Microsoft Security Matters Newsletter - May 2020
Published Jun 01 2020 06:57 AM 2,882 Views

For most of us, the month of May was one of continued work from home and adapting to this new norm.  There’s an abundant of great content below on Zero Trust and working remotely for enterprises.  As with every month’s newsletter I have italicized the articles that I would prioritize in reading.

 

General News

Cybersecurity best practices to implement highly secured devices

CISO Series: Lessons learned from the Microsoft SOC—Part 3c: A day in the life part 2

Microsoft Threat Protection leads in real-world detection in MITRE ATT&CK evaluation

Open-sourcing new COVID-19 threat intelligence

Zero Trust and its role in securing the new normal

Mitigating vulnerabilities in endpoint network stacks

Operational resilience in a remote work world

Success in security: reining in entropy

Quantum-safe cryptography: Securing today’s data against tomorrow’s computers webinar

Secured-core PCs help customers stay ahead of advanced data theft

Defending networks against human-operated ransomware

Empowering your remote workforce with end-user security awareness

CISO stress-busters: post #1 overcoming obstacles

Microsoft researchers work with Intel Labs to explore new deep learning approaches for malware class...

Managing and Securing Devices Utilizing Conditional Access Policies at Microsoft

Microsoft Build brings new innovations and capabilities to keep developers and customers secure

 

Azure Security & Compliance News

Suppression rules for Azure Security Center alerts are now publicly available

Protecting MSSP’s Intellectual Property in Azure Sentinel

Secure Working from Home – Deep Insights at Enrolled MEM Assets via Azure Sentinel

Making your Azure Sentinel Workbooks multi-tenant (or multi-workspace)

Azure Sentinel Sigma and SOC Prime Integration (Part 1): Convert Sigma rules to Azure Sentinel

Azure Sentinel Sigma & SOC Prime Integration (Part 2): Directly deploy to Azure Sentinel

Azure Sentinel Sigma & SOC Prime Integration (Part 3): Deploy to multiple workspaces and tenants

Approximate, partial and combined lookups in Azure Sentinel

Table Level RBAC In Azure Sentinel

Integrating open source threat feeds with MISP and Sentinel

Azure Security Center Auto-connect to Sentinel playbook

Using the Sentinel API to view data in a Workbook

Monitor your Azure workload compliance with Azure Security Benchmark

Automating cybersecurity guardrails with new Zero Trust blueprint and Azure integrations

Use Azure Firewall for secure and cost-effective Windows Virtual Desktop protection

Security Controls in ASC: Secure Score Series - Overview

Importing Sigma Rules to Azure Sentinel

Kicking off the Azure Sentinel Hackathon!

Graph Visualization of External Teams Collaborations in Azure Sentinel

Monitoring Windows Virtual Desktop environments (Fall 2019 release) with Azure Sentinel

 

Microsoft 365 Security (All Up News)

Security baseline (DRAFT): Windows 10 and Windows Server, version 2004

Announcing OAuth Support for POP in Exchange Online

Microsoft and Zscaler are helping customers evolve to a Zero Trust security model

Zero Trust Deployment Guide for Microsoft Azure Active Directory

Zero Trust deployment guide for devices

Microsoft Teams Security CollabCast Recording and Resources

[Part 5 of Enabling remote work with Microsoft 365 Webcast Series] Maintain security and control

New tools to help IT empower employees securely in a remote work world

Announcing OAuth 2.0 support for IMAP and SMTP AUTH protocols in Exchange Online

 

M365 Identity & Data Protection (Azure AD, Intune, AIP, MCAS)

Azure AD security enforcement with Continuous Access Evaluation

Updates to Azure AD Conditional Access report-only mode, insights & reporting, and troubleshooting

Manage authentication sessions in Azure AD Conditional Access is now generally available!

Manage your authentication phone numbers and more in new Microsoft Graph beta APIs

4 identity partnerships to help drive better security

Evolving Azure AD for every user and any identity with External Identities

Imprivata and Azure AD help healthcare delivery organizations deliver safe and secure care

Azure AD Mailbag: What is identity provisioning and why does it matter?

Protect your accounts with smarter ways to sign in on World Passwordless Day.

Classification Depth Limited Private Preview

General availability of automatic classification with sensitivity labels in Microsoft 365 services

Microsoft Information Protection and Compliance Deployment Acceleration Guide

Announcing general availability of sensitivity labels with protection in SharePoint and OneDrive

Exact Data Match (EDM) Webinar

Implementing Microsoft Exact Data Match (EDM) Part 2

Implementing Microsoft Exact Data Match (EDM) Part 3

Unified endpoint security using Microsoft Endpoint Manager

Forced Transformation - Part I - ConfigMgr to AzureAD Groups

Assess GDPR readiness with Microsoft Cloud App Security

Unified policies with Cloud App Security and the Microsoft Data Classification Service

 

M365 Threat Protection (Office ATP, Windows Defender ATP, Azure ATP/ATA)

Automate the boring for your SOC with automatic investigation and remediation!

Microsoft Defender ATP evaluation lab breach & attack simulators are now available in public preview

Onboarding and servicing non-persistent VDI machines with Microsoft Defender ATP

How to gain 24/7 detection and response coverage with Microsoft Defender ATP

Harden endpoint security for COVID-19 and working from home with Threat & Vulnerability Management

Demystifying attack surface reduction rules - Part 3

Demystifying attack surface reduction rules - Part 4

Indicators enhancements: Allow/Block by certificates & more

Get the most out of Office 365 ATP in the shift to remote work

 

M365 Compliance & Governance

Use Communication Compliance to manage risk and identify inappropriate conduct in Yammer

General availability of 'know your data'

Upcoming Webinar - eDiscovery for Teams - May 14th

Data governance matters now more than ever

Microsoft 365 Records Management now available, helping protect and govern critical data

 

Regards,

 

Jeremy Windmiller | Enterprise Security Architect, CISSP, CEH, ITIL | Microsoft – Healthcare

2 Comments
Version history
Last update:
‎Jun 01 2020 06:57 AM
Updated by: