New Blog Post | Detect active network reconnaissance with Microsoft Defender for Endpoint

%3CLINGO-SUB%20id%3D%22lingo-sub-3131884%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Detect%20active%20network%20reconnaissance%20with%20Microsoft%20Defender%20for%20Endpoint%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3131884%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CLO22_TechOffice_022-900x360.jpg%22%20style%3D%22width%3A%20900px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F345975i384784A70A713DE4%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22CLO22_TechOffice_022-900x360.jpg%22%20alt%3D%22CLO22_TechOffice_022-900x360.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2022%2F02%2F07%2Fdetect-active-network-reconnaissance-with-microsoft-defender-for-endpoint%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EDetect%20active%20network%20reconnaissance%20with%20Microsoft%20Defender%20for%20Endpoint%20-%20Microsoft%20Security%20Blog%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EThe%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2021%2F06%2F09%2Fcrsp-the-emergency-team-fighting-cyber-attacks-beside-customers%2F%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%22%3EMicrosoft%20Compromise%20Recovery%20Security%20Practice%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Ehas%20observed%20how%20the%20security%20industry%20has%20evolved%20over%20the%20last%20few%20years%20as%20consumers%2C%20businesses%2C%20and%20industry%20professionals%20continue%20to%20adapt%20to%20the%20changing%20landscape.%20We%20have%20seen%20the%20emergence%20of%20new%20frameworks%2C%20such%20as%20the%20Cybersecurity%20Framework%20by%20the%20National%20Institute%20of%20Standards%20and%20Technology%20(NIST)%2C%20which%20can%20empower%20us%20to%20build%20scalable%20programs%20and%20accelerate%20the%20transition%20to%20a%20Zero%20Trust%20workplace.%20We%20have%20also%20witnessed%20the%20rise%20and%20prominence%20of%20human-operated%20ransomware%2C%20which%20continues%20to%20subvert%20traditional%20security%20defenses%20and%20assert%20control%20over%20our%20information%20assets.%3CSUP%3E1%3C%2FSUP%3E%3C%2FP%3E%0A%3CP%20class%3D%22%22%3EMany%20of%20our%20customers%20have%20placed%20their%20trust%20in%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fdefender-endpoint%2Fmicrosoft-defender-endpoint%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%22%3EMicrosoft%20Defender%20for%20Endpoint%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Ein%20order%20to%20help%20them%20protect%2C%20detect%2C%20and%20respond%20to%20threats%20that%20have%20emerged%20throughout%20this%20period%20of%20change.%20It%20is%20a%20diverse%20landscape%20that%20forces%20us%20to%20reconsider%20how%20we%20protect%20our%20most%20prized%20assets%20from%20borderless%20threat%20actors%20in%20IT%20environments%20that%20can%20no%20longer%20remain%20exclusively%20protected%20behind%20a%20network%20perimeter.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-3131884%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Defender%20for%20Endpoint%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

CLO22_TechOffice_022-900x360.jpg

Detect active network reconnaissance with Microsoft Defender for Endpoint - Microsoft Security Blog

The Microsoft Compromise Recovery Security Practice has observed how the security industry has evolved over the last few years as consumers, businesses, and industry professionals continue to adapt to the changing landscape. We have seen the emergence of new frameworks, such as the Cybersecurity Framework by the National Institute of Standards and Technology (NIST), which can empower us to build scalable programs and accelerate the transition to a Zero Trust workplace. We have also witnessed the rise and prominence of human-operated ransomware, which continues to subvert traditional security defenses and assert control over our information assets.1

Many of our customers have placed their trust in Microsoft Defender for Endpoint in order to help them protect, detect, and respond to threats that have emerged throughout this period of change. It is a diverse landscape that forces us to reconsider how we protect our most prized assets from borderless threat actors in IT environments that can no longer remain exclusively protected behind a network perimeter.

0 Replies