%3CLINGO-SUB%20id%3D%22lingo-sub-1070785%22%20slang%3D%22en-US%22%3EInfrastructure%20%2B%20Security%3A%20Noteworthy%20News%20(December%2C%202019)%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1070785%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20there!%20You%20are%20reading%20the%20next%20issue%20of%20the%20Infrastructure%20%2B%20Security%3A%20Noteworthy%20News%20series!%20%3CBR%20%2F%3E%3CBR%20%2F%3EAs%20a%20reminder%2C%20the%20Noteworthy%20News%20series%20covers%20various%20areas%2C%20to%20include%20interesting%20news%2C%20announcements%2C%20links%2C%20tips%20and%20tricks%20from%20Windows%2C%20Azure%2C%20and%20Security%20worlds%20on%20a%20monthly%20basis.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CTABLE%20class%3D%22MsoNormalTable%22%20style%3D%22margin-left%3A%204.5pt%3B%20border-collapse%3A%20collapse%3B%22%20border%3D%220%22%20width%3D%2299%25%22%20cellspacing%3D%220%22%20cellpadding%3D%220%22%3E%0A%3CTBODY%3E%0A%3CTR%20style%3D%22height%3A%20.25in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20background%3A%20%23D2D2D2%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.25in%3B%22%3E%3CP%20style%3D%22margin%3A%200in%3B%20margin-bottom%3A%20.0001pt%3B%20line-height%3A%2090%25%3B%22%3E%3CSPAN%20style%3D%22font-size%3A%2016.0pt%3B%20line-height%3A%2090%25%3B%20font-family%3A%20'Segoe%20UI'%2Csans-serif%3B%20color%3A%20%23404040%3B%22%3EMicrosoft%20Azure%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2029.0pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2029.0pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FAzure-Active-Directory-Identity%2FBring-identities-from-disconnected-ADs-into-Azure-AD-with-just-a%2Fba-p%2F827835%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EBring%20identities%20from%20disconnected%20ADs%20into%20Azure%20AD%20with%20just%20a%20few%20clicks!%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EIf%20you%20work%20in%20a%20large%20enterprise%2C%20you%20probably%20already%20know%20how%20big%20the%20challenges%20can%20be%20when%20your%20company%20makes%20an%20acquisition%20and%20you%20suddenly%20get%20asked%20to%20provide%20cloud%20identity%20services%20to%20an%20entirely%20new%20business%20group%2C%20usually%20one%20with%20their%20own%20set%20of%20Active%20Directory%20domains%20and%20forests.%20With%20cloud%20provisioning%2C%20customers%20can%20easily%20provision%20identities%20from%20multiple%20disconnected%20AD%20forest%20to%20Azure%20AD.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2029.0pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2029.0pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity%2Ffundamentals%2Fcustomer-lockbox-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ECustomer%20Lockbox%20for%20Microsoft%20Azure%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3ECustomer%20Lockbox%20for%20Microsoft%20Azure%20provides%20an%20interface%20for%20customers%20to%20review%20and%20approve%20or%20reject%20customer%20data%20access%20requests.%20It%20is%20used%20in%20cases%20where%20a%20Microsoft%20engineer%20needs%20to%20access%20customer%20data%20during%20a%20support%20request.%20Customer%20Lockbox%20is%20now%20generally%20available%20and%20currently%20enabled%20for%20remote%20desktop%20access%20to%20virtual%20machines.%20This%20article%20covers%20how%20Customer%20Lockbox%20requests%20are%20initiated%2C%20tracked%2C%20and%20stored%20for%20later%20reviews%20and%20audits.%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20background%3A%20%23D2D2D2%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20style%3D%22margin%3A%200in%3B%20margin-bottom%3A%20.0001pt%3B%20line-height%3A%2090%25%3B%22%3E%3CA%20target%3D%22_blank%22%20name%3D%22Client%22%3E%3C%2FA%3E%3CSPAN%20style%3D%22font-size%3A%2016.0pt%3B%20line-height%3A%2090%25%3B%20font-family%3A%20'Segoe%20UI'%2Csans-serif%3B%20color%3A%20%23404040%3B%22%3EWindows%20Client%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2020.0pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2020.0pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FWindows-IT-Pro-Blog%2FWhat-s-new-for-IT-pros-in-Windows-10-version-1909%2Fba-p%2F1002699%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EWhat%E2%80%99s%20new%20for%20IT%20pros%20in%20Windows%2010%2C%20version%201909%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EWindows%2010%2C%20version%201909%20is%20now%20available%20through%20Windows%20Server%20Update%20Services%20(WSUS)%20and%20Windows%20Update%20for%20Business%2C%20and%20can%20be%20downloaded%20from%20Visual%20Studio%20Subscriptions%2C%20the%20Software%20Download%20Center%20(via%20the%20Media%20Creation%20Tool)%2C%20and%20the%20Volume%20Licensing%20Service%20Center%20(VLSC).%20As%20you%20begin%20to%20roll%20out%20this%20new%20update%20to%20your%20organization%2C%20here%20are%20some%20of%20the%20new%2C%20key%20features%20and%20enhancements%20that%20will%20allow%20you%20to%20benefit%20from%20intelligent%20security%2C%20simplified%20updates%2C%20flexible%20management%2C%20and%20enhanced%20productivity.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20background%3A%20%23D2D2D2%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20style%3D%22margin%3A%200in%3B%20margin-bottom%3A%20.0001pt%3B%22%3E%3CA%20target%3D%22_blank%22%20name%3D%22Security%22%3E%3C%2FA%3E%3CSPAN%20style%3D%22font-size%3A%2016.0pt%3B%20font-family%3A%20'Segoe%20UI'%2Csans-serif%3B%20color%3A%20%23404040%3B%22%3ESecurity%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F12%2F16%2Fransomware-response-to-pay-or-not-to-pay%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ERansomware%20response%E2%80%94to%20pay%20or%20not%20to%20pay%3F%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EThe%20increased%20connectivity%20of%20computers%20and%20the%20growth%20of%20Bring%20Your%20Own%20Device%20(BYOD)%20in%20most%20organizations%20is%20making%20the%20distribution%20of%20malicious%20software%20(malware)%20easier.%20Unlike%20other%20types%20of%20malicious%20programs%20that%20may%20usually%20go%20undetected%20for%20a%20longer%20period%2C%20a%20ransomware%20attack%20is%20usually%20experienced%20immediately%2C%20and%20its%20impact%20on%20information%20technology%20infrastructure%20is%20often%20irreversible.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-Defender-ATP%2FShort-amp-sweet-educational-videos-for-Microsoft-Defender-ATP%2Fba-p%2F1021978%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EShort%20%26amp%3B%20sweet%20educational%20videos%20for%20Microsoft%20Defender%20ATP%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EDelivering%20on%20our%20mission%20to%20help%20customers%20take%20full%20advantage%20of%20Microsoft%20Defender%20ATP%20capabilities%2C%20we're%20continuously%20adding%20new%20features%20to%20the%20platform.%20Check%20out%20the%20first%20set%20of%20videos%20we've%20compiled%20to%20help%20customers%20easily%20discover%20and%20learn%20about%20enhancements%20and%20new%20capabilities.%20Stay%20tuned%20for%20more%20upcoming%20videos!%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-Defender-ATP%2FEDR-capabilities-for-macOS-have-now-arrived%2Fba-p%2F1047801%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EEDR%20capabilities%20for%20macOS%20have%20now%20arrived%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EWe%20are%20excited%20to%20announce%20that%20Microsoft%20Defender%20Advanced%20Threat%20Protection%20(ATP)%20endpoint%20and%20detection%20response%20(EDR)%20capabilities%20for%20macOS%20devices%20are%20now%20generally%20available.%20We%20are%20extending%20Microsoft%20Defender%20ATP%20capabilities%20into%20non-Windows%20platforms%20in%20line%20with%20our%20commitment%20to%20build%20security%20solutions%20not%20just%20for%20Microsoft%2C%20but%20also%20from%20Microsoft.%20Customers%20can%20expect%20the%20same%20familiar%20investigation%20experience%2C%20the%20same%20solid%20backend%2C%20and%20the%20same%20consistent%20progression%20of%20features%20coupled%20with%20excellent%20performance%20that%20have%20historically%20been%20Microsoft%20Defender%20ATP%E2%80%99s%20signature.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F12%2F11%2Fgo-passwordless-strengthen-security-reduce-costs%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EGo%20passwordless%20to%20strengthen%20security%20and%20reduce%20costs%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EWe%20all%20know%20passwords%20are%20inherently%20unsecure.%20They%E2%80%99re%20also%20expensive%20to%20manage.%20Users%20struggle%20to%20remember%20them.%20It%E2%80%99s%20why%20we%E2%80%99re%20so%20passionate%20about%20eliminating%20passwords%20entirely.%20Passwordless%20solutions%2C%20such%20as%20Windows%20Hello%2C%20FIDO2%20security%20keys%2C%20and%20the%20Microsoft%20Authenticator%20app%2C%20provide%20more%20secure%20and%20convenient%20sign-in%20methods.%20But%20transitioning%20your%20organization%20to%20passwordless%20authentication%20takes%20time%20and%20careful%20planning.%20You%20may%20wonder%20where%20to%20start%20and%20how%20long%20it%20will%20take%20to%20realize%20benefits.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FSecurity-Privacy-and-Compliance%2FIntroducing-the-integrated-Microsoft-Threat-Protection-solution%2Fba-p%2F1059225%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EIntroducing%20the%20integrated%20Microsoft%20Threat%20Protection%20solution%20(public%20preview)%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EEvery%20day%2C%20attackers%20compromise%20endpoints%2C%20identities%2C%20and%20email%20to%20infiltrate%20and%20quickly%20expand%20their%20foothold%20in%20an%20organization.%20Customers%20need%20protection%20across%20these%20attack%20vectors%20to%20defend%20against%20evolving%20threats.%20Microsoft%20Threat%20Protection%20is%20an%20integrated%20solution%20that%E2%80%99s%20built%20on%20our%20best-in-class%20Microsoft%20365%20security%20suite%3A%20Microsoft%20Defender%20Advanced%20Threat%20Protection%20(ATP)%20for%20endpoints%2C%20Office%20365%20ATP%20for%20email%20and%20collaboration%20tools%2C%20Azure%20ATP%20for%20identity-based%20threats%2C%20and%20Microsoft%20Cloud%20App%20Security%20(MCAS)%20for%20SaaS%20applications.%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F12%2F11%2Fthe-quiet-evolution-of-phishing%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EThe%20quiet%20evolution%20of%20phishing%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EThe%20battle%20against%20phishing%20is%20a%20silent%20one%3A%20every%20day%2C%20Office%20365%20Advanced%20Threat%20Protection%20detects%20millions%20of%20distinct%20malicious%20URLs%20and%20email%20attachments.%20Every%20year%2C%20billions%20of%20phishing%20emails%20don%E2%80%99t%20ever%20reach%20mailboxes%E2%80%94real-world%20attacks%20foiled%20in%20real-time.%20Heuristics%2C%20detonation%2C%20and%20machine%20learning%2C%20enriched%20by%20signals%20from%20Microsoft%20Threat%20Protection%20services%2C%20provide%20dynamic%2C%20robust%20protection%20against%20email%20threats.%20Phishers%20have%20been%20quietly%20retaliating%2C%20evolving%20their%20techniques%20to%20try%20and%20evade%20these%20protections.%20In%202019%2C%20we%20saw%20phishing%20attacks%20reach%20new%20levels%20of%20creativity%20and%20sophistication.%20Notably%2C%20these%20techniques%20involve%20the%20abuse%20of%20legitimate%20cloud%20services%20like%20those%20offered%20by%20Microsoft%2C%20Google%2C%20Amazon%2C%20and%20others.%20At%20Microsoft%2C%20we%20have%20aggressive%20processes%20to%20identify%20and%20take%20down%20nefarious%20uses%20of%20our%20services%20without%20affecting%20legitimate%20applications.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fmicrosoft-365-security-for-bdm%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20365%20Security%20for%20Business%20Decision%20Makers%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EThis%20article%20discusses%20some%20of%20the%20most%20common%20threat%20and%20attack%20scenarios%20currently%20faced%20by%20organizations%20for%20their%20Microsoft%20365%20environments%2C%20and%20recommended%20actions%20for%20mitigating%20these%20risks.%20While%20Microsoft%20365%20comes%20with%20a%20wide%20array%20of%20pre-configured%20security%20features%2C%20it%20also%20requires%20you%20as%20the%20customer%20to%20take%20responsibility%20to%20secure%20your%20own%20identities%2C%20data%2C%20and%20devices%20used%20to%20access%20cloud%20services.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Flist%3DPLLasX02E8BPCWLfOxUXQjriXLRHVwwbCg%25E2%2580%25A6%26amp%3Bv%3DNwovfHZEdqY%26amp%3Bapp%3Ddesktop%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EIntroduction%20to%20Azure%20Security%20Compass%20%7C%20Azure%20Security%20Basics%20(Video)%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EIn%20this%20video%2C%20we%20introduce%20the%20Azure%20Security%20Compass%20and%20how%20you%20can%20use%20these%20best%20practices%20to%20rapidly%20secure%20your%20assets%20on%20Azure.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity%2Ffundamentals%2Fnetwork-best-practices%3F_lrsc%3Da7a88db4-38e8-4020-913a-f6da741818b8%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20best%20practices%20for%20network%20security%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EThis%20article%20discusses%20a%20collection%20of%20Azure%20best%20practices%20to%20enhance%20your%20network%20security.%20These%20best%20practices%20are%20derived%20from%20our%20experience%20with%20Azure%20networking%20and%20the%20experiences%20of%20customers%20like%20yourself.%20These%20best%20practices%20are%20based%20on%20a%20consensus%20opinion%2C%20and%20Azure%20platform%20capabilities%20and%20feature%20sets%2C%20as%20they%20exist%20at%20the%20time%20this%20article%20was%20written.%20Opinions%20and%20technologies%20change%20over%20time%20and%20this%20article%20will%20be%20updated%20on%20a%20regular%20basis%20to%20reflect%20those%20changes.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FAzure-Information-Protection%2FAzure-Information-Protection-Documentation-Update-for-November%2Fba-p%2F1031924%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAzure%20Information%20Protection%20Documentation%20Update%20for%20November%202019%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EThe%20Documentation%20for%20Azure%20Information%20Protection%20been%20updated%20on%20the%20web%20and%20the%20latest%20content%20has%20a%20November%202019%20(or%20later)%20date%20at%20the%20top%20of%20the%20article.%20Of%20course%2C%20the%20focus%20for%20this%20month%20was%20Ignite%202019%20in%20Orlando.%20If%20you%20missed%20the%20excellent%20recap%20that%20Nir%20Hendler%20provided%2C%20you'll%20find%20it%20here%3A%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FSecurity-Privacy-and-Compliance%2FMicrosoft-Information-Protection-Ignite-2019-recap%2Fba-p%2F998174%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EMicrosoft%20Information%20Protection%20-%20Ignite%202019%20recap%3C%2FA%3E.%20We%20listen%20to%20your%20feedback%20and%20try%20to%20incorporate%20it%20whenever%20possible.%20Let%20us%20know%20if%20you%20have%20feedback%20about%20the%20technical%20documentation%20for%20Azure%20Information%20Protection.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F11%2F14%2Fsecurity-incident-response-utilizing-cloud-dart-tools-techniques-procedures-part-1%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EChanging%20security%20incident%20response%20by%20utilizing%20the%20power%20of%20the%20cloud%E2%80%94DART%20tools%2C%20techniques%2C%20and%20procedures%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EThis%20is%20the%20first%20in%20a%20blog%20series%20discussing%20the%20tools%2C%20techniques%2C%20and%20procedures%20that%20the%20Microsoft%20Detection%20and%20Response%20Team%20(DART)%20use%20to%20investigate%20cybersecurity%20incidents%20at%20our%20customer%20organizations.%20Today%2C%20we%20introduce%20the%20team%20and%20give%20a%20brief%20overview%20of%20each%20of%20the%20tools%20that%20utilize%20the%20power%20of%20the%20cloud.%20In%20upcoming%20posts%2C%20we%E2%80%99ll%20cover%20each%20tool%20in-depth%20and%20elaborate%20on%20techniques%20and%20procedures%20used%20by%20the%20team.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FSecurity-Privacy-and-Compliance%2FIntroducing-remote-deployment-guidance-for-Microsoft-Defender%2Fba-p%2F974443%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EIntroducing%20remote%20deployment%20guidance%20for%20Microsoft%20Defender%20ATP%20and%20Office%20365%20ATP%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EIn%20today%E2%80%99s%20heterogeneous%20environments%2C%20security%20is%20becoming%20more%20and%20more%20complex.%20Customers%20are%20facing%20a%20growing%20attack%20surface%20and%20need%20help%20speeding%20up%20deployment%20of%20their%20protection%20tools%20at%20scale.%20To%20help%20security%20teams%20address%20these%20complexities%20and%20better%20protect%2C%20detect%20and%20respond%20to%20threats%20faster%2C%20we%20are%20excited%20to%20announce%20Microsoft%20FastTrack%20remote%20deployment%20guidance%20for%20Microsoft%20Defender%20Advanced%20Threat%20Protection%20(ATP)%2C%20our%20unified%20endpoint%20security%20platform%20for%20proactive%20threat%20protection%2C%20post-breach%20detection%2C%20automated%20investigation%2C%20and%20response.%20We%20are%20also%20announcing%20an%20expanded%20FastTrack%20scope%20for%20Office%20365%20Advanced%20Threat%20Protection%2C%20which%20protects%20customers%20against%20sophisticated%20threats%20like%20phishing%20and%20malware%20with%20automated%20investigation%20and%20remediation.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F12%2F09%2Fimprove-cyber-supply-chain-risk-management-microsoft-azure%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EImprove%20cyber%20supply%20chain%20risk%20management%20with%20Microsoft%20Azure%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EFor%20years%2C%20Microsoft%20has%20tracked%20threat%20actors%20exploiting%20federal%20cyber%20supply%20chain%20vulnerabilities.%20Supply%20chain%20attacks%20target%20software%20developers%2C%20systems%20integrators%2C%20and%20technology%20companies.%20Tactics%20often%20include%20obtaining%20source%20code%2C%20build%20processes%2C%20or%20update%20mechanisms%20to%20compromise%20legitimate%20applications.%20This%20is%20a%20key%20concern%20for%20government%20cybersecurity%20in%20the%20cloud%2C%20as%20the%20expanding%20digital%20estate%20requires%20movement%20towards%20a%20Zero%20Trust%20security%20model.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FSecurity-Privacy-and-Compliance%2FIntroducing-campaign-views-in-Office-365-Advanced-Threat%2Fba-p%2F1054954%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EIntroducing%20campaign%20views%20in%20Office%20365%20Advanced%20Threat%20Protection%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EIt%E2%80%99s%20no%20secret%20that%20most%20cyberattacks%20are%20initiated%20over%20an%20email.%20But%20it%E2%80%99s%20not%20just%20one%20email%20%E2%80%93%20it%E2%80%99s%20typically%20a%20swarm%20of%20email%20designed%20to%20maximize%20the%20impact%20of%20the%20attack.%20Attackers%20typically%20pick%20a%20carefully%20crafted%20attack%20pattern%20or%20template%20and%20send%20email%20in%20waves%20where%20they%20introduce%20slight%20variances%20to%20try%20and%20thwart%20defenses%20and%20dupe%20users.%20The%20common%20pattern%20or%20template%20across%20these%20waves%20of%20email%20defines%20their%20attack%20%E2%80%98campaign%E2%80%99%2C%20and%20attackers%20are%20getting%20better%20and%20better%20at%20morphing%20attacks%20quickly%20to%20evade%20detection%20and%20prevention.%20Being%20able%20to%20spot%20the%20forest%20for%20the%20trees%20-%20or%20in%20this%20case%20the%20entire%20email%20campaign%20over%20individual%20messages%20-%20is%20critical%20to%20ensuring%20comprehensive%20protection%20for%20the%20organization%20and%20users%20as%20it%20allows%20security%20teams%20to%20spot%20weaknesses%20in%20defenses%20quicker%2C%20identify%20vulnerable%20users%20and%20take%20remediation%20steps%20faster%2C%20and%20harvest%20attacker%20intelligence%20to%20track%20and%20thwart%20future%20attacks.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20background%3A%20%23D2D2D2%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20style%3D%22margin%3A%200in%3B%20margin-bottom%3A%20.0001pt%3B%22%3E%3CA%20target%3D%22_blank%22%20name%3D%22SupportLifecycle%22%3E%3C%2FA%3E%3CSPAN%20style%3D%22font-size%3A%2016.0pt%3B%20font-family%3A%20'Segoe%20UI'%2Csans-serif%3B%20color%3A%20%23404040%3B%22%3EUpdates%20and%20Support%20Lifecycle%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fmyignite.techcommunity.microsoft.com%2Fsessions%2F82850%3Fsource%3Dsessions%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EPlan%20for%20Z-Day%202020%3A%20Windows%20Server%202008%20end%20of%20support%20is%20coming!%20(Ignite%20session%20recording)%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EWindows%20Server%202008%20still%20roams%20the%20earth.%20Support%20ends%20on%20January%2014th%3A%20Z-Day!%20Learn%20how%20to%20migrate%20off%20legacy%20infrastructure%20machines%20with%20the%20Storage%20Migration%20Service%2C%20in-place%20upgrades%2C%20cluster%20rolling%20upgrades%2C%20and%20Azure%20Migrate.%20Modernize%20your%20on-premises%20workloads%2C%20explore%20Azure%20IaaS%20options%2C%20and%20get%20insider%20information%20on%20the%20roadmap.%20Watch%20Ned%20battle%20your%20servers%20that%20are%20going%20end-of-support%20with%20just%20a%20few%20clicks!%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FExchange-Team-Blog%2FMicrosoft-Extending-End-of-Support-for-Exchange-Server-2010-to%2Fba-p%2F753591%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EMicrosoft%20Extending%20End%20of%20Support%20for%20Exchange%20Server%202010%20to%20October%2013th%2C%202020%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EAfter%20investigating%20and%20analyzing%20the%20deployment%20state%20of%20an%20extensive%20number%20of%20Exchange%20customers%20we%20have%20decided%20to%20move%20the%20end%20of%20Extended%20Support%20for%20Exchange%20Server%202010%20from%20January%2014th%202020%20to%20October%2013th%202020.%20Our%20commitment%20to%20meeting%20the%20evolving%20needs%20of%20our%20customers%20is%20as%20strong%20as%20ever%2C%20and%20we%20recognize%20discontinuing%20support%20for%20a%20product%20that%20has%20been%20as%20popular%20and%20reliable%20as%20Exchange%20Server%202010%20can%20be%20an%20adjustment.%20We%20also%20know%20that%20some%20of%20you%20are%20in%20the%20midst%20of%20upgrades%20to%20a%20newer%20version%20of%20Exchange%20Server%20on-premises%2C%20or%20more%20transformative%20migrations%20to%20the%20cloud%20with%20Office%20365%20and%20Exchange%20Online.%20With%20this%20in%20mind%2C%20we%20are%20extending%20end%20of%20support%20to%20October%2013th%202020%20to%20give%20Exchange%20Server%202010%20customers%20more%20time%20to%20complete%20their%20migrations.%20This%20extension%20also%20aligns%20with%20the%20end%20of%20support%20for%20Office%202010%20and%20SharePoint%20Server%202010.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4057281%2Fwindows-7-support-will-end-on-january-14-2020%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EWindows%207%20support%20will%20end%20on%20January%2014%2C%202020%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EMicrosoft%20made%20a%20commitment%20to%20provide%2010%20years%20of%20product%20support%20for%20Windows%207%20when%20it%20was%20released%20on%20October%2022%2C%202009.%20When%20this%2010-year%20period%20ends%2C%20Microsoft%20will%20discontinue%20Windows%207%20support%20so%20that%20we%20can%20focus%20our%20investment%20on%20supporting%20newer%20technologies%20and%20great%20new%20experiences.%20The%20specific%20end%20of%20support%20day%20for%20Windows%207%20will%20be%20January%2014%2C%202020.%20After%20that%2C%20technical%20assistance%20and%20automatic%20updates%20that%20help%20protect%20your%20PC%20will%20no%20longer%20be%20made%20available%20for%20the%20product.%20Microsoft%20strongly%20recommends%20that%20you%20move%20to%20Windows%2010%20sometime%20before%20January%202020%20to%20avoid%20a%20situation%20where%20you%20need%20service%20or%20support%20that%20is%20no%20longer%20available.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fna01.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Faka.ms%252Feos-offer-faq%26amp%3Bdata%3D02%257C01%257C%257C59ea4666deb74dc1f6b208d611f497b8%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C636716140005621349%26amp%3Bsdata%3DPaW9kDmsoDSDUTlaro%252B7NW7FivkMqJ34H0bye%252Bvqj%252Fw%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EExtended%20Security%20Updates%20for%20SQL%20Server%20and%20Windows%20Server%202008%2F2008%20R2%3A%20Frequently%20Asked%20Questions%3C%2FA%3E%20(PDF)%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EOn%20January%2014%2C%202020%2C%20support%20for%20Windows%20Server%202008%20and%202008%20R2%20will%20end.%20That%20means%20the%20end%20of%20regular%20security%20updates.%20Don't%20let%20your%20infrastructure%20and%20applications%20go%20unprotected.%20We're%20here%20to%20help%20you%20migrate%20to%20current%20versions%20for%20greater%20security%2C%20performance%20and%20innovation.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4316957%2Fproducts-reaching-end-of-support-for-2019%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EProducts%20reaching%20End%20of%20Support%20for%202019%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4470235%2Fproducts-reaching-end-of-support-for-2020%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EProducts%20reaching%20End%20of%20Support%20for%202020%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2035.75pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20background%3A%20%23D2D2D2%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2035.75pt%3B%22%3E%3CP%20style%3D%22margin%3A%200in%3B%20margin-bottom%3A%20.0001pt%3B%22%3E%3CA%20target%3D%22_blank%22%20name%3D%22Premier%22%3E%3C%2FA%3E%3CSPAN%20style%3D%22font-size%3A%2016.0pt%3B%20font-family%3A%20'Segoe%20UI'%2Csans-serif%3B%20color%3A%20%23404040%3B%22%3EMicrosoft%20Premier%20Support%20News%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%3ECheck%20out%20Microsoft%20Services%20public%20blog%20for%20new%20Proactive%20Services%20as%20well%20as%20new%20features%20and%20capabilities%20of%20the%20Services%20Hub%2C%20On-demand%20Assessments%2C%20and%20On-demand%20Learning%20platforms.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1070785%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20there!%20You%20are%20reading%20the%20next%20issue%20of%20the%20Infrastructure%20%2B%20Security%3A%20Noteworthy%20News%20series!%20%3CBR%20%2F%3E%3CBR%20%2F%3EAs%20a%20reminder%2C%20the%20Noteworthy%20News%20series%20covers%20various%20areas%2C%20to%20include%20interesting%20news%2C%20announcements%2C%20links%2C%20tips%20and%20tricks%20from%20Windows%2C%20Azure%2C%20and%20Security%20worlds%20on%20a%20monthly%20basis.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1070785%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EJenniferRoss%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EStanislavBelov%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Hi there! You are reading the next issue of the Infrastructure + Security: Noteworthy News series!

As a reminder, the Noteworthy News series covers various areas, to include interesting news, announcements, links, tips and tricks from Windows, Azure, and Security worlds on a monthly basis.

 

Microsoft Azure

Bring identities from disconnected ADs into Azure AD with just a few clicks!

If you work in a large enterprise, you probably already know how big the challenges can be when your company makes an acquisition and you suddenly get asked to provide cloud identity services to an entirely new business group, usually one with their own set of Active Directory domains and forests. With cloud provisioning, customers can easily provision identities from multiple disconnected AD forest to Azure AD.

Customer Lockbox for Microsoft Azure

Customer Lockbox for Microsoft Azure provides an interface for customers to review and approve or reject customer data access requests. It is used in cases where a Microsoft engineer needs to access customer data during a support request. Customer Lockbox is now generally available and currently enabled for remote desktop access to virtual machines. This article covers how Customer Lockbox requests are initiated, tracked, and stored for later reviews and audits.

 

Windows Client

What’s new for IT pros in Windows 10, version 1909

Windows 10, version 1909 is now available through Windows Server Update Services (WSUS) and Windows Update for Business, and can be downloaded from Visual Studio Subscriptions, the Software Download Center (via the Media Creation Tool), and the Volume Licensing Service Center (VLSC). As you begin to roll out this new update to your organization, here are some of the new, key features and enhancements that will allow you to benefit from intelligent security, simplified updates, flexible management, and enhanced productivity.

Security

Ransomware response—to pay or not to pay?

The increased connectivity of computers and the growth of Bring Your Own Device (BYOD) in most organizations is making the distribution of malicious software (malware) easier. Unlike other types of malicious programs that may usually go undetected for a longer period, a ransomware attack is usually experienced immediately, and its impact on information technology infrastructure is often irreversible.

Short & sweet educational videos for Microsoft Defender ATP

Delivering on our mission to help customers take full advantage of Microsoft Defender ATP capabilities, we're continuously adding new features to the platform. Check out the first set of videos we've compiled to help customers easily discover and learn about enhancements and new capabilities. Stay tuned for more upcoming videos!

EDR capabilities for macOS have now arrived

We are excited to announce that Microsoft Defender Advanced Threat Protection (ATP) endpoint and detection response (EDR) capabilities for macOS devices are now generally available. We are extending Microsoft Defender ATP capabilities into non-Windows platforms in line with our commitment to build security solutions not just for Microsoft, but also from Microsoft. Customers can expect the same familiar investigation experience, the same solid backend, and the same consistent progression of features coupled with excellent performance that have historically been Microsoft Defender ATP’s signature.

Go passwordless to strengthen security and reduce costs

We all know passwords are inherently unsecure. They’re also expensive to manage. Users struggle to remember them. It’s why we’re so passionate about eliminating passwords entirely. Passwordless solutions, such as Windows Hello, FIDO2 security keys, and the Microsoft Authenticator app, provide more secure and convenient sign-in methods. But transitioning your organization to passwordless authentication takes time and careful planning. You may wonder where to start and how long it will take to realize benefits.

Introducing the integrated Microsoft Threat Protection solution (public preview)

Every day, attackers compromise endpoints, identities, and email to infiltrate and quickly expand their foothold in an organization. Customers need protection across these attack vectors to defend against evolving threats. Microsoft Threat Protection is an integrated solution that’s built on our best-in-class Microsoft 365 security suite: Microsoft Defender Advanced Threat Protection (ATP) for endpoints, Office 365 ATP for email and collaboration tools, Azure ATP for identity-based threats, and Microsoft Cloud App Security (MCAS) for SaaS applications. 

The quiet evolution of phishing

The battle against phishing is a silent one: every day, Office 365 Advanced Threat Protection detects millions of distinct malicious URLs and email attachments. Every year, billions of phishing emails don’t ever reach mailboxes—real-world attacks foiled in real-time. Heuristics, detonation, and machine learning, enriched by signals from Microsoft Threat Protection services, provide dynamic, robust protection against email threats. Phishers have been quietly retaliating, evolving their techniques to try and evade these protections. In 2019, we saw phishing attacks reach new levels of creativity and sophistication. Notably, these techniques involve the abuse of legitimate cloud services like those offered by Microsoft, Google, Amazon, and others. At Microsoft, we have aggressive processes to identify and take down nefarious uses of our services without affecting legitimate applications.

Microsoft 365 Security for Business Decision Makers

This article discusses some of the most common threat and attack scenarios currently faced by organizations for their Microsoft 365 environments, and recommended actions for mitigating these risks. While Microsoft 365 comes with a wide array of pre-configured security features, it also requires you as the customer to take responsibility to secure your own identities, data, and devices used to access cloud services.

Introduction to Azure Security Compass | Azure Security Basics (Video)

In this video, we introduce the Azure Security Compass and how you can use these best practices to rapidly secure your assets on Azure.

Azure best practices for network security

This article discusses a collection of Azure best practices to enhance your network security. These best practices are derived from our experience with Azure networking and the experiences of customers like yourself. These best practices are based on a consensus opinion, and Azure platform capabilities and feature sets, as they exist at the time this article was written. Opinions and technologies change over time and this article will be updated on a regular basis to reflect those changes.

Azure Information Protection Documentation Update for November 2019

The Documentation for Azure Information Protection been updated on the web and the latest content has a November 2019 (or later) date at the top of the article. Of course, the focus for this month was Ignite 2019 in Orlando. If you missed the excellent recap that Nir Hendler provided, you'll find it here: Microsoft Information Protection - Ignite 2019 recap. We listen to your feedback and try to incorporate it whenever possible. Let us know if you have feedback about the technical documentation for Azure Information Protection.

Changing security incident response by utilizing the power of the cloud—DART tools, techniques, and ...

This is the first in a blog series discussing the tools, techniques, and procedures that the Microsoft Detection and Response Team (DART) use to investigate cybersecurity incidents at our customer organizations. Today, we introduce the team and give a brief overview of each of the tools that utilize the power of the cloud. In upcoming posts, we’ll cover each tool in-depth and elaborate on techniques and procedures used by the team.

Introducing remote deployment guidance for Microsoft Defender ATP and Office 365 ATP

In today’s heterogeneous environments, security is becoming more and more complex. Customers are facing a growing attack surface and need help speeding up deployment of their protection tools at scale. To help security teams address these complexities and better protect, detect and respond to threats faster, we are excited to announce Microsoft FastTrack remote deployment guidance for Microsoft Defender Advanced Threat Protection (ATP), our unified endpoint security platform for proactive threat protection, post-breach detection, automated investigation, and response. We are also announcing an expanded FastTrack scope for Office 365 Advanced Threat Protection, which protects customers against sophisticated threats like phishing and malware with automated investigation and remediation.

Improve cyber supply chain risk management with Microsoft Azure

For years, Microsoft has tracked threat actors exploiting federal cyber supply chain vulnerabilities. Supply chain attacks target software developers, systems integrators, and technology companies. Tactics often include obtaining source code, build processes, or update mechanisms to compromise legitimate applications. This is a key concern for government cybersecurity in the cloud, as the expanding digital estate requires movement towards a Zero Trust security model.

Introducing campaign views in Office 365 Advanced Threat Protection

It’s no secret that most cyberattacks are initiated over an email. But it’s not just one email – it’s typically a swarm of email designed to maximize the impact of the attack. Attackers typically pick a carefully crafted attack pattern or template and send email in waves where they introduce slight variances to try and thwart defenses and dupe users. The common pattern or template across these waves of email defines their attack ‘campaign’, and attackers are getting better and better at morphing attacks quickly to evade detection and prevention. Being able to spot the forest for the trees - or in this case the entire email campaign over individual messages - is critical to ensuring comprehensive protection for the organization and users as it allows security teams to spot weaknesses in defenses quicker, identify vulnerable users and take remediation steps faster, and harvest attacker intelligence to track and thwart future attacks.

Updates and Support Lifecycle

Plan for Z-Day 2020: Windows Server 2008 end of support is coming! (Ignite session recording)

Windows Server 2008 still roams the earth. Support ends on January 14th: Z-Day! Learn how to migrate off legacy infrastructure machines with the Storage Migration Service, in-place upgrades, cluster rolling upgrades, and Azure Migrate. Modernize your on-premises workloads, explore Azure IaaS options, and get insider information on the roadmap. Watch Ned battle your servers that are going end-of-support with just a few clicks!

Microsoft Extending End of Support for Exchange Server 2010 to October 13th, 2020

After investigating and analyzing the deployment state of an extensive number of Exchange customers we have decided to move the end of Extended Support for Exchange Server 2010 from January 14th 2020 to October 13th 2020. Our commitment to meeting the evolving needs of our customers is as strong as ever, and we recognize discontinuing support for a product that has been as popular and reliable as Exchange Server 2010 can be an adjustment. We also know that some of you are in the midst of upgrades to a newer version of Exchange Server on-premises, or more transformative migrations to the cloud with Office 365 and Exchange Online. With this in mind, we are extending end of support to October 13th 2020 to give Exchange Server 2010 customers more time to complete their migrations. This extension also aligns with the end of support for Office 2010 and SharePoint Server 2010.

Windows 7 support will end on January 14, 2020

Microsoft made a commitment to provide 10 years of product support for Windows 7 when it was released on October 22, 2009. When this 10-year period ends, Microsoft will discontinue Windows 7 support so that we can focus our investment on supporting newer technologies and great new experiences. The specific end of support day for Windows 7 will be January 14, 2020. After that, technical assistance and automatic updates that help protect your PC will no longer be made available for the product. Microsoft strongly recommends that you move to Windows 10 sometime before January 2020 to avoid a situation where you need service or support that is no longer available.

Extended Security Updates for SQL Server and Windows Server 2008/2008 R2: Frequently Asked Questions (PDF)

On January 14, 2020, support for Windows Server 2008 and 2008 R2 will end. That means the end of regular security updates. Don't let your infrastructure and applications go unprotected. We're here to help you migrate to current versions for greater security, performance and innovation.

Products reaching End of Support for 2019

Products reaching End of Support for 2020

Microsoft Premier Support News

Check out Microsoft Services public blog for new Proactive Services as well as new features and capabilities of the Services Hub, On-demand Assessments, and On-demand Learning platforms.