User Profile
crystalashcraft
Former Employee
Joined 3 years ago
User Widgets
Recent Discussions
New blog post | Microsoft Defender for IoT moves to site-based licensing
On June 1, 2023, Microsoft Defender for IoT moved to site-based licensing for organizations looking to protect their operation technology (OT) environments. The previous Azure consumption model for this solution will no longer be available for purchase by new customers. Existing customers can choose to transition to site-based licensing or remain on the consumption model. Microsoft Defender for IoT - New site-based licensingNEW SURVEY: Mailbox & Calendar Delegation
We are interested in understanding how delegates are setup to manage mail and calendar for your executives and any friction that you may encounter with encryption. Your information can help inform us in shaping the roadmap of protecting mail, calendar and meeting. Thank you very much for your precious time participating in this survey. Take the short survey today: https://forms.office.com/r/pe4KrxWNEY Microsoft respects your privacy. You can review our online Privacy Statement at https://privacy.microsoft.com/en-gb/privacystatementNew blog post | Microsoft Defender for APIs enriches Defender CSPM capabilities
We are excited to unveil the integration of (Preview) and Defender CSPM in the Microsoft Defender for Cloud (MDC) to provide contextual API security findings and guide prioritized remediation. Microsoft Defender for APIs, announced at RSA 2023, is the latest addition to our lineup of robust Defender plans in Microsoft Defender for Cloud. Defender for APIs helps organizations' business-critical APIs managed by Azure API Management with a holistic approach to prevent, detect and respond to API security threats with integrated cloud security context. Microsoft Defender for APIs enriches Defender CSPM capabilities. - Microsoft Community HubNew blog post | Grant users access to data assets in your enterprise through the Microsoft Purview
Microsoft Purview Data owner policies is a cloud-based service that helps you provision access to data sources and datasets securely and at scale. Data owner policies expose a REST API through which you can grant any Azure AD identity (user, group or service principal) to have Read or Modify access to a dataset or data resource. The scope for the access can range from fine-grained (e.g., Table or File) to broad (e.g., entire Azure Resource Group or Subscription). This API provides a consistent interface that abstracts the complexity of permissions for each type of data source. Grant users access to data assets in your enterprise through the Microsoft Purview policies API891Views0likes0CommentsNew blog post | Correlating alerts in Microsoft Defender for Cloud
Alerts in Microsoft Defender for Cloud are notifications generated when potential security threats and anomalous activities are detected within your cloud environment. These alerts provide crucial information and insights, enabling SecOps teams to effectively identify, prioritize, and respond to potential malicious activity. Correlating alerts in Microsoft Defender for Cloud - Microsoft Community HubNew blog post | New App Health Recommendations in Microsoft Entra Workload Identities
We recently announced our 2023 State of Cloud Permissions Risks report, which laid out some interesting and eye-opening findings on not just the expansion of cloud environments, but the increase in identity types accessing critical cloud resources. The report reveals interesting findings on why securing workload identities has become more critical than ever: New App Health Recommendations in Microsoft Entra Workload Identities - Microsoft Community Hub474Views0likes0CommentsNew blog post | Improved Security documentation hub
We’re excited to announce a major refresh to our Security documentation page on Microsoft Learn. The page now serves as our Security documentation hub. Learners can use it as their jumping-off point for finding all Security technical skilling content across Microsoft, with more streamlined sections and content for easy discovery. Locate Security training and resources with ease on the improved Security documentation hub (microsoft.com)735Views0likes0CommentsNew blog post | Azure Web Application Firewall- Bot Manager Scenarios
The continuous integration of bots to simulate human engagement, especially for unethical activities in web applications lead to both security incidents and diversion of engagement with web resources. The advent of new AI projects and LLMs (Large Language Models) have also opened more avenues for vulnerabilities including prompt injections, data leakage, training data poisoning, unauthorized code execution etc. Azure Web Application Firewall- Bot Manager Scenarios - Microsoft Community HubNew blog post | Is that Microsoft 365 application appropriate for storing records?
Microsoft 365 has swiftly become one of the most ubiquitous collaboration platforms in organizations today. People love how easy it is to use, and the vast array of features and tools that empower them to do their best work every day. Is that Microsoft 365 application appropriate for storing records? - Microsoft Community HubNew blog post | Introducing the Azure Workbook for Defender CSPM Visualization
We are excited to announce the release of the Azure Workbook for Defender CSPM (Cloud Security Posture Management), an intuitive dashboard designed to easy the way you visualize and analyze your Defender for Cloud's information related to Defender CSPM plan. This comprehensive workbook serves as a central dashboard within the Azure Portal, providing you with a consolidated view of critical Defender CSPM insights and empowering you to make informed decisions to enhance your cloud security posture. Introducing the Azure Workbook for Defender CSPM Visualization: Enhance Your Cloud Security Posture - Microsoft Community HubNew blog post | How eDiscovery can help you reduce data and risks in three steps
This month's episode of Uncovering Hidden Risks discusses strategies and best practices to mitigate security and compliance risks by using in-place eDiscovery to support investigations and litigation. As data volumes continue to balloon, it's becoming clear that the quickest path to victory does not involve the fewest steps. Let’s explore ways to defensibly move data minimization decisions upstream, to collaboratively expedite the eDiscovery process and reduce risk within the safety of your own tenant. Mitigate risks using in-place eDiscovery | Uncovering Hidden Risks (microsoft.com)New blog post | General Availability of Structured Logs and Single Click Upgrade/Downgrade in Azure
Azure Firewall is a Cloud-native Firewall as a Service offering that enables customers to centrally govern and log all their traffic flows using a DevOps approach. The service supports both application and network-level filtering rules and is integrated with the Microsoft Defender Threat Intelligence feed to filter known malicious IP addresses and domains. Azure Firewall is highly available with built-in auto-scaling. General Availability of Structured Logs and Single Click Upgrade/Downgrade in Azure Firewall - Microsoft Community HubNew blog post | Microsoft Defender for API Security Dashboard
Microsoft Defender for APIs is a plan provided by Microsoft Defender for Cloud that offers full lifecycle protection, detection, and response coverage for APIs. Defender for APIs is currently in public preview and currently provides security for APIs published in Azure API Management. Microsoft Defender for API Security Dashboard - Microsoft Community HubNew blog post | Important: Azure AD Graph Retirement and Powershell Module Deprecation
In 2019, we announced deprecation of the Azure AD Graph service. One year ago we communicated that Azure AD Graph will be retired and stop functioning after June 30, 2023. We also previously communicated that three legacy PowerShell modules (Azure AD, Azure AD Preview, and MS Online) would be deprecated on June 30, 2023. Important: Azure AD Graph Retirement and Powershell Module Deprecation - Microsoft Community HubNew blog post | Filter by asset type, bulk delete assets in Microsoft Purview
Our latest release, Manage access to business assets via collections, also makes it easier to work with assets in Collections. In case you missed it: You now get a full page for working with assets. This used to be a small panel. Finally, some breathing room! If you're a data curator, you can now bulk-delete assets from a collection Filter by asset type, bulk delete assets, and import assets into collections in Microsoft Purview413Views0likes0CommentsNew blog post | Announcing multicloud assessments in Compliance Manager
Multicloud strategies have become the new norm for most enterprises, with over 90% of organizations adopting multiple cloud infrastructures (IaaS), platforms (PaaS), and services (SaaS) to run their businesses. However, a lack of visibility into this growing digital infrastructure exposes organizations to significant risks. As a customer, you may conduct business with Microsoft 365, run workloads on Azure, Amazon Web Services (AWS), and Google Cloud (GCP), and rely on services like Zoom or Salesforce. Yet in this ever-expanding digital ecosystem, you need to ensure that you uphold your regulatory and customer commitments and adhere to privacy and security best practices, regardless of where your data lives. Today, we’re excited to announce new multi-cloud capabilities for Microsoft Purview Compliance Manager that help you understand and manage your compliance posture across clouds and workloads. Announcing multicloud assessments in Compliance Manager (microsoft.com)653Views0likes0CommentsSurvey Opportunity! DO Public Preview: New MDO Teams features feedback form
We appreciate you taking the time to try our newest MDO features and thank you for your feedback. Take the quick 5-minute survey here: https://forms.office.com/r/d2HtW9tMxn You can learn more about the MDO Teams features here: https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/mdo-support-teams-aboutNew blog post | Action required: Last chance to migrate ADAL apps!
We are announcing a new Azure Active Directory (Azure AD) recommendation helping customers migrate apps using the legacy Azure AD Authentication Library (ADAL) to the Microsoft Authentication Library (MSAL). Action required: Last chance to migrate ADAL apps! - Microsoft Community Hub372Views0likes0CommentsNew blog post | Detection Engineering in Azure & Introducing AzDetectSuite
Over the past few years of performing Azure security research, I have seen many new attack primitives & techniques discovered that an adversary could abuse within Azure & Azure Active Directory (AAD). When explaining a technique to a client, the challenge wasn’t explaining how something could be abused, the challenge was explaining how to detect it. Last year, I released the Azure Threat Research Matrix (ATRM), which highlighted the potential techniques an adversary could abuse within Azure & AzureAD. The immediate thought would be to give clients an idea of what potential abuse scenarios exist when they decide to use a certain resource or feature. However, it heavily lacked defensive content. I’ve always been a firm believer in that red team exists only to help blue team, so I’m now releasing my newest project: AzDetectSuite. AzDetectSuite is a project created to allow Azure users to establish a basic defense within Azure by giving pre-built KQL queries for each technique within ATRM that are deployable Alerts to Azure Monitor. Now, in ATRM, most (85%+) techniques will have a KQL query and a button that will deploy the query to their Azure subscription. Detection Engineering in Azure & Introducing AzDetectSuite - Microsoft Community Hub1KViews0likes0CommentsNew blog post | Don't get caught unprepared: three steps to manage the risks of multicloud
This month's episode of Uncovering Hidden Risks discusses what it means to support multicloud, the risks of running a multicloud strategy, and how customers can think about this as they accelerate their digital transformation. Considering over 90% of organizations are already multicloud – meaning they rely on more than one cloud provider; it is important to understand how to protect people and data in a constantly evolving digital environment. 3 steps to manage the risks of multicloud | Uncovering Hidden Risks (microsoft.com)
Recent Blog Articles
No content to show