Microsoft Defender Weekly Wrap - Issue #15
Welcome one and all to this week's edition of the Microsoft Defender weekly newsletter! I hope your week was busy but successful.
I don't have a lot to highlight this week, other than what you see in the newsletter content below. The world is weird. There's been so much news and content around the war in Ukraine, nothing matters as much. But fortunately, our security platforms, our security teams, and our employee populace in general have been in full swing to help.
I wish you all a good weekend. Stay safe!
Talk soon...
-Rod
Things to Attend
LinkedIn Live Event: You Have Your Secure Score, Now What? — www.globenewswire.com Interactive, Q&A LinkedIn Live event for business and IT leaders; learn the best way to understand Secure Score and how to improve your organization’s...
Things that are Related
Create and Maintain Your Own KQL Demo Environment with the New Start-for-free Cluster – Azure Cloud & AI Domain Blog — azurecloudai.blog As we continue efforts to ensure KQL is accessible to everyone (regardless of whether or not an Azure subscription is required), a new Start-for-free Cluster program has been publicly released. This cluster can be used for learning, for evaluation, or if you're like me, as a hobby to get extra keen on data science. All…
Ten Ways to Harden the Security of Your Microsoft 365 Tenant – Part 2 — practical365.com Over the years, the Microsoft security stack has become very feature rich and offers many ways to customize the configuration. Third-party products are available with similar features, but lack the integration capability of the Microsoft stack. In the second part of the "Ten Ways to Harden the Security of Your Microsoft 365 Tenant" series, we look at five ways to secure your environment using controls that require a premium license such as Office E5 or Azure AD Premium.
Cyber threat activity in Ukraine: analysis and resources – Microsoft Security Response Center Microsoft has been monitoring escalating cyber activity in Ukraine and has published analysis on observed activity in order to give organizations the latest intelligence to guide investigations into potential attacks and information to implement proactive protections against future attempts. We’ve brought together all our analysis and guidance for customers who may be impacted by events in Ukraine into this single location for ease of consumption, all of which is linked below.
Things in the News
Unleash the power of your small business with Microsoft 365 - Microsoft 365 Blog — www.microsoft.com In addition to a robust security offering with Microsoft Defender for Business, we’re bringing together all the features businesses need to serve customers with Microsoft Teams Essentials, our standalone version of Microsoft Teams. From restaurants to retailers to professional services, small businesses can easily meet, collaborate, communicate, and serve customers in new ways.
Things from Partners
Orca Security Now Available in the Microsoft Azure Marketplace | Business Wire — www.businesswire.com Orca Security today announced the availability of the Orca Cloud Security Platform in the Microsoft Azure Marketplace.
Defender for Endpoint Things
CODE: Shivammalaviya/UkraineRussia IOCs detection through defender — gist.github.com UkraineRussia IOCs detection through defender
BLOG: Defending against ransomware with Microsoft Defender for Endpoint and Intel TDT: A Case Study - Microsoft Tech Community — techcommunity.microsoft.com Ransomware, which has long been a top concern for security decision makers, continues to increase in both volume and sophistication. As outlined in the
BLOG: Manage Server Protection for Legacy OS by Intune – Microsoft Defender Gurus — m365dlab.wordpress.com Managing Endpoint security policies for the server has been a nightmare for admins who are looking for moving all management to the cloud but still facing legacy OS restrictions. Microsoft Defender for Endpoint product group team has been working on closing the gap in security policies and management between current operating systems and legacy OSs such as Server 2016 and server 2012 R2. In this article, you will learn how to prepare your servers to be managed by Intune and deploy your AV policies for legacy operating systems
Defender for Cloud Things
ARTICLE: How to Increase Your Confidence in Cloud Security with Microsoft | CSO Online — www.csoonline.com In this article we will explore some of the top challenges that CISOs are facing when securing their cloud environments, as well as how Microsoft’s cloud services can help enterprises better assess, secure and defend against evolving threats.
BLOG: Stay on top of database threats with Microsoft Defender for Azure Cosmos DB | Azure Blog and Updates | Microsoft Azure — azure.microsoft.com Databases are constantly evolving to handle new use cases, incorporate more intelligence, and store more data, giving developers and organizations a wide range of database types to meet their varying needs. Azure Cosmos DB is a fully managed NoSQL database for modern, fast, and flexible app development. Today we’re excited to announce a new addition to our database protection offering Microsoft Defender for Cosmos DB in preview.
BLOG: Detecting identity attacks in Kubernetes - Microsoft Tech Community — techcommunity.microsoft.com Overview Identities and authentication are key principals in Kubernetes security. Although implementations might differ between various cloud providers,
BLOG: Automation to Block Outgoing Traffic to Malicious Websites detected by Microsoft Defender for Cloud - Microsoft Tech Community — techcommunity.microsoft.com One common type of security attack that occurs when an attacker has gained access to a virtual machine is that they will attempt to go to suspicious
VIDEO: New GCP Connector in Microsoft Defender for Cloud | Defender for Cloud in the Field #7 — www.youtube.com In this episode of Defender for Cloud in the field, Or Serok joins Yuri Diogenes to share the new GCP Connector in Microsoft Defender for Cloud. Or explains ...
Defender for IoT Things
BLOG: Secure your OT and IoT devices with Microsoft Defender for IoT and Quzara Cybertorch™ - Microsoft Security Blog — www.microsoft.com These cyberattacks on OT devices may not be new, but they underscore how dangerous the threat is to our critical infrastructure, as well as how great the risk is to our overall public safety.