Introducing the security configuration framework: A prioritized guide to hardening Windows 10

Credit to Author: Eric Avena| Date: Thu, 11 Apr 2019 15:00:41 +0000

The security configuration framework is designed to help simplify security configuration while still allowing enough flexibility to allow you to balance security, productivity, and user experience. We are defining discrete prescriptive Windows 10 security configurations (levels 5 through 1) to meet many of the common device scenarios we see today in the enterprise.

The post Introducing the security configuration framework: A prioritized guide to hardening Windows 10 appeared first on Microsoft Security.

Read more

Forcepoint DLP integration with Microsoft Information Protection—protecting your critical data

Credit to Author: Todd VanderArk| Date: Wed, 10 Apr 2019 19:00:42 +0000

Microsoft and Forcepoint are working closely to develop an integrated solution that makes it easy to discover, classify, label, and protect critical business data.

The post Forcepoint DLP integration with Microsoft Information Protection—protecting your critical data appeared first on Microsoft Security.

Read more

4 tried-and-true prevention strategies for enterprise-level security

Credit to Author: Todd VanderArk| Date: Wed, 10 Apr 2019 16:00:20 +0000

Learn about the four cyber hygiene best practices recommended in the 24th edition of the Microsoft Security Intelligence Report (SIR) to help reduce your risk of attack.

The post 4 tried-and-true prevention strategies for enterprise-level security appeared first on Microsoft Security.

Read more

Building the security operations center of tomorrow—better insights with compound detection

Credit to Author: Todd VanderArk| Date: Wed, 10 Apr 2019 16:00:06 +0000

Learn how compound detection can help you apply the law of data gravity and correlate insights across your security platforms.

The post Building the security operations center of tomorrow—better insights with compound detection appeared first on Microsoft Security.

Read more

Analysis of a targeted attack exploiting the WinRar CVE-2018-20250 vulnerability

Credit to Author: Eric Avena| Date: Wed, 10 Apr 2019 15:00:58 +0000

A complex attack chain incorporating the CVE-2018-20250 exploit and multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.

The post Analysis of a targeted attack exploiting the WinRar CVE-2018-20250 vulnerability appeared first on Microsoft Security.

Read more

Step 8. Protect your documents and email: top 10 actions to secure your environment

Credit to Author: Todd VanderArk| Date: Tue, 09 Apr 2019 16:00:24 +0000

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 8. Protect your documents and email,” you’ll learn how to deploy Azure Information Protection and use Office 365 Advanced Threat Protection (ATP) and Exchange Online Protection to help secure your documents and emails.

The post Step 8. Protect your documents and email: top 10 actions to secure your environment appeared first on Microsoft Security.

Read more

Steer clear of tax scams

Credit to Author: Eric Avena| Date: Fri, 05 Apr 2019 16:00:13 +0000

In the month of February, we saw an average of 300,000 phishing attempts across Microsoft’s browsing platforms daily. Our security experts expect these attempted scams to become increasingly more prevalent through the April 15 tax day.

The post Steer clear of tax scams appeared first on Microsoft Security.

Read more

Secure access to your enterprise with Microsoft 365 Enterprise E5

Credit to Author: Todd VanderArk| Date: Wed, 03 Apr 2019 19:00:32 +0000

User access can be simpler for your users and more secure for the enterprise. Read our latest e-book, “Secure access to your enterprise,” to find out how.

The post Secure access to your enterprise with Microsoft 365 Enterprise E5 appeared first on Microsoft Security.

Read more