Recent Blogs
We are excited to introduce the new home of the Microsoft Security Community!
At aka.ms/securitycommunity, you can explore upcoming events, access technical content, and find new ways to connect wi...
Apr 21, 2026135Views
0likes
0Comments
6 MIN READ
Microsoft 365 Copilot is redefining how organizations work, bringing the power of generative AI directly into our secure productivity tools. As Copilot adoption accelerates, we’ve heard that you want...
Apr 21, 2026127Views
0likes
0Comments
Strong authentication controls like MFA significantly reduce account compromise — but they don’t eliminate the risk of password exposure. In many organizations, users still interact with legacy syst...
Apr 20, 2026349Views
1like
0Comments
Meet Fabrício Assumpção, a Technical Specialist Architect for a Microsoft Security and Compliance Certified Partner, based in Brazil. Fabrício considers his involvement with the Microsoft Securi...
Apr 15, 2026192Views
2likes
0Comments
Enterprise cybersecurity in large organisations has always been an asymmetric game. But with the rise of AI‑enabled cyber attacks, that imbalance has widened dramatically - particularly for UK an...
Apr 15, 2026306Views
2likes
0Comments
How to set up the Workbook
Use the steps outlined in the Identify and Remediate Credentials article to get the right rules in place to start capturing credential data. You may choose to use custom ...
Apr 15, 2026682Views
2likes
0Comments
3 MIN READ
When Conditional Access policies enforce MFA across all cloud apps and include external users, encrypted attachments may require additional considerations. This post explains why.
This behavior app...
Apr 13, 2026445Views
2likes
0Comments
What is changing?
In early 2024, Azure Key Vault introduced a modernized hardware security module (HSM) platform based on FIPS 140-2 Level 3 certified HSMs. As part of this evolution, the legacy HS...
Apr 13, 2026329Views
0likes
0Comments
Get ready for an electrifying event! The Microsoft Security Community proudly presents Purview Lightning Talks; an action-packed series featuring your fellow Microsoft users, partners and passionate ...
Apr 07, 2026895Views
5likes
0Comments
7 MIN READ
Designing Authorization‑Aware AI Agents at Scale
Enforcing Runtime RBAC + ABAC with Approval Injection (JIT)
Microsoft Entra Agent Identity enables organizations to govern and manage AI agent ide...
Apr 07, 2026692Views
1like
0Comments
Tags
- security414 Topics
- microsoft information protection293 Topics
- microsoft purview292 Topics
- compliance250 Topics
- information protection and governance212 Topics
- microsoft 365169 Topics
- data loss prevention154 Topics
- cloud security142 Topics
- insider risk management121 Topics
- threat protection100 Topics