%3CLINGO-SUB%20id%3D%22lingo-sub-1196280%22%20slang%3D%22en-US%22%3ERe%3A%20Infrastructure%20%2B%20Security%3A%20Noteworthy%20News%20(February%2C%202020)%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1196280%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20for%20Sharing%20with%20the%20Community%26nbsp%3B%3CIMG%20class%3D%22lia-deferred-image%20lia-image-emoji%22%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Fhtml%2Fimages%2Femoticons%2Fcool_40x40.gif%22%20alt%3D%22%3Acool%3A%22%20title%3D%22%3Acool%3A%22%20%2F%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1249497%22%20slang%3D%22en-US%22%3ERe%3A%20Infrastructure%20%2B%20Security%3A%20Noteworthy%20News%20(February%2C%202020)%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1249497%22%20slang%3D%22en-US%22%3E%3CP%3EAs%20always%2C%20great%20material%20Stan!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1185202%22%20slang%3D%22en-US%22%3EInfrastructure%20%2B%20Security%3A%20Noteworthy%20News%20(February%2C%202020)%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1185202%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20there!%20You%20are%20reading%20the%20next%20issue%20of%20the%20Infrastructure%20%2B%20Security%3A%20Noteworthy%20News%20series!%20%3CBR%20%2F%3E%3CBR%20%2F%3EAs%20a%20reminder%2C%20the%20Noteworthy%20News%20series%20covers%20various%20areas%2C%20to%20include%20interesting%20news%2C%20announcements%2C%20links%2C%20tips%20and%20tricks%20from%20Windows%2C%20Azure%2C%20and%20Security%20worlds%20on%20a%20monthly%20basis.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CTABLE%20class%3D%22MsoNormalTable%22%20style%3D%22margin-left%3A%204.5pt%3B%20border-collapse%3A%20collapse%3B%22%20border%3D%220%22%20width%3D%2299%25%22%20cellspacing%3D%220%22%20cellpadding%3D%220%22%3E%0A%3CTBODY%3E%0A%3CTR%20style%3D%22height%3A%20.25in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20background%3A%20%23D2D2D2%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.25in%3B%22%3E%3CP%20style%3D%22margin%3A%200in%3B%20margin-bottom%3A%20.0001pt%3B%20line-height%3A%2090%25%3B%22%3E%3CSPAN%20style%3D%22font-size%3A%2016.0pt%3B%20line-height%3A%2090%25%3B%20font-family%3A%20'Segoe%20UI'%2Csans-serif%3B%20color%3A%20%23404040%3B%22%3EMicrosoft%20Azure%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2029.0pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2029.0pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Ffundamentals%2Fwhats-new%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EWhat's%20new%20in%20Azure%20Active%20Directory%3F%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EAzure%20AD%20receives%20improvements%20on%20an%20ongoing%20basis.%20To%20stay%20up%20to%20date%20with%20the%20most%20recent%20developments%2C%20this%20article%20provides%20you%20with%20information%20about%20the%20latest%20releases%2C%20known%20issues%2C%20bug%20fixes%2C%20deprecated%20functionality%2C%20plans%20for%20changes%2C%20etc.%20This%20page%20is%20updated%20monthly%2C%20so%20revisit%20it%20regularly.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2029.0pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2029.0pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2F5-identity-priorities-for-2020-preparing-for-what-s-next%2Fba-p%2F1131492%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3E5%20identity%20priorities%20for%202020%20%E2%80%94%20preparing%20for%20what%E2%80%99s%20next%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EAs%20we%20reflect%20over%20the%20past%20decade%2C%20it%E2%80%99s%20remarkable%20how%20the%20digital%20transformation%20has%20reshaped%20the%20way%20people%20work%20and%20how%20companies%20do%20business.%20Let%E2%80%99s%20take%20one%20example%20%E2%80%94%20your%20users.%20At%20one%20time%2C%20%E2%80%9Cusers%E2%80%9D%20meant%20employees.%20Users%20now%20include%20partners%2C%20customers%2C%20even%20software%20bots%20and%20devices.%20What%20started%20as%20identity%20for%20the%20workforce%20is%20now%20identity%20for%20everyone%20and%20everything.%20The%20corporate%20network%20perimeter%20has%20disappeared%2C%20making%20identity%20the%20control%20plane%20for%20security%20that%20now%20provides%20effective%20access%20control%20across%20all%20users%20and%20digital%20resources.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2029.0pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2029.0pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fprivate-link%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Private%20Link%20is%20now%20generally%20available%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EAzure%20Private%20Link%20is%20a%20secure%20and%20scalable%20way%20for%20you%20to%20consume%20services%20(such%20as%20Azure%20PaaS%2C%26nbsp%3B%20Partner%20Service%2C%20BYOS)%20on%20the%20Azure%20platform%20privately%20from%20within%20your%20virtual%20network.%20Private%20Link%20also%20enables%20you%20to%20create%20and%20render%20your%20own%20services%20on%20Azure.%20It%20enables%20a%20true%20private%20connectivity%20experience%20between%20services%20and%20virtual%20networks.%20The%20technology%20is%20based%20on%20a%20provider-and-consumer%20model%20where%20the%20provider%20and%20the%20consumer%20are%20both%20hosted%20in%20Azure.%20A%20connection%20is%20established%20using%20a%20consent-based%20call%20flow%20and%20once%20established%2C%20all%20data%20that%20flows%20between%20the%20service%20provider%20and%20service%20consumer%20is%20isolated%20from%20the%20internet%20and%20stays%20on%20the%20Microsoft%20network.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2029.0pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2029.0pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-gb%2Fupdates%2Fkey-vault-private-endpoint%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Key%20Vault%20%E2%80%93%20Private%20endpoints%20now%20available%20in%20preview%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EEstablish%20a%20private%20connection%20between%20Azure%20Key%20Vault%20and%20other%20Azure%20services%20by%20using%20Azure%20Private%20Link%2C%20now%20available%20in%20preview%20for%20all%20public%20regions.%20Azure%20Private%20Link%20enables%20you%20to%20access%20Azure%20services%20(for%20example%2C%20Azure%20Key%20Vault%2C%20Azure%20Storage%20and%20Azure%20Cosmos%20DB)%20and%20Azure-hosted%20customer%2Fpartner%20services%20over%20a%20private%20endpoint%20in%20your%20virtual%20network.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2029.0pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2029.0pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fitops-talk-blog%2F5-bits-of-advice-for-managing-your-cloud-spend%2Fba-p%2F1099566%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3E5%20bits%20of%20advice%20for%20managing%20your%20Cloud%20spend%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3ECost%20is%20something%20that%20everyone%20is%20aware%20of%2C%20whether%20it%20be%20managing%20what%20you%20spend%20on%20IT%20gadgets%20or%20games%2C%20to%20household%20budgets%20and%20at%20work%20it%E2%80%99s%20no%20different%20we%20are%20all%20aware%20that%20our%20employers%20don%E2%80%99t%20have%20unlimited%20budget%20(even%20Microsoft)%20to%20spend%20and%20have%20to%20be%20mindful%20of%20it.%26nbsp%3B%20In%20the%20past%20we%20would%20spend%20a%20large%20chunk%20of%20money%20on%20a%20large%20chunk%20of%20metal%20(also%20known%20as%20physical%20servers)%20and%20that%20would%20be%20the%20budget%20for%20the%20quarter%20or%20year%20and%20we%E2%80%99d%20not%20really%20think%20about%20it%20until%20that%20large%20chunk%20of%20metal%20ran%20out%20of%20some%20kind%20of%20resource.%20In%20this%20article%20I%E2%80%99ll%20take%20you%20through%20the%20top%205%20things%20I%20recommend%20thinking%20about%20when%20looking%20at%20cloud%20cost%20management%20and%20utilizing%20Azure%20Cost%20Management.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.25in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20background%3A%20%23D2D2D2%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.25in%3B%22%3E%3CP%20style%3D%22margin%3A%200in%3B%20margin-bottom%3A%20.0001pt%3B%20line-height%3A%2090%25%3B%22%3E%3CA%20target%3D%22_blank%22%20name%3D%22Server%22%3E%3C%2FA%3E%3CSPAN%20style%3D%22font-size%3A%2016.0pt%3B%20line-height%3A%2090%25%3B%20font-family%3A%20'Segoe%20UI'%2Csans-serif%3B%20color%3A%20%23404040%3B%22%3EWindows%20Server%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2029.45pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2029.45pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fturn-to-a-new-chapter-of-windows-server-innovation%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ETurning%20to%20a%20new%20chapter%20of%20Windows%20Server%20innovation%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EJanuary%2014%2C%202020%20marked%20the%20end%20of%20support%20for%20Windows%20Server%202008%20and%20Windows%20Server%202008%20R2.%20Customers%20loved%20these%20releases%2C%20which%20introduced%20advancements%20such%20as%20the%20shift%20from%2032-bit%20to%2064-bit%20computing%20and%20server%20virtualization.%20While%20support%20for%20these%20popular%20releases%20ended%2C%20we%20are%20excited%20about%20new%20innovations%20in%20cloud%20computing%2C%20hybrid%20cloud%2C%20and%20data%20that%20can%20help%20server%20workloads%20get%20ready%20for%20the%20new%20era.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20background%3A%20%23D2D2D2%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20style%3D%22margin%3A%200in%3B%20margin-bottom%3A%20.0001pt%3B%20line-height%3A%2090%25%3B%22%3E%3CA%20target%3D%22_blank%22%20name%3D%22Client%22%3E%3C%2FA%3E%3CSPAN%20style%3D%22font-size%3A%2016.0pt%3B%20line-height%3A%2090%25%3B%20font-family%3A%20'Segoe%20UI'%2Csans-serif%3B%20color%3A%20%23404040%3B%22%3EWindows%20Client%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2020.0pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2020.0pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fitshowcase%2Fdeploying-windows-10-and-managing-updates-at-microsoft%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EDeploying%20Windows%2010%20and%20managing%20updates%20at%20Microsoft%3C%2FA%3E%20(Video%2C%20PDF)%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EWindows%2010%20Enterprise%20unlocks%20a%20productive%2C%20creative%2C%20and%20collaborative%20experience%20with%20intelligent%20security%20capabilities%20that%20work%20systematically%20to%20help%20protect%20your%20enterprise.%20Core%20Services%20Engineering%20and%20Operations%20has%20embraced%20Windows%20as%20a%20service%2C%20as%20its%20agile%20approach%20allows%20us%20to%20streamline%20application-compatibility%20testing%2C%20pilot%20deployments%20with%20early%20adopters%2C%20track%20progress%20through%20visual%20workflows%2C%20and%20make%20data-driven%20decisions%20using%20Desktop%20Analytics.%20In%20this%20webinar%2C%20you%E2%80%99ll%20learn%20how%20we%20leveraged%20Windows%20Update%20for%20Business%20by%20using%20Microsoft%20Intune%20and%20Microsoft%20System%20Center%20Configuration%20Manager%20to%20deploy%20and%20keep%20our%20devices%20up%20to%20date.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2020.0pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2020.0pt%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fitshowcase%2Fimplementing-strong-user-authentication-with-windows-hello-for-business%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EImplementing%20strong%20user%20authentication%20with%20Windows%20Hello%20for%20Business%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EMicrosoft%20implemented%20Windows%20Hello%20for%20Business%2C%20a%20new%20credential%20in%20Windows%2010%2C%20to%20help%20increase%20security%20when%20accessing%20corporate%20resources.%20In%20Windows%2010%2C%20this%20feature%20offers%20a%20streamlined%20user%20sign-in%20experience%E2%80%94it%20replaces%20passwords%20with%20strong%20two-factor%20authentication%20by%20combining%20an%20enrolled%20device%20with%20a%20PIN%20or%20biometric%20user%20input%20for%20sign%20in.%20Windows%20Hello%20was%20easy%20to%20implement%20within%20our%20existing%20identity%20infrastructure%20and%20is%20compatible%20for%20use%20within%20our%20remote%20access%20solution.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20background%3A%20%23D2D2D2%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20style%3D%22margin%3A%200in%3B%20margin-bottom%3A%20.0001pt%3B%22%3E%3CA%20target%3D%22_blank%22%20name%3D%22Security%22%3E%3C%2FA%3E%3CSPAN%20style%3D%22font-size%3A%2016.0pt%3B%20font-family%3A%20'Segoe%20UI'%2Csans-serif%3B%20color%3A%20%23404040%3B%22%3ESecurity%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fbring-your-threat-intelligence-to-azure-sentinel%2Fba-p%2F1167546%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EBring%20your%20threat%20intelligence%20to%20Azure%20Sentinel%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EWithin%20a%20Security%20Information%20and%20Event%20Management%20(SIEM)%20solution%20like%20Azure%20Sentinel%2C%20the%20most%20utilized%20form%20of%20cyber%20threat%20intelligence%20(CTI)%20is%20threat%20indicators%2C%20often%20referred%20to%20as%20Indicators%20of%20Compromise%20or%20IoCs.%20Threat%20indicators%20are%20data%20that%20associates%20observations%20such%20as%20URLs%2C%20file%20hashes%2C%20or%20IP%20addresses%20with%20known%20threat%20activity%20such%20as%20phishing%2C%20botnets%2C%20or%20malware.%20This%20form%20of%20threat%20intelligence%20is%20often%20called%20tactical%20threat%20intelligence%20because%20it%20can%20be%20applied%20to%20security%20products%20and%20automation%20in%20large%20scale%20to%20protect%20and%20detect%20potential%20threats%20to%20an%20organization.%20In%20Azure%20Sentinel%2C%20you%20can%20use%20threat%20indicators%20to%20help%20detect%20malicious%20activity%20observed%20in%20your%20environment%20and%20provide%20context%20to%20security%20investigators%20to%20help%20inform%20response%20decisions.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fdevblogs.microsoft.com%2Fazuregov%2Fimplementing-zero-trust-with-microsoft-azure-identity-and-access-management-1-of-6%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EImplementing%20Zero%20Trust%20with%20Microsoft%20Azure%3A%20Identity%20and%20Access%20Management%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EThis%20is%20the%20first%20in%20a%20six-part%20blog%20series%20where%20we%20will%20demonstrate%20the%20application%20of%20Zero%20Trust%20concepts%20for%20securing%20federal%20information%20systems%20with%20Microsoft%20Azure.%20In%20this%20first%20blog%20of%20the%20series%20we%20will%20explore%20identity%20and%20access%20management%20with%20Azure%20Active%20Directory.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fdevblogs.microsoft.com%2Fazuregov%2Fprotecting-cloud-workloads-for-zero-trust-with-azure-security-center-2-of-6%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EProtecting%20Cloud%20Workloads%20for%20Zero%20Trust%20with%20Azure%20Security%20Center%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EThis%20is%20the%20second%20in%20a%20six-part%20blog%20series%20where%20we%20will%20demonstrate%20the%20application%20of%20Zero%20Trust%20concepts%20for%20securing%20federal%20information%20systems%20with%20Microsoft%20Azure.%20In%20this%20blog%20we%20will%20explore%20how%20to%20leverage%20Azure%20Security%20Center%20for%20hybrid%20security%20management%20and%20threat%20protection%20in%20Zero%20Trust%20Architectures.%20Additional%20blogs%20in%20the%20series%20will%20include%20leveraging%20policy%2C%20investigating%20insider%20attacks%20and%20monitoring%20supply%20chain%20risk%20management.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fdevblogs.microsoft.com%2Fazuregov%2Fmonitoring-cloud-security-for-zero-trust-with-azure-sentinel-3-of-6%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMonitoring%20Cloud%20Security%20for%20Zero%20Trust%20with%20Azure%20Sentinel%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EThis%20is%20the%20third%20in%20a%20six-part%20blog%20series%20where%20we%20will%20demonstrate%20the%20application%20of%20Zero%20Trust%20concepts%20for%20securing%20federal%20information%20systems%20with%20Microsoft%20Azure.%20In%20this%20third%20blog%20of%20the%20series%20we%20will%20explore%20how%20to%20leverage%20Azure%20Sentinel%20for%20security%20monitoring%20in%20Zero%20Trust%20models.%20Additional%20blogs%20in%20the%20series%20will%20include%20leveraging%20policy%2C%20investigating%20insider%20attacks%20and%20monitoring%20supply%20chain%20risk%20management.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fdevblogs.microsoft.com%2Fazuregov%2Fenforcing-policy-for-zero-trust-with-azure-policy-4-of-6%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EEnforcing%20Policy%20for%20Zero%20Trust%20with%20Azure%20Policy%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EThis%20is%20the%20fourth%20in%20a%20six-part%20blog%20series%20where%20we%20will%20demonstrate%20the%20application%20of%20Zero%20Trust%20concepts%20for%20securing%20federal%20information%20systems%20with%20Microsoft%20Azure.%20In%20this%20fourth%20blog%20of%20the%20series%20we%20will%20explore%20how%20to%20leverage%20Azure%20Policy%20for%20enforcing%20access%20control%20in%20Zero%20Trust%20models.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fenterprise-mobility-security%2Fblock-access-to-unsanctioned-apps-with-microsoft-defender-atp%2Fba-p%2F1121179%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EBlock%20Access%20to%20Unsanctioned%20Apps%20with%20Microsoft%20Defender%20ATP%20%26amp%3B%20Cloud%20App%20Security%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EIn%20a%20modern%20workplace%20where%20the%20average%20enterprise%20is%20using%20over%201%2C500%20different%20cloud%20apps%2C%20and%20more%20than%2080%20gigabytes%20of%20data%20is%20being%20uploaded%20monthly%20to%20risky%20apps%20from%20business%20endpoint%20devices%2C%20the%20ability%20of%20IT%20and%20compliance%20administrators%20to%20manage%20and%20monitor%20shadow%20IT%20becomes%20an%20(almost)%20impossible%20mission.%20It%20is%20not%20only%20about%20the%20ability%20to%20assess%20the%20potential%20risk%20that%20cloud%20apps%20pose%20to%20the%20company%2C%20but%20also%20about%20the%20tools%20IT%20has%20(or%20doesn%E2%80%99t%20have)%20to%20control%20and%20manage%20access%20to%20these%20apps.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fitshowcase%2Fmicrosofts-approach-to-zero-trust-networking-and-supporting-azure-technologies%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%E2%80%99s%20approach%20to%20Zero%20Trust%20Networking%20and%20supporting%20Azure%20technologies%3C%2FA%3E%20(Video%2C%20PDF)%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EDuring%20this%20webinar%2C%20experts%20from%20Microsoft's%20Core%20Services%20Engineering%20and%20Operations%20(CSEO)%20team%20discussed%20our%20approach%20to%20Zero%20Trust%20Networking%20and%20Network%20Segmentation.%26nbsp%3B%20They%20also%20dive%20into%20our%20strategy%20for%20moving%20to%20Zero%20Trust%20Networking%20within%20our%20corporate%20environment%2C%20and%20how%20we%E2%80%99re%20leveraging%20Azure%20features%20to%20create%20our%20next%20generation%20segmented%20networks.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fblog%2F2019%2F11%2F04%2Fnavigate-data-protection-and-risk-in-the-cloud-era%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EInsider%20Risk%20Management%20in%20Microsoft%20365%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EAt%20Ignite%20we%20announced%20a%20new%20insider%20risk%20management%20solution%20in%20Microsoft%20365%20to%20help%20identify%20and%20remediate%20threats%20stemming%20from%20within%20an%20organization.%20Now%20in%20private%20preview%2C%20this%20new%20solution%20leverages%20the%20Microsoft%20Graph%20along%20with%20third-party%20signals%2C%20like%20HR%20systems%2C%20to%20identify%20hidden%20patterns%20that%20traditional%20methods%20would%20likely%20miss.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-information-protection%2Fsecuring-sensitive-data-with-the-aip-unified-labeling-scanner%2Fba-p%2F1149352%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ESecuring%20Sensitive%20Data%20with%20the%20AIP%20Unified%20Labeling%20Scanner%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EThe%20AIP%20scanner%20allows%20you%20to%20scan%20your%20on-premises%20data%20repositories%20against%20the%20standard%20Office%20365%20sensitive%20information%20types%20and%20custom%20types%20you%20build%20with%20keywords%20or%20regular%20expressions.%20Once%20the%20data%20is%20discovered%2C%20the%20AIP%20scanner(s)%20can%20aggregate%20the%20findings%20and%20display%20them%20in%20Analytics%20reports%20so%20you%20can%20begin%20visualizing%20your%20data%20risk%20and%20see%20recommendations%20for%20setting%20up%20protection%20rules%20based%20on%20the%20content.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-privacy-and-compliance%2Fazure-atp-investigation-of-brute-force-and-account-enumeration%2Fba-p%2F1121006%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAzure%20ATP%20investigation%20of%20brute%20force%20and%20account%20enumeration%20attacks%20made%20over%20the%20NTLM%20protocol%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3ESecurity%20research%20shows%20most%20successful%20enumeration%20and%20brute%20force%20attacks%20use%20either%20NTLM%20or%20Kerberos%20authentication%20protocols%20for%20entry.%20In%20fact%2C%20they%E2%80%99re%20the%20most%20popular%20discovery-phase%20attacks%20Azure%20ATP%20observed%20in%20the%20past%2012%20months.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-atp%2Fweb-content-filtering-with-microsoft-defender-atp-now-in-public%2Fba-p%2F1132287%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EWeb%20content%20filtering%20with%20Microsoft%20Defender%20ATP%20now%20in%20public%20preview%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EWeb%20content%20filtering%20is%20a%20new%20feature%20in%20Microsoft%20Defender%20ATP%20that%20enables%20security%20administrators%20to%20track%20and%20regulate%20access%20to%20websites%20based%20on%20specified%20content%20categories.%20You%20can%20configure%20policies%20within%20Microsoft%20Defender%20Security%20Center%20to%20block%20or%20gather%20access%20data%20on%20certain%20categories%20across%20your%20machine%20groups.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-privacy-and-compliance%2Fwhat-s-new-in-the-public-preview-for-microsoft-secure-score%2Fba-p%2F1160867%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EWhat%E2%80%99s%20new%20in%20the%20public%20preview%20for%20Microsoft%20Secure%20Score%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3ENow%20that%20we%E2%80%99re%20well%20beyond%20the%20holiday%20season%20we%20thought%20now%20would%20be%20a%20the%20perfect%20time%20to%20share%20some%20Microsoft%20Secure%20Score%20related%20news.%20At%20Ignite%202019%20the%20Microsoft%20Secure%20Score%20team%20launched%20its%20new%20public%20preview%20which%20represents%20the%20most%20substantial%20release%20since%20its%20inception%20in%202017.%20The%20preview%20was%20based%20on%20the%20over%20two%20years%20of%20learning%20and%20a%20team%20that%20we%E2%80%99ve%20grown%20nearly%20two-fold%20so%20we%20can%20accelerate%20the%20innovation%20we%20deliver%20moving%20forward.%20The%20preview%20is%20well%20under%20way%20and%20includes%20many%20new%20refinements.%20This%20blog%20will%20detail%20all%20of%20the%20top%20preview%20improvements%20and%20changes%20since%20its%20release.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Foffice-365-email-activity-and-data-exfiltration-detection%2Fba-p%2F1169652%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EOffice%20365%20Email%20Activity%20and%20Data%20Exfiltration%20Detection%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EOffice%20365%20Message%20Trace%20contains%20lots%20of%20information%20that%20can%20be%20useful%20for%20security%20analyst.%20While%20it%20doesn%E2%80%99t%20include%20message%20content%20itself%2C%20it%20can%20provide%20interesting%20information%20about%20mail%20flow%20in%20the%20organization.%20It%20can%20be%20also%20used%20to%20detect%20malicious%20activity%20and%20generate%20interesting%20reports%20about%20mail-flow%20(e.g.%20information%20about%20bulk%20mail%2C%20spoofed%20domain%20emails%20or%20detecting%20abnormal%20rate%20of%20e-mail%20sending).%20Especially%20abnormal%20rate%20of%20e-mail%20sending%20can%20be%20used%20to%20detect%20malicious%20data%20exfiltration%20from%20within%20the%20organization.%20In%20this%20article%20we%20will%20describe%20how%20we%20can%20use%20Office%20365%20Message%20Trace%20and%20Azure%20Sentinel%20to%20detect%20these%20security%20scenarios.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F01%2F20%2Fhow-companies-prepare-heightened-threat-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EHow%20companies%20can%20prepare%20for%20a%20heightened%20threat%20environment%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EWith%20high%20levels%20of%20political%20unrest%20in%20various%20parts%20of%20the%20world%2C%20it%E2%80%99s%20no%20surprise%20we%E2%80%99re%20also%20in%20a%20period%20of%20increased%20cyber%20threats.%20In%20the%20past%2C%20a%20company%E2%80%99s%20name%2C%20political%20affiliations%2C%20or%20religious%20affiliations%20might%20push%20the%20risk%20needle%20higher.%20However%2C%20in%20the%20current%20environment%20any%20company%20could%20be%20a%20potential%20target%20for%20a%20cyberattack.%20Companies%20of%20all%20shapes%2C%20sizes%2C%20and%20varying%20security%20maturity%20are%20asking%20what%20they%20could%20and%20should%20be%20doing%20to%20ensure%20their%20safeguards%20are%20primed%20and%20ready.%20To%20help%20answer%20these%20questions%2C%20we%20created%20a%20list%20of%20actions%20companies%20can%20take%20and%20controls%20they%20can%20validate%20in%20light%20of%20the%20current%20level%20of%20threats%E2%80%94and%20during%20any%20period%20of%20heightened%20risk%E2%80%94through%20the%20Microsoft%20lens.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20background%3A%20%23D2D2D2%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20style%3D%22margin%3A%200in%3B%20margin-bottom%3A%20.0001pt%3B%22%3E%3CA%20target%3D%22_blank%22%20name%3D%22SupportLifecycle%22%3E%3C%2FA%3E%3CSPAN%20style%3D%22font-size%3A%2016.0pt%3B%20font-family%3A%20'Segoe%20UI'%2Csans-serif%3B%20color%3A%20%23404040%3B%22%3EUpdates%20and%20Support%20Lifecycle%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-security-center%2Fgain-visibility-for-cve-2020-0601-with-azure-security-center%2Fba-p%2F1112896%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EGain%20visibility%20for%20CVE-2020%E2%80%930601%20with%20Azure%20security%20center%20recommendation%20across%20your%20tenant%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EAzure%20Security%20Center%20periodically%20analyzing%20the%20security%20state%20of%20your%20Azure%20resources%20to%20identify%20potential%20security%20vulnerabilities.%20In%20this%20blog%20post%2C%20we%20will%20review%20how%20to%20use%20Azure%20security%20center%20recommendation%20that%20tracks%20your%20servers%20for%20a%20missing%20critical%20security%20patch%20and%20create%20a%20dashboard%20that%20will%20present%20and%20help%20us%20to%20track%20how%20many%20servers%20are%20potentially%20impacted%20by%20CVE-2020%E2%80%930601.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fcloudblogs.microsoft.com%2Fwindowsserver%2F2020%2F02%2F04%2Ffirst-update-rollup-for-system-center-2019-released%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EFirst%20update%20rollup%20for%20System%20Center%202019%20released%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EOn%20February%204%20we%20announced%20availability%20of%20the%20first%20update%20rollup%20release%20(UR1)%20to%20the%20System%20Center%202019%20suite.%20Customers%20can%20download%20UR1%20for%20System%20Center%202019%20from%20Microsoft%20Update%20as%20well%20as%20other%20channels.%20This%20update%20covers%20System%20Center%20Operations%20Manager%2C%20Virtual%20Machine%20Manager%2C%20Data%20Protection%20Manager%2C%20Orchestrator%2C%20and%20Service%20Manager.%20In%20this%20update%2C%20we%20are%20releasing%20new%20features%20in%20several%20of%20the%20products%20within%20the%20System%20Center%20suite.%20If%20you%E2%80%99d%20like%20to%20learn%20more%20about%20what%20those%20new%20features%20are%2C%20keep%20reading!%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fsupport.microsoft.com%2Fen-hk%2Fhelp%2F4541558%2Fwindows-10-version-1809-end-of-servicing%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EWindows%2010%2C%20version%201809%20end%20of%20servicing%20on%20May%2012%2C%202020%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EWindows%2010%2C%20version%201809%20will%20reach%20the%20end%20of%20servicing%20on%20May%2012%2C%202020.%20This%20applies%20to%20all%20editions%20of%20Windows%2010%20released%20in%20November%20of%202018.%20These%20editions%20will%20no%20longer%20receive%20security%20updates%20after%20May%2012%2C%202020.%20Customers%20who%20contact%20Microsoft%20Support%20after%20this%20date%20will%20be%20directed%20to%20update%20their%20device%20to%20the%20latest%20version%20of%20Windows%2010%20to%20remain%20supported.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fcore-infrastructure-and-security%2Fpreparing-to-deploy-extended-security-updates%2Fba-p%2F1139851%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EPreparing%20to%20Deploy%20Extended%20Security%20Updates%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3EWith%20the%20end%20of%20support%20for%20these%20Operating%20Systems%20on%20January%2014%2C%202020%2C%20many%20of%20our%20customers%20are%20asking%20for%20help%20on%20how%20to%20get%20ready%20to%20deploy%20Extended%20Security%20Updates%20(ESU).%20To%20that%20end%2C%20I%20would%20like%20to%20share%20the%20work%20of%20Curtis%20Ricard%20a%20Senior%20Premier%20Field%20Engineer%20on%20how%20to%20use%20Microsoft%20Endpoint%20Configuration%20Manager%20(ConfigMgr)%20to%20ensure%20that%20your%20clients%20are%20ready%20to%20receive%20the%20ESU%20updates.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%20class%3D%22MsoNormal%22%3E%3CA%20href%3D%22https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4470235%2Fproducts-reaching-end-of-support-for-2020%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EProducts%20reaching%20End%20of%20Support%20for%202020%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%2035.75pt%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20background%3A%20%23D2D2D2%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%2035.75pt%3B%22%3E%3CP%20style%3D%22margin%3A%200in%3B%20margin-bottom%3A%20.0001pt%3B%22%3E%3CA%20target%3D%22_blank%22%20name%3D%22Premier%22%3E%3C%2FA%3E%3CSPAN%20style%3D%22font-size%3A%2016.0pt%3B%20font-family%3A%20'Segoe%20UI'%2Csans-serif%3B%20color%3A%20%23404040%3B%22%3EMicrosoft%20Premier%20Support%20News%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%20style%3D%22height%3A%20.1in%3B%22%3E%0A%3CTD%20width%3D%22852%22%20style%3D%22width%3A%20639.0pt%3B%20padding%3A%207.9pt%20.25in%207.9pt%20.15in%3B%20height%3A%20.1in%3B%22%3E%3CP%3ECheck%20out%20Microsoft%20Services%20public%20blog%20for%20new%20Proactive%20Services%20as%20well%20as%20new%20features%20and%20capabilities%20of%20the%20Services%20Hub%2C%20On-demand%20Assessments%2C%20and%20On-demand%20Learning%20platforms.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1185202%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20there!%20You%20are%20reading%20the%20next%20issue%20of%20the%20Infrastructure%20%2B%20Security%3A%20Noteworthy%20News%20series!%20%3CBR%20%2F%3E%3CBR%20%2F%3EAs%20a%20reminder%2C%20the%20Noteworthy%20News%20series%20covers%20various%20areas%2C%20to%20include%20interesting%20news%2C%20announcements%2C%20links%2C%20tips%20and%20tricks%20from%20Windows%2C%20Azure%2C%20and%20Security%20worlds%20on%20a%20monthly%20basis.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1185202%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EJenniferRoss%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EStanislavBelov%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Hi there! You are reading the next issue of the Infrastructure + Security: Noteworthy News series!

As a reminder, the Noteworthy News series covers various areas, to include interesting news, announcements, links, tips and tricks from Windows, Azure, and Security worlds on a monthly basis.

 

Microsoft Azure

What's new in Azure Active Directory?

Azure AD receives improvements on an ongoing basis. To stay up to date with the most recent developments, this article provides you with information about the latest releases, known issues, bug fixes, deprecated functionality, plans for changes, etc. This page is updated monthly, so revisit it regularly.

5 identity priorities for 2020 — preparing for what’s next

As we reflect over the past decade, it’s remarkable how the digital transformation has reshaped the way people work and how companies do business. Let’s take one example — your users. At one time, “users” meant employees. Users now include partners, customers, even software bots and devices. What started as identity for the workforce is now identity for everyone and everything. The corporate network perimeter has disappeared, making identity the control plane for security that now provides effective access control across all users and digital resources.

Azure Private Link is now generally available

Azure Private Link is a secure and scalable way for you to consume services (such as Azure PaaS,  Partner Service, BYOS) on the Azure platform privately from within your virtual network. Private Link also enables you to create and render your own services on Azure. It enables a true private connectivity experience between services and virtual networks. The technology is based on a provider-and-consumer model where the provider and the consumer are both hosted in Azure. A connection is established using a consent-based call flow and once established, all data that flows between the service provider and service consumer is isolated from the internet and stays on the Microsoft network.

Azure Key Vault – Private endpoints now available in preview

Establish a private connection between Azure Key Vault and other Azure services by using Azure Private Link, now available in preview for all public regions. Azure Private Link enables you to access Azure services (for example, Azure Key Vault, Azure Storage and Azure Cosmos DB) and Azure-hosted customer/partner services over a private endpoint in your virtual network.

5 bits of advice for managing your Cloud spend

Cost is something that everyone is aware of, whether it be managing what you spend on IT gadgets or games, to household budgets and at work it’s no different we are all aware that our employers don’t have unlimited budget (even Microsoft) to spend and have to be mindful of it.  In the past we would spend a large chunk of money on a large chunk of metal (also known as physical servers) and that would be the budget for the quarter or year and we’d not really think about it until that large chunk of metal ran out of some kind of resource. In this article I’ll take you through the top 5 things I recommend thinking about when looking at cloud cost management and utilizing Azure Cost Management.  

Windows Server

Turning to a new chapter of Windows Server innovation

January 14, 2020 marked the end of support for Windows Server 2008 and Windows Server 2008 R2. Customers loved these releases, which introduced advancements such as the shift from 32-bit to 64-bit computing and server virtualization. While support for these popular releases ended, we are excited about new innovations in cloud computing, hybrid cloud, and data that can help server workloads get ready for the new era.

Windows Client

Deploying Windows 10 and managing updates at Microsoft (Video, PDF)

Windows 10 Enterprise unlocks a productive, creative, and collaborative experience with intelligent security capabilities that work systematically to help protect your enterprise. Core Services Engineering and Operations has embraced Windows as a service, as its agile approach allows us to streamline application-compatibility testing, pilot deployments with early adopters, track progress through visual workflows, and make data-driven decisions using Desktop Analytics. In this webinar, you’ll learn how we leveraged Windows Update for Business by using Microsoft Intune and Microsoft System Center Configuration Manager to deploy and keep our devices up to date.

Implementing strong user authentication with Windows Hello for Business

Microsoft implemented Windows Hello for Business, a new credential in Windows 10, to help increase security when accessing corporate resources. In Windows 10, this feature offers a streamlined user sign-in experience—it replaces passwords with strong two-factor authentication by combining an enrolled device with a PIN or biometric user input for sign in. Windows Hello was easy to implement within our existing identity infrastructure and is compatible for use within our remote access solution.

Security

Bring your threat intelligence to Azure Sentinel

Within a Security Information and Event Management (SIEM) solution like Azure Sentinel, the most utilized form of cyber threat intelligence (CTI) is threat indicators, often referred to as Indicators of Compromise or IoCs. Threat indicators are data that associates observations such as URLs, file hashes, or IP addresses with known threat activity such as phishing, botnets, or malware. This form of threat intelligence is often called tactical threat intelligence because it can be applied to security products and automation in large scale to protect and detect potential threats to an organization. In Azure Sentinel, you can use threat indicators to help detect malicious activity observed in your environment and provide context to security investigators to help inform response decisions.

Implementing Zero Trust with Microsoft Azure: Identity and Access Management

This is the first in a six-part blog series where we will demonstrate the application of Zero Trust concepts for securing federal information systems with Microsoft Azure. In this first blog of the series we will explore identity and access management with Azure Active Directory.

Protecting Cloud Workloads for Zero Trust with Azure Security Center

This is the second in a six-part blog series where we will demonstrate the application of Zero Trust concepts for securing federal information systems with Microsoft Azure. In this blog we will explore how to leverage Azure Security Center for hybrid security management and threat protection in Zero Trust Architectures. Additional blogs in the series will include leveraging policy, investigating insider attacks and monitoring supply chain risk management.

Monitoring Cloud Security for Zero Trust with Azure Sentinel

This is the third in a six-part blog series where we will demonstrate the application of Zero Trust concepts for securing federal information systems with Microsoft Azure. In this third blog of the series we will explore how to leverage Azure Sentinel for security monitoring in Zero Trust models. Additional blogs in the series will include leveraging policy, investigating insider attacks and monitoring supply chain risk management.

Enforcing Policy for Zero Trust with Azure Policy

This is the fourth in a six-part blog series where we will demonstrate the application of Zero Trust concepts for securing federal information systems with Microsoft Azure. In this fourth blog of the series we will explore how to leverage Azure Policy for enforcing access control in Zero Trust models.

Block Access to Unsanctioned Apps with Microsoft Defender ATP & Cloud App Security

In a modern workplace where the average enterprise is using over 1,500 different cloud apps, and more than 80 gigabytes of data is being uploaded monthly to risky apps from business endpoint devices, the ability of IT and compliance administrators to manage and monitor shadow IT becomes an (almost) impossible mission. It is not only about the ability to assess the potential risk that cloud apps pose to the company, but also about the tools IT has (or doesn’t have) to control and manage access to these apps.

Microsoft’s approach to Zero Trust Networking and supporting Azure technologies (Video, PDF)

During this webinar, experts from Microsoft's Core Services Engineering and Operations (CSEO) team discussed our approach to Zero Trust Networking and Network Segmentation.  They also dive into our strategy for moving to Zero Trust Networking within our corporate environment, and how we’re leveraging Azure features to create our next generation segmented networks.

Insider Risk Management in Microsoft 365

At Ignite we announced a new insider risk management solution in Microsoft 365 to help identify and remediate threats stemming from within an organization. Now in private preview, this new solution leverages the Microsoft Graph along with third-party signals, like HR systems, to identify hidden patterns that traditional methods would likely miss.

Securing Sensitive Data with the AIP Unified Labeling Scanner

The AIP scanner allows you to scan your on-premises data repositories against the standard Office 365 sensitive information types and custom types you build with keywords or regular expressions. Once the data is discovered, the AIP scanner(s) can aggregate the findings and display them in Analytics reports so you can begin visualizing your data risk and see recommendations for setting up protection rules based on the content.

Azure ATP investigation of brute force and account enumeration attacks made over the NTLM protocol

Security research shows most successful enumeration and brute force attacks use either NTLM or Kerberos authentication protocols for entry. In fact, they’re the most popular discovery-phase attacks Azure ATP observed in the past 12 months.

Web content filtering with Microsoft Defender ATP now in public preview

Web content filtering is a new feature in Microsoft Defender ATP that enables security administrators to track and regulate access to websites based on specified content categories. You can configure policies within Microsoft Defender Security Center to block or gather access data on certain categories across your machine groups.

What’s new in the public preview for Microsoft Secure Score

Now that we’re well beyond the holiday season we thought now would be a the perfect time to share some Microsoft Secure Score related news. At Ignite 2019 the Microsoft Secure Score team launched its new public preview which represents the most substantial release since its inception in 2017. The preview was based on the over two years of learning and a team that we’ve grown nearly two-fold so we can accelerate the innovation we deliver moving forward. The preview is well under way and includes many new refinements. This blog will detail all of the top preview improvements and changes since its release.

Office 365 Email Activity and Data Exfiltration Detection

Office 365 Message Trace contains lots of information that can be useful for security analyst. While it doesn’t include message content itself, it can provide interesting information about mail flow in the organization. It can be also used to detect malicious activity and generate interesting reports about mail-flow (e.g. information about bulk mail, spoofed domain emails or detecting abnormal rate of e-mail sending). Especially abnormal rate of e-mail sending can be used to detect malicious data exfiltration from within the organization. In this article we will describe how we can use Office 365 Message Trace and Azure Sentinel to detect these security scenarios.

How companies can prepare for a heightened threat environment

With high levels of political unrest in various parts of the world, it’s no surprise we’re also in a period of increased cyber threats. In the past, a company’s name, political affiliations, or religious affiliations might push the risk needle higher. However, in the current environment any company could be a potential target for a cyberattack. Companies of all shapes, sizes, and varying security maturity are asking what they could and should be doing to ensure their safeguards are primed and ready. To help answer these questions, we created a list of actions companies can take and controls they can validate in light of the current level of threats—and during any period of heightened risk—through the Microsoft lens.

Updates and Support Lifecycle

Gain visibility for CVE-2020–0601 with Azure security center recommendation across your tenant

Azure Security Center periodically analyzing the security state of your Azure resources to identify potential security vulnerabilities. In this blog post, we will review how to use Azure security center recommendation that tracks your servers for a missing critical security patch and create a dashboard that will present and help us to track how many servers are potentially impacted by CVE-2020–0601.

First update rollup for System Center 2019 released

On February 4 we announced availability of the first update rollup release (UR1) to the System Center 2019 suite. Customers can download UR1 for System Center 2019 from Microsoft Update as well as other channels. This update covers System Center Operations Manager, Virtual Machine Manager, Data Protection Manager, Orchestrator, and Service Manager. In this update, we are releasing new features in several of the products within the System Center suite. If you’d like to learn more about what those new features are, keep reading!

Windows 10, version 1809 end of servicing on May 12, 2020

Windows 10, version 1809 will reach the end of servicing on May 12, 2020. This applies to all editions of Windows 10 released in November of 2018. These editions will no longer receive security updates after May 12, 2020. Customers who contact Microsoft Support after this date will be directed to update their device to the latest version of Windows 10 to remain supported.

Preparing to Deploy Extended Security Updates

With the end of support for these Operating Systems on January 14, 2020, many of our customers are asking for help on how to get ready to deploy Extended Security Updates (ESU). To that end, I would like to share the work of Curtis Ricard a Senior Premier Field Engineer on how to use Microsoft Endpoint Configuration Manager (ConfigMgr) to ensure that your clients are ready to receive the ESU updates.

Products reaching End of Support for 2020

Microsoft Premier Support News

Check out Microsoft Services public blog for new Proactive Services as well as new features and capabilities of the Services Hub, On-demand Assessments, and On-demand Learning platforms.

2 Comments

Thanks for Sharing with the Community :cool:

Microsoft

As always, great material Stan!