat analytics
Microsoft Defender ATP for Mac is moving to system extensions
How can Microsoft Threat Protection help reduce the risk from phishing?
Microsoft Defender ATP: Remediate Apps Using MEM
Linux ATP Configuration and Operation Command List
Microsoft Advanced Threat Protection for Linux
M365 Compliance & Governance
New features and improvements to Sensitivity labels for Containers Webinar
Classification Depth Private Preview
Regards,
Jeremy Windmiller | Enterprise Security Architect, CISSP, CEH, ITIL | Microsoft – Healthcare