%3CLINGO-SUB%20id%3D%22lingo-sub-1357799%22%20slang%3D%22en-US%22%3EMicrosoft%20Security%20Matters%20Newsletter%20-%20Apr%202020%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1357799%22%20slang%3D%22en-US%22%3E%3CP%3EOver%20the%20past%2012-18%20months%2C%20I%20have%20been%20providing%20a%20newsletter%20to%20customers%20that%20consolidates%20product%20updates%2C%20new%20offerings%2C%20how-to's%2C%20and%20general%20announcements%20for%20Microsoft%20Security%20Products%20and%20Services.%26nbsp%3B%20Based%20upon%20feedback%2C%20the%20newsletter%20has%20been%20a%20valuable%20resource%20to%20stay%20up-to-date%20on%20a%20monthly%20basis%20and%20thus%20have%20decided%20to%20publish%20it%20here%20for%20more%20folks%20to%20leverage%20this%20resource.%26nbsp%3B%20Please%20leave%20comment%20below%20if%20you%20find%20this%20newsletter%20valuable%20so%20that%20I%20can%20determine%20if%20I%20should%20publish%20this%20again%20in%20the%20future.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId--653309479%22%20id%3D%22toc-hId--653309479%22%20id%3D%22toc-hId--653309479%22%3E%3CSTRONG%3EGeneral%20News%3C%2FSTRONG%3E%3C%2FH4%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F04%2F28%2Fransomware-groups-continue-to-target-healthcare-critical-services-heres-how-to-reduce-risk%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ERansomware%20groups%20continue%20to%20target%20healthcare%2C%20critical%20services%3B%20here%E2%80%99s%20how%20to%20reduce%20risk%3C%2FA%3E%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F04%2F02%2Ffull-operational-shutdown-another-cybercrime-case-microsoft-detection-and-response-team%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EFull%20Operational%20Shutdown%E2%80%94another%20cybercrime%20case%20from%20the%20Microsoft%20Detection%20and%20Response%20Team%3C%2FA%3E%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F04%2F08%2Fmicrosoft-shares-new-threat-intelligence-security-guidance-during-global-crisis%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20shares%20new%20threat%20intelligence%2C%20security%20guidance%20during%20global%20crisis%3C%2FA%3E%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F04%2F22%2Fdefending-power-grid-against-supply-chain-attacks-3-risk-management-strategies-utilities-industry%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EDefending%20the%20power%20grid%20against%20supply%20chain%20attacks%3A%20Part%203%20%E2%80%93%20Risk%20management%20strategies%20for%20the%20utilities%20industry%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F04%2F23%2Fprotecting-organization-password-spray-attacks%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EProtecting%20your%20organization%20against%20password%20spray%20attacks%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-atp%2Fmitre-att-amp-ck-evaluation-results%2Fba-p%2F1334208%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EMITRE%20ATT%26amp%3BCK%20evaluation%20results%3C%2FA%3E%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F04%2F30%2Fdata-governance-matters-now-more-than-ever%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EData%20governance%20matters%20now%20more%20than%20ever%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F04%2F16%2Fsecurity-guidance-remote-desktop-adoption%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESecurity%20guidance%20for%20remote%20desktop%20adoption%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F04%2F13%2Fafternoon-cyber-tea-building-operational-resilience-digital-world%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAfternoon%20Cyber%20Tea%3A%20Building%20operational%20resilience%20in%20a%20digital%20world%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F04%2F09%2Fenable-remote-work-while-keeping-cloud-deployments-secure%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EEnable%20remote%20work%20while%20keeping%20cloud%20deployments%20secure%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F04%2F07%2Fmobile-security-60-percent-problem%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMobile%20security%E2%80%94the%2060%20percent%20problem%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F04%2F06%2Fprotecting-your-data-and-maintaining-compliance-in-a-remote-work-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EProtecting%20your%20data%20and%20maintaining%20compliance%20in%20a%20remote%20work%20environment%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F04%2F06%2Fturning-collaboration-customer-engagement-up-strong-identity-approach%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ETurning%20collaboration%20and%20customer%20engagement%20up%20with%20a%20strong%20identity%20approach%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId-1834203354%22%20id%3D%22toc-hId-1834203354%22%20id%3D%22toc-hId-1834203354%22%3E%3CSTRONG%3EAzure%20Security%20%26amp%3B%20Compliance%20News%3C%2FSTRONG%3E%3C%2FH4%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fhunting-threats-on-linux-with-azure-sentinel%2Fba-p%2F1344431%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EHunting%20Threats%20on%20Linux%20with%20Azure%20Sentinel%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fmonitoring-zoom-with-azure-sentinel%2Fba-p%2F1341516%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EMonitoring%20Zoom%20with%20Azure%20Sentinel%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fblog%2Faccelerating-cybersecurity-maturity-model-certification-cmmc-compliance-on-azure%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAccelerating%20Cybersecurity%20Maturity%20Model%20Certification%20(CMMC)%20compliance%20on%20Azure%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fazure-sentinel-sigma-amp-soc-prime-integration-part-2%2Fba-p%2F1276337%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAzure%20Sentinel%20Sigma%20%26amp%3B%20SOC%20Prime%20Integration%20(Part%202)%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fazure-sentinel-sigma-amp-soc-prime-integration-part-3%2Fba-p%2F1333674%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAzure%20Sentinel%20Sigma%20%26amp%3B%20SOC%20Prime%20Integration%20(Part%203)%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fblog%2Fazure-security-center-enhancements%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Security%20Center%20enhancements%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fcreating-digital-tripwires-with-custom-threat-intelligence-feeds%2Fba-p%2F1320981%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ECreating%20digital%20tripwires%20with%20custom%20threat%20intelligence%20feeds%20for%20Azure%20Sentinel%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fupdates%2Fadvanced-integrations-with-export-of-security-center-recommendations-and-alerts%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAdvanced%20integrations%20with%20export%20of%20Security%20Center%20recommendations%20and%20alerts%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fazure-sentinel-to-go-part1-a-lab-w-prerecorded-data-amp-a-custom%2Fba-p%2F1260191%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAzure%20Sentinel%20To-Go%20(Part1)%3A%20A%20Lab%20w%2F%20Prerecorded%20Data%20a%20Custom%20Logs%20Pipe%20via%20ARM%20Templates%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fgain-compliance-posture-and-protection-insights-with-this-azure%2Fba-p%2F1290454%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EGain%20Compliance%2C%20Posture%2C%20and%20Protection%20Insights%20with%20this%20Azure%20Security%20Center%20Related%20Workbook%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fenriching-azure-sentinel-with-azure-ad-information%2Fba-p%2F1288805%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EEnriching%20Azure%20Sentinel%20with%20Azure%20AD%20information%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fcontrolling-access-to-azure-sentinel-data-resource-rbac%2Fba-p%2F1301463%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EControlling%20access%20to%20Azure%20Sentinel%20Data%3A%20Resource%20RBAC%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fbecome-an-azure-sentinel-ninja-the-complete-level-400-training%2Fba-p%2F1246310%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EBecome%20an%20Azure%20Sentinel%20Ninja%3A%20The%20complete%20level%20400%20training%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fazure-sentinel-data-enrichment-walk-through-with-scripting-kql%2Fba-p%2F1288805%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAzure%20Sentinel%20Data%20Enrichment%20-%20Walk-through%20with%20Scripting%2C%20KQL%20and%20Playbooks%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-security-center%2Fazure-security-center-automating-change-requests-in-servicenow%2Fba-p%2F1285670%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAzure%20Security%20Center%20%E2%80%93%20automating%20Change%20Requests%20in%20ServiceNow%20using%20Workflow%20automation.%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fimplementing-lookups-in-azure-sentinel%2Fba-p%2F1091306%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EImplementing%20Lookups%20in%20Azure%20Sentinel%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fenabling-security-research-amp-hunting-with-open-source-iot%2Fba-p%2F1279037%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EEnabling%20security%20research%20%26amp%3B%20hunting%20with%20open%20source%20IoT%20attack%20data%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fwhat-s-new-improved-incident-closing-experience-is-now-available%2Fba-p%2F1278807%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EWhat%E2%80%99s%20New%3A%20Improved%20Incident%20Closing%20Experience%20is%20now%20Available!%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fhelp-for-security-operations-centers-facing-new-challenges%2Fba-p%2F1278903%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EHelp%20for%20Security%20Operations%20Centers%20facing%20new%20challenges%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F04%2F20%2Fnerc-cip-compliance-azure-vs-azure-government-cloud%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ENERC%20CIP%20Compliance%20in%20Azure%20vs.%20Azure%20Government%20cloud%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId-26748891%22%20id%3D%22toc-hId-26748891%22%20id%3D%22toc-hId-26748891%22%3E%3CSTRONG%3EMicrosoft%20365%20Security%20(All%20Up%20News)%3C%2FSTRONG%3E%3C%2FH4%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fzero-trust-assessment-tool-now-live%2Fba-p%2F1280195%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EZero%20Trust%20Assessment%20tool%20now%20live!%3C%2FA%3E%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fhealthcare-and-life-sciences%2Fmicrosoft-teams-security-webcast%2Fba-p%2F1348224%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EMicrosoft%20Teams%20Security%20Webcast%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fpremier-field-engineering%2Fa-journey-to-holistic-cloud-protection-with-the-microsoft-365%2Fba-p%2F1341515%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EA%20Journey%20to%20Holistic%20Cloud%20Protection%20with%20the%20Microsoft%20365%20Security%20Stack%20Part%205%20-%20Data%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fblog%2F2020%2F04%2F06%2Fmicrosofts-commitment-privacy-security-microsoft-teams%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOur%20commitment%20to%20privacy%20and%20security%20in%20Microsoft%20Teams%3C%2FA%3E%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-endpoint-manager-blog%2Fatos-adopts-microsoft-365-to-enable-secure-remote-work-for-all%2Fba-p%2F1341915%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAtos%20adopts%20Microsoft%20365%20to%20enable%20secure%20remote%20work%20for%20all%20employees%3C%2FA%3E%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Foffice-365-blog%2Fhow-to-secure-your-remote-workers-with-office-cloud-policy%2Fba-p%2F1308579%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EHow%20to%20secure%20your%20remote%20workers%20with%20Office%20Cloud%20Policy%20Service%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-baselines%2Fsecurity-baseline-for-microsoft-edge-v81%2Fba-p%2F1303621%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ESecurity%20baseline%20for%20Microsoft%20Edge%20v81%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fexchange-team-blog%2Fsecuring-authenticated-smtp-in-exchange-online%2Fba-p%2F1293154%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ESecuring%20Authenticated%20SMTP%20in%20Exchange%20Online%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fexchange-team-blog%2Fbasic-authentication-and-exchange-online-april-2020-update%2Fba-p%2F1275508%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EBasic%20Authentication%20and%20Exchange%20Online%20%E2%80%93%20April%202020%20Update%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId--1780705572%22%20id%3D%22toc-hId--1780705572%22%20id%3D%22toc-hId--1780705572%22%3E%3CSTRONG%3EM365%20Identity%20%26amp%3B%20Data%20Protection%20(Azure%20AD%2C%20Intune%2C%20AIP%2C%20MCAS)%20%3C%2FSTRONG%3E%3C%2FH4%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F04%2F30%2Fzero-trust-deployment-guide-azure-active-directory%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EZero%20Trust%20Deployment%20Guide%20for%20Microsoft%20Azure%20Active%20Directory%3C%2FA%3E%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fmoving-towards-real-time-policy-and-security-enforcement%2Fba-p%2F1276933%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAzure%20AD%3A%20Moving%20towards%20real%20time%20policy%20and%20security%20enforcement%3C%2FA%3E%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fnew-identity-features-help-empower-essential-firstline-workers%2Fba-p%2F1257356%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ENew%20identity%20features%20help%20empower%20essential%20Firstline%20Workers%3C%2FA%3E%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fdeveloping-applications-for-secure-remote-work-with-azure-ad%2Fba-p%2F1257336%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EDeveloping%20applications%20for%20secure%20remote%20work%20with%20Azure%20AD%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Ffrequent-questions-about-using-conditional-access-to-secure%2Fba-p%2F1276932%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EFrequent%20questions%20about%20using%20Conditional%20Access%20to%20secure%20remote%20access%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fsecurely-collaborate-with-remote-partners-using-azure-ad-b2b%2Fba-p%2F1257337%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ESecurely%20collaborate%20with%20remote%20partners%20using%20Azure%20AD%20B2B%20collaboration%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fcombined-mfa-and-password-reset-registration-is-now-generally%2Fba-p%2F1257355%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ECombined%20MFA%20and%20password%20reset%20registration%20is%20now%20generally%20available%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fsecure-remote-access-to-on-premises-apps%2Fba-p%2F1257335%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAzure%20AD%3A%26nbsp%3B%20Secure%20remote%20access%20to%20on-premises%20apps%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sql-database%2Fazure-ad-pass-through-and-password-hash-authentication-support%2Fba-p%2F1269735%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAzure%20AD%20pass-through%20and%20password%20hash%20authentication%20support%20for%20SQL%20DB%2C%20DW%20and%20Managed%20Instance%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-privacy-and-compliance%2Fannouncing-public-preview-of-auto-classification-with%2Fba-p%2F1279961%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAnnouncing%20public%20preview%20of%20auto%20classification%20with%20sensitivity%20labels%20in%20Microsoft%20365%20services%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fprotect-your-customer-accounts-with-passwordless-mobile%2Fba-p%2F1257339%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EProtect%20your%20customer%20accounts%20with%20passwordless%20mobile%20authentication%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fintune-customer-success%2Fapp-protection-policies-and-shared-delegate-mailboxes-with%2Fba-p%2F1281231%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EApp%20Protection%20Policies%20and%20Shared%2FDelegate%20Mailboxes%20with%20Outlook%20mobile%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId-706807261%22%20id%3D%22toc-hId-706807261%22%20id%3D%22toc-hId-706807261%22%3E%3CSTRONG%3EM365%20Threat%20Protection%20(Office%20ATP%2C%20Windows%20Defender%20ATP%2C%20Azure%20ATP%2FATA)%3C%2FSTRONG%3E%3C%2FH4%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F04%2F21%2Fmitre-attack-evaluation-prove-microsoft-threat-protection-against-threats%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMITRE%20ATT%26amp%3BCK%20APT%2029%20evaluation%20proves%20Microsoft%20Threat%20Protection%20provides%20deeper%20end%20to%20end%20view%20of%20advanced%20threats%3C%2FA%3E%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-atp%2Fsecure-your-remote-workforce-with-microsoft-defender-atp%2Fba-p%2F1271806%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ESecure%20your%20remote%20workforce%20with%20Microsoft%20Defender%20ATP%3C%2FA%3E%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-privacy-and-compliance%2Fhunt-more-broadly-and-effectively-with-new-microsoft-threat%2Fba-p%2F1286004%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EHunt%20more%20broadly%20and%20effectively%20with%20new%20Microsoft%20Threat%20Protection%20features%20on%20preview%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-atp%2Fdemystifying-attack-surface-reduction-rules-part-1%2Fba-p%2F1306420%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EDemystifying%20attack%20surface%20reduction%20rules%20-%20Part%201%3C%2FA%3E%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-atp%2Fthreat-amp-vulnerability-management-apis-are-now-generally%2Fba-p%2F1304615%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EThreat%20%26amp%3B%20Vulnerability%20Management%20APIs%20are%20now%20generally%20available%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-privacy-and-compliance%2Fazure-atp-now-detects-smbghost%2Fba-p%2F1300658%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAzure%20ATP%20now%20detects%20SMBGhost%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-atp%2Fdeploy-microsoft-defender-atp-for-mac-in-just-a-few-clicks%2Fba-p%2F1341619%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EDeploy%20Microsoft%20Defender%20ATP%20for%20Mac%20in%20just%20a%20few%20clicks%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fintune-customer-success%2Fsupport-tip-how-to-test-microsoft-defender-atp-preview-based%2Fba-p%2F1334029%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ESupport%20tip%3A%20How%20to%20test%20Microsoft%20Defender%20ATP%20(preview)%20based%20device%20compliance%20on%20Android%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId--1100647202%22%20id%3D%22toc-hId--1100647202%22%20id%3D%22toc-hId--1100647202%22%3E%3CSTRONG%3EM365%20Compliance%20%26amp%3B%20Governance%3C%2FSTRONG%3E%3C%2FH4%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-privacy-and-compliance%2Fannouncing-general-availability-of-records-management%2Fba-p%2F1347879%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAnnouncing%20general%20availability%20of%20Records%20Management%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-privacy-and-compliance%2Fimplementing-microsoft-exact-data-match-edm-part-1%2Fba-p%2F1345360%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EImplementing%20Microsoft%20Exact%20Data%20Match%20(EDM)%20Part%201%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-privacy-and-compliance%2Fimplementing-microsoft-exact-data-match-edm-part-2%2Fba-p%2F1350483%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EImplementing%20Microsoft%20Exact%20Data%20Match%20(EDM)%20Part%202%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-privacy-and-compliance%2Fcompliance-score-webinar%2Fba-p%2F1325371%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ECompliance%20Score%20Webinar%3C%2FA%3E%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-privacy-and-compliance%2Fadvanced-audit-webinar%2Fba-p%2F1320782%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAdvanced%20Audit%20Webinar%3C%2FA%3E%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ERegards%2C%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EJeremy%20Windmiller%20%7C%20Enterprise%20Security%20Architect%2C%20CISSP%2C%20CEH%2C%20ITIL%20%7C%20Microsoft%20%E2%80%93%20Healthcare%3C%2FSTRONG%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1357799%22%20slang%3D%22en-US%22%3E%3CP%3E%3CEM%3E%3CSTRONG%3EMicrosoft%20Security%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22global-impact-of-COVID-themed-attacks-2.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F188714i5787C3051CCC40D2%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22global-impact-of-COVID-themed-attacks-2.png%22%20alt%3D%22global-impact-of-COVID-themed-attacks-2.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3E%3CSTRONG%3E%26amp%3B%20Compliance%20wrap-up%20of%20announcements%20for%20the%20month%20of%20April%202020.%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1357799%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EMicrosoft%20Security%20Matters%20Newsletter%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1358019%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20Security%20Matters%20Newsletter%20-%20Apr%202020%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1358019%22%20slang%3D%22en-US%22%3E%3CP%3ECyber%20security%20is%20an%20important%20factor%20in%20every%20business%20.Our%20company%20always%20ensure%20that%20we%20patter%20with%20Microsoft%20to%20offer%20state%20of%20art%20%3CA%20title%3D%22Cyber%20security%22%20href%3D%22https%3A%2F%2Fpechanttelec.co.ke%2Fsolutions%2Fcyber-security%2F%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EIT%20Security%20in%20Kenya%3C%2FA%3E.%3C%2FP%3E%3C%2FLINGO-BODY%3E

Over the past 12-18 months, I have been providing a newsletter to customers that consolidates product updates, new offerings, how-to's, and general announcements for Microsoft Security Products and Services.  Based upon feedback, the newsletter has been a valuable resource to stay up-to-date on a monthly basis and thus have decided to publish it here for more folks to leverage this resource.  Please leave comment below if you find this newsletter valuable so that I can determine if I should publish this again in the future.

 

General News

Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk

Full Operational Shutdown—another cybercrime case from the Microsoft Detection and Response Team

Microsoft shares new threat intelligence, security guidance during global crisis

Defending the power grid against supply chain attacks: Part 3 – Risk management strategies for the u...

Protecting your organization against password spray attacks

MITRE ATT&CK evaluation results

Data governance matters now more than ever

Security guidance for remote desktop adoption

Afternoon Cyber Tea: Building operational resilience in a digital world

Enable remote work while keeping cloud deployments secure

Mobile security—the 60 percent problem

Protecting your data and maintaining compliance in a remote work environment

Turning collaboration and customer engagement up with a strong identity approach

 

Azure Security & Compliance News

Hunting Threats on Linux with Azure Sentinel

Monitoring Zoom with Azure Sentinel

Accelerating Cybersecurity Maturity Model Certification (CMMC) compliance on Azure

Azure Sentinel Sigma & SOC Prime Integration (Part 2)

Azure Sentinel Sigma & SOC Prime Integration (Part 3)

Azure Security Center enhancements

Creating digital tripwires with custom threat intelligence feeds for Azure Sentinel

Advanced integrations with export of Security Center recommendations and alerts

Azure Sentinel To-Go (Part1): A Lab w/ Prerecorded Data a Custom Logs Pipe via ARM Templates

Gain Compliance, Posture, and Protection Insights with this Azure Security Center Related Workbook

Enriching Azure Sentinel with Azure AD information

Controlling access to Azure Sentinel Data: Resource RBAC

Become an Azure Sentinel Ninja: The complete level 400 training

Azure Sentinel Data Enrichment - Walk-through with Scripting, KQL and Playbooks

Azure Security Center – automating Change Requests in ServiceNow using Workflow automation.

Implementing Lookups in Azure Sentinel

Enabling security research & hunting with open source IoT attack data

What’s New: Improved Incident Closing Experience is now Available!

Help for Security Operations Centers facing new challenges

NERC CIP Compliance in Azure vs. Azure Government cloud

 

Microsoft 365 Security (All Up News)

Zero Trust Assessment tool now live!

Microsoft Teams Security Webcast

A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Part 5 - Data

Our commitment to privacy and security in Microsoft Teams

Atos adopts Microsoft 365 to enable secure remote work for all employees

How to secure your remote workers with Office Cloud Policy Service

Security baseline for Microsoft Edge v81

Securing Authenticated SMTP in Exchange Online

Basic Authentication and Exchange Online – April 2020 Update

 

M365 Identity & Data Protection (Azure AD, Intune, AIP, MCAS)

Zero Trust Deployment Guide for Microsoft Azure Active Directory

Azure AD: Moving towards real time policy and security enforcement

New identity features help empower essential Firstline Workers

Developing applications for secure remote work with Azure AD

Frequent questions about using Conditional Access to secure remote access

Securely collaborate with remote partners using Azure AD B2B collaboration

Combined MFA and password reset registration is now generally available

Azure AD:  Secure remote access to on-premises apps

Azure AD pass-through and password hash authentication support for SQL DB, DW and Managed Instance

Announcing public preview of auto classification with sensitivity labels in Microsoft 365 services

Protect your customer accounts with passwordless mobile authentication

App Protection Policies and Shared/Delegate Mailboxes with Outlook mobile

 

M365 Threat Protection (Office ATP, Windows Defender ATP, Azure ATP/ATA)

MITRE ATT&CK APT 29 evaluation proves Microsoft Threat Protection provides deeper end to end view of...

Secure your remote workforce with Microsoft Defender ATP

Hunt more broadly and effectively with new Microsoft Threat Protection features on preview

Demystifying attack surface reduction rules - Part 1

Threat & Vulnerability Management APIs are now generally available

Azure ATP now detects SMBGhost

Deploy Microsoft Defender ATP for Mac in just a few clicks

Support tip: How to test Microsoft Defender ATP (preview) based device compliance on Android

 

M365 Compliance & Governance

Announcing general availability of Records Management

Implementing Microsoft Exact Data Match (EDM) Part 1

Implementing Microsoft Exact Data Match (EDM) Part 2

Compliance Score Webinar

Advanced Audit Webinar

 

Regards,

 

Jeremy Windmiller | Enterprise Security Architect, CISSP, CEH, ITIL | Microsoft – Healthcare