For most of us, the month of May was one of continued work from home and adapting to this new norm. There’s an abundant of great content below on Zero Trust and working remotely for enterprises. As with every month’s newsletter I have italicized the articles that I would prioritize in reading.
General News
Cybersecurity best practices to implement highly secured devices
CISO Series: Lessons learned from the Microsoft SOC—Part 3c: A day in the life part 2
Microsoft Threat Protection leads in real-world detection in MITRE ATT&CK evaluation
Open-sourcing new COVID-19 threat intelligence
Zero Trust and its role in securing the new normal
Mitigating vulnerabilities in endpoint network stacks
Operational resilience in a remote work world
Success in security: reining in entropy
Quantum-safe cryptography: Securing today’s data against tomorrow’s computers webinar
Secured-core PCs help customers stay ahead of advanced data theft
Defending networks against human-operated ransomware
Empowering your remote workforce with end-user security awareness
CISO stress-busters: post #1 overcoming obstacles
Managing and Securing Devices Utilizing Conditional Access Policies at Microsoft
Microsoft Build brings new innovations and capabilities to keep developers and customers secure
Azure Security & Compliance News
Suppression rules for Azure Security Center alerts are now publicly available
Protecting MSSP’s Intellectual Property in Azure Sentinel
Secure Working from Home – Deep Insights at Enrolled MEM Assets via Azure Sentinel
Making your Azure Sentinel Workbooks multi-tenant (or multi-workspace)
Azure Sentinel Sigma and SOC Prime Integration (Part 1): Convert Sigma rules to Azure Sentinel
Azure Sentinel Sigma & SOC Prime Integration (Part 2): Directly deploy to Azure Sentinel
Azure Sentinel Sigma & SOC Prime Integration (Part 3): Deploy to multiple workspaces and tenants
Approximate, partial and combined lookups in Azure Sentinel
Table Level RBAC In Azure Sentinel
Integrating open source threat feeds with MISP and Sentinel
Azure Security Center Auto-connect to Sentinel playbook
Using the Sentinel API to view data in a Workbook
Monitor your Azure workload compliance with Azure Security Benchmark
Automating cybersecurity guardrails with new Zero Trust blueprint and Azure integrations
Use Azure Firewall for secure and cost-effective Windows Virtual Desktop protection
Security Controls in ASC: Secure Score Series - Overview
Importing Sigma Rules to Azure Sentinel
Kicking off the Azure Sentinel Hackathon!
Graph Visualization of External Teams Collaborations in Azure Sentinel
Monitoring Windows Virtual Desktop environments (Fall 2019 release) with Azure Sentinel
Microsoft 365 Security (All Up News)
Security baseline (DRAFT): Windows 10 and Windows Server, version 2004
Announcing OAuth Support for POP in Exchange Online
Microsoft and Zscaler are helping customers evolve to a Zero Trust security model
Zero Trust Deployment Guide for Microsoft Azure Active Directory
Zero Trust deployment guide for devices
Microsoft Teams Security CollabCast Recording and Resources
[Part 5 of Enabling remote work with Microsoft 365 Webcast Series] Maintain security and control
New tools to help IT empower employees securely in a remote work world
Announcing OAuth 2.0 support for IMAP and SMTP AUTH protocols in Exchange Online
M365 Identity & Data Protection (Azure AD, Intune, AIP, MCAS)
Azure AD security enforcement with Continuous Access Evaluation
Updates to Azure AD Conditional Access report-only mode, insights & reporting, and troubleshooting
Manage authentication sessions in Azure AD Conditional Access is now generally available!
Manage your authentication phone numbers and more in new Microsoft Graph beta APIs
4 identity partnerships to help drive better security
Evolving Azure AD for every user and any identity with External Identities
Imprivata and Azure AD help healthcare delivery organizations deliver safe and secure care
Azure AD Mailbag: What is identity provisioning and why does it matter?
Protect your accounts with smarter ways to sign in on World Passwordless Day.
Classification Depth Limited Private Preview
General availability of automatic classification with sensitivity labels in Microsoft 365 services
Microsoft Information Protection and Compliance Deployment Acceleration Guide
Announcing general availability of sensitivity labels with protection in SharePoint and OneDrive
Exact Data Match (EDM) Webinar
Implementing Microsoft Exact Data Match (EDM) Part 2
Implementing Microsoft Exact Data Match (EDM) Part 3
Unified endpoint security using Microsoft Endpoint Manager
Forced Transformation - Part I - ConfigMgr to AzureAD Groups
Assess GDPR readiness with Microsoft Cloud App Security
Unified policies with Cloud App Security and the Microsoft Data Classification Service
M365 Threat Protection (Office ATP, Windows Defender ATP, Azure ATP/ATA)
Automate the boring for your SOC with automatic investigation and remediation!
Microsoft Defender ATP evaluation lab breach & attack simulators are now available in public preview
Onboarding and servicing non-persistent VDI machines with Microsoft Defender ATP
How to gain 24/7 detection and response coverage with Microsoft Defender ATP
Harden endpoint security for COVID-19 and working from home with Threat & Vulnerability Management
Demystifying attack surface reduction rules - Part 3
Demystifying attack surface reduction rules - Part 4
Indicators enhancements: Allow/Block by certificates & more
Get the most out of Office 365 ATP in the shift to remote work
M365 Compliance & Governance
Use Communication Compliance to manage risk and identify inappropriate conduct in Yammer
General availability of 'know your data'
Upcoming Webinar - eDiscovery for Teams - May 14th
Data governance matters now more than ever
Microsoft 365 Records Management now available, helping protect and govern critical data
Regards,
Jeremy Windmiller | Enterprise Security Architect, CISSP, CEH, ITIL | Microsoft – Healthcare
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.