Microsoft Security Matters – Aug 2020

This post has been republished via RSS; it originally appeared at: Healthcare and Life Sciences Blog articles.

General News

Microsoft Security | Fall 2020 Public Webinars edition

Microsoft Security: What cybersecurity skills do I need to become a CISO?

Microsoft Security: How to cultivate a diverse cybersecurity team

Securing MEM at Microsoft

Rethinking IoT/OT Security to Mitigate Cyberthreats

How do I implement a Zero Trust security model for my Microsoft remote workforce?

New data from Microsoft shows how the pandemic is accelerating the digital transformation of cyber-security

Zero Trust: From security option to business imperative overnight

How to organize your security team: The evolution of cybersecurity roles and responsibilities

Afternoon Cyber Tea: Revisiting social engineering: The human threat to cybersecurity

How Microsoft Mission Critical team helped secure AAD

Microsoft joins Open Source Security Foundation

 

Azure Security & Compliance News

Become an Azure Security Center Ninja

Automation to Block Brute-force Attacked IP detected by Azure Security Center

Threat Protection for SQL IaaS VMs running on-premises using Azure Security Center

Threat Protection for SQL IaaS VMs hosted on Azure Arc using Azure Security Center

Built-in vulnerability assessment for VMs in Azure Security Center

Azure Security Center Secure Score Reduction Alert

Best practices for layering on cloud security through Azure Marketplace

Detect attacks using Application Gateway and Web Application Firewall

Remediate Vulnerable Secure Channel Connections with the Insecure Protocols Workbook

What’s New: Query line numbering, Azure Sentinel in the schema pane

MSTIC Notebooklets - Fast Tracking CyberSec Jupyter Notebooks

Monitoring Azure Kubernetes Service (AKS) with Azure Sentinel

Guided Hunting Notebook: Base64-Encoded Linux Commands

Ingesting log files from AWS S3 using AWS Lambda

Azure Sentinel Insecure Protocols Workbook Reimagined

What’s new: SOC operational metrics now available in Azure Sentinel

Whats new: Azure Sentinel and Microsoft Defender ATP improved alert integration

 

Microsoft 365 Security (All Up News)

Microsoft Office 365—Do you have a false sense of cloud security?

Security baseline for Microsoft Edge version 85

Security baseline (FINAL): Windows 10 and Windows Server, version 2004

Application Guard for M365 Apps public preview

Security best practices for Windows Server Update Services (WSUS)

Managing BitLocker with Microsoft Endpoint Manager

 

M365 Identity & Data Protection (Azure AD, Intune, AIP, MCAS)

Conditional Access policies now apply to all client applications by default

Microsoft Authenticator app lock now enabled by default

Risky Business in Azure AD…

Automated user provisioning from SAP SuccessFactors is now GA

ALERT! New Blog Series: Automation in Cloud App Security

New study by Forrester shows customers who deploy Azure AD can benefit from a 123% ROI

Assigning groups to Azure AD roles is now in public preview!

Using Azure PIM for the AIP Super User feature management

Let's Talk About Azure Active Directory and the Microsoft Identity Platform

Gartner announces the 2020 Magic Quadrant for Unified Endpoint Management

 

M365 Threat Protection (Office ATP, Windows Defender ATP, Azure ATP/ATA)

Microsoft Defender ATP Ninja Training: August 2020 update

Webinar: How to maximize Microsoft Defender ATP configuration using attack simulations

On-demand webcast series: “Tracking the adversary”

Pull in more intelligence and act fast while you hunt

Microsoft Defender ATP Daily Operation - Part 1

Microsoft Threat Protection now uses more descriptive incident names

Introducing an improved timeline investigation with event flagging

Introducing EDR in block mode: Stopping attacks in their tracks

Microsoft Defender ATP: Web Content Filtering

A new look for threat analytics

Microsoft Defender ATP for Mac is moving to system extensions

Stopping Active Directory attacks and other post-exploitation behavior with AMSI and machine learning

How can Microsoft Threat Protection help reduce the risk from phishing?

Microsoft Defender ATP: Remediate Apps Using MEM

Linux ATP Configuration and Operation Command List

Microsoft Advanced Threat Protection for Linux

 

M365 Compliance & Governance

FAQ for Teams compliance

New features and improvements to Sensitivity labels for Containers Webinar

Classification Depth Private Preview

 

Regards,

 

Jeremy Windmiller | Enterprise Security Architect, CISSP, CEH, ITIL | Microsoft – Healthcare

REMEMBER: these articles are REPUBLISHED. Your best bet to get a reply is to follow the link at the top of the post to the ORIGINAL post! BUT you're more than welcome to start discussions here:

This site uses Akismet to reduce spam. Learn how your comment data is processed.