Over the past 12-18 months, I have been providing a newsletter to customers that consolidates product updates, new offerings, how-to's, and general announcements for Microsoft Security Products and Services. Based upon feedback, the newsletter has been a valuable resource to stay up-to-date on a monthly basis and thus have decided to publish it here for more folks to leverage this resource. Please leave comment below if you find this newsletter valuable so that I can determine if I should publish this again in the future.
Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk
Full Operational Shutdown—another cybercrime case from the Microsoft Detection and Response Team
Microsoft shares new threat intelligence, security guidance during global crisis
Protecting your organization against password spray attacks
MITRE ATT&CK evaluation results
Data governance matters now more than ever
Security guidance for remote desktop adoption
Afternoon Cyber Tea: Building operational resilience in a digital world
Enable remote work while keeping cloud deployments secure
Mobile security—the 60 percent problem
Protecting your data and maintaining compliance in a remote work environment
Turning collaboration and customer engagement up with a strong identity approach
Hunting Threats on Linux with Azure Sentinel
Monitoring Zoom with Azure Sentinel
Accelerating Cybersecurity Maturity Model Certification (CMMC) compliance on Azure
Azure Sentinel Sigma & SOC Prime Integration (Part 2)
Azure Sentinel Sigma & SOC Prime Integration (Part 3)
Azure Security Center enhancements
Creating digital tripwires with custom threat intelligence feeds for Azure Sentinel
Advanced integrations with export of Security Center recommendations and alerts
Azure Sentinel To-Go (Part1): A Lab w/ Prerecorded Data a Custom Logs Pipe via ARM Templates
Gain Compliance, Posture, and Protection Insights with this Azure Security Center Related Workbook
Enriching Azure Sentinel with Azure AD information
Controlling access to Azure Sentinel Data: Resource RBAC
Become an Azure Sentinel Ninja: The complete level 400 training
Azure Sentinel Data Enrichment - Walk-through with Scripting, KQL and Playbooks
Azure Security Center – automating Change Requests in ServiceNow using Workflow automation.
Implementing Lookups in Azure Sentinel
Enabling security research & hunting with open source IoT attack data
What’s New: Improved Incident Closing Experience is now Available!
Help for Security Operations Centers facing new challenges
NERC CIP Compliance in Azure vs. Azure Government cloud
Zero Trust Assessment tool now live!
Microsoft Teams Security Webcast
A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Part 5 - Data
Our commitment to privacy and security in Microsoft Teams
Atos adopts Microsoft 365 to enable secure remote work for all employees
How to secure your remote workers with Office Cloud Policy Service
Security baseline for Microsoft Edge v81
Securing Authenticated SMTP in Exchange Online
Basic Authentication and Exchange Online – April 2020 Update
Zero Trust Deployment Guide for Microsoft Azure Active Directory
Azure AD: Moving towards real time policy and security enforcement
New identity features help empower essential Firstline Workers
Developing applications for secure remote work with Azure AD
Frequent questions about using Conditional Access to secure remote access
Securely collaborate with remote partners using Azure AD B2B collaboration
Combined MFA and password reset registration is now generally available
Azure AD: Secure remote access to on-premises apps
Azure AD pass-through and password hash authentication support for SQL DB, DW and Managed Instance
Announcing public preview of auto classification with sensitivity labels in Microsoft 365 services
Protect your customer accounts with passwordless mobile authentication
App Protection Policies and Shared/Delegate Mailboxes with Outlook mobile
Secure your remote workforce with Microsoft Defender ATP
Hunt more broadly and effectively with new Microsoft Threat Protection features on preview
Demystifying attack surface reduction rules - Part 1
Threat & Vulnerability Management APIs are now generally available
Azure ATP now detects SMBGhost
Deploy Microsoft Defender ATP for Mac in just a few clicks
Support tip: How to test Microsoft Defender ATP (preview) based device compliance on Android
Announcing general availability of Records Management
Implementing Microsoft Exact Data Match (EDM) Part 1
Implementing Microsoft Exact Data Match (EDM) Part 2
Regards,
Jeremy Windmiller | Enterprise Security Architect, CISSP, CEH, ITIL | Microsoft – Healthcare
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.