User Profile
BrittanyCCP
Microsoft
Joined 3 years ago
User Widgets
Recent Discussions
New Blog | New Dimensions in Cybersecurity - Advanced Export for Defender for Cloud Attack Insights
Microsoft Defender for Cloud (MDC) has been instrumental in offering proactive security management through its detailed Attack Path insights, helping organizations identify and mitigate potential vulnerabilities before they can be exploited. While these insights have long provided value within the MDC portal and through one-time snapshots via Azure Resource Graph, a significant update enhances how organizations can leverage this information. Read the full blog here:Unlocking New Dimensions in Cybersecurity - Advanced Export for Defender for Cloud Attack Insights - Microsoft Community HubNew Blog | MDTI Earns Impactful Trio of ISO Certificates
Microsoft Defender Threat Intelligence (MDTI) has achieved ISO 27001, ISO 27017 and ISO 27018 certifications. TheISO, the International Organization for Standardization, develops market relevant international standards that support innovation and provide solutions to global challenges, including information security requirements around establishing, implementing, and improving an Information Security Management System (ISM). These certificates emphasize the MDTI team’s continuous commitment to protecting customer information and following the strictest standards of security and privacy standards. Read the full blog here:MDTI Earns Impactful Trio of ISO Certificates - Microsoft Community HubNew Blog | Best Practices for Upgrading Azure WAF Ruleset
In today’s digital landscape, web applications are the lifeblood of businesses. They enable seamless communication, transactions, and interactions with customers. However, this increased reliance on web apps also makes them prime targets for cyberattacks. To safeguard your applications and protect sensitive data, implementing a robust Web Application Firewall (WAF) is essential. Read the full blog here:Best Practices for Upgrading Azure WAF Ruleset - Microsoft Community Hub422Views1like0CommentsPrompt users for reauthentication on sensitive apps and high-risk actions with Conditional access
Additional capabilities now available forConditional Accessreauthentication policyscenarios. Reauthentication policy lets you require users to interactively provide their credentials again - typically before accessing critical applications and taking sensitive actions. Combined with Conditional Access session control of Sign-in frequency, you can require reauthentication for users and sign-ins with risk, or for Intune enrollment. With today's public preview,now you can require reauthentication for any resource protected by Conditional Access. Read the full blog update here:Prompt users for reauthentication on sensitive apps and high-risk actions with Conditional Access - Microsoft Community Hub582Views2likes0CommentsNew Blog | Microsoft and SAP work together to transform identity for SAP customers
SAP has recently announced its collaboration with Microsoft and advises their SAP Identity Management (IDM) customers to move their identity management scenarios to Microsoft Entra ID as their IDM approaches the end of maintenance.This latest collaboration creates new possibilities for Microsoft Entra and SAP to offer enhanced integration that will support a comprehensive identity and access governance framework. Read the full blog update here:Microsoft and SAP work together to transform identity for SAP customers - Microsoft Community Hub685Views0likes0CommentsBlog | Labeling w/ Microsoft Purview Data Map supports Dataverse, Azure Databricks, and Snowflake
We are pleased to announce that Labeling with Purview Data Map now supports three new data sources: Dataverse, Azure Databricks and Snowflake. For the complete list of data sources supported please refer to: Microsoft Purview Data Map supported data sources and file types | Microsoft Learn Read the full blog update here:Microsoft PurviewNew Blog | Enforcement of Defender CSPM for Premium DevOps Security Capabilities
Microsoft’s Defender for Cloud will begin enforcing the Defender Cloud Security Posture Management (DCSPM) plan check for premium DevOps security value beginning March 7th, 2024. If you have the Defender CSPM plan enabled on a cloud environment (Azure, AWS, GCP) within the same tenant your DevOps connectors are created in, you'll continue to receive premium code to cloud DevOps capabilities atno additional cost. If you aren't a Defender CSPM customer, you have until March 7th, 2024 to enable Defender CSPM before losing access to these security features. To enable Defender CSPM on a connected cloud environment before March 7, 2024, follow the enablement documentation outlined here. Read the full update here:Enforcement of Defender CSPM for Premium DevOps Security Capabilities - Microsoft Community HubNew Blog | Enable your key business needs within Microsoft Sentinel with step-by-step guidance
Modernize your security operations center (SOC) with Microsoft Sentinel. Uncover sophisticated threats and respond decisively with an intelligent, comprehensive security information and event management (SIEM) solution for proactive threat detection, investigation, and response. Read the full blog for the lightweight guide:Enable your key business needs within Microsoft Sentinel with step-by-step guidance - Microsoft Community HubNew Blog | Bridging the Gap Between Code and Cloud with Defender for Cloud
While containers have revolutionized modern software development, the complexity of dependencies in containerized environments and the expanded attack surface they present are still significant hurdles for security professionals. The initial step in securing these environments involves identifying vulnerabilities within container images.Yet, the most time-consuming task can often be identifying the right development team to address these vulnerabilities, particularly the mission-critical ones. Microsoft Defender for Cloud addresses this critical need with itscontainer mappingfeature. This blog post explores how Defender for Cloud streamlines the process of tracing vulnerabilities in container images back to their origins in CI/CD pipelines, specifically withinAzure DevOpsandGitHubenvironments. This functionality is key to facilitating effective developer remediation workflows, thereby enhancing the security posture of cloud-native applications. Read the full blog post here:Bridging the Gap Between Code and Cloud with Defender for Cloud - Microsoft Community Hub
Groups
Recent Blog Articles
No content to show