Microsoft 365 Defender has released its monthly update for August 2023, highlighting new features and improvements across their Defender products. The update includes the introduction of the new file page in Microsoft 365 Defender, which allows for deeper analysis of files and their impact on security incidents. Additionally, there is a new URL page for more efficient investigation of URLs and domains, as well as the launch of Microsoft Defender Experts for XDR, a managed extended detection and response service. Other updates include unified security settings management for Windows, macOS, and Linux in Defender for Endpoint, new response actions for macOS and Linux-based devices, and the availability of a new eBPF-based sensor for Defender for Endpoint on Linux. Microsoft Defender for Cloud Apps now allows partners to securely build their own connector on the Open App Connector Platform, and Microsoft Defender for Identity introduces best practices for identity-based honeytokens. Lastly, Microsoft Defender for IoT now offers firmware analysis capabilities, and Defender for Office 365 introduces enhanced email security policies. Microsoft also shares insights into recent investigations of ransomware attacks and phishing campaigns, as well as strategies for defending against cloud compute resource abuse. #Microsoft365DefenderUpdates #CybersecurityEnhancements #DefendingAgainstThreats
Kunal Kodkani’s Post
More Relevant Posts
-
Microsoft Teams has become a popular collaboration platform for businesses, but with increased usage comes a rise in compliance and conduct violations. Microsoft Purview Communication Compliance aims to address these issues by providing tools to detect regulatory and business conduct violations, such as sensitive information sharing or harassment. It also offers live transcription in 34 languages for meetings, making it easier to detect potential violations. Communication Compliance Investigators can review meeting transcripts and video snippets to identify violations. Microsoft Purview also offers other solutions like Insider Risk Management and Records Management. Current Communication Compliance customers can access resources to learn more about safeguarding sensitive information and detecting violations. #MicrosoftTeams #CommunicationCompliance #BusinessConduct
Keep Microsoft Teams meetings compliant with Communication Compliance
techcommunity.microsoft.com
To view or add a comment, sign in
-
Microsoft has introduced new security features for video content in Stream (on SharePoint). Users can now block the download of Teams meeting recordings, access audit logs for video activities, manage data lifecycle, prevent data loss, and streamline eDiscovery processes. These features provide robust protection and control over video content within organizations. Microsoft is also developing additional features such as communications compliance and sensitivity labels for video. These new capabilities enhance the secure storage offered by Microsoft 365 and ensure peace of mind for users. #Microsoft365Security #VideoContentProtection #DataSecurity
New Tools to Elevate Video Security
techcommunity.microsoft.com
To view or add a comment, sign in
-
Microsoft has introduced Cross-Tenant Access Settings to address security concerns in cross-company collaboration. This feature offers fine-grained security controls for preventing data exfiltration through user's home identity and foreign identity. The Tenant Restriction v2 (TRv2) feature prevents data leaks when users inside an organization use foreign identities to connect to external tenants. TRv2 works by sending special signals to Entra ID and Microsoft Account to evaluate and block unsanctioned access. There are two flavors of TRv2, Auth Plane TRv2 and Universal TRv2, with the latter providing additional protection against more sophisticated attacks. #CrossTenantAccessSettings #TRv2 #datasecurity
How Tenant Restrictions v2 Can be Used to Prevent Data Exfiltration
techcommunity.microsoft.com
To view or add a comment, sign in
-
Defender for Containers has a new feature called Agentless Discovery for Kubernetes. This allows security-conscious organizations to gain insights into the security landscape of their Kubernetes workloads without the need for additional agents. With Agentless Discovery, users can explore and monitor Kubernetes resources, visualize potential security risks, and evaluate custom security exposure scenarios. It also includes container registry vulnerability assessment. Microsoft has provided a detailed comparison between the agent-based and agentless approaches in a blog post. Users are encouraged to enable the Agentless Discovery extension in their Defender for Containers settings to access these new capabilities. #DefenderForContainers #AgentlessDiscovery #KubernetesSecurity
Agentless Discovery for Kubernetes is now offered as part of Defender for Containers
techcommunity.microsoft.com
To view or add a comment, sign in
-
Intellectual property (IP) theft is a major concern for organizations and nations, with insider threats from employees, contractors, and partners being just as significant as external hackers. CAD files, used for designing models and architecture plans, pose a high risk for IP theft and are difficult to protect with traditional security tools. Protecting CAD files is crucial for maintaining competitive advantage and meeting compliance requirements. NC Protect from archTIS offers advanced data-centric security for CAD files in Microsoft 365 applications, including classification, encryption, watermarking, access restriction, and tracking. The platform helps organizations identify sensitive CAD files, restrict access and actions, and apply digital watermarks for visual reminders of sensitivity. NC Protect supports multiple CAD file formats and is easy to configure and integrate into existing systems. With their innovative solutions, archTIS aims to enhance information protection and prevent data loss and IP theft. #IPtheftprevention #CADfilesecurity #datasecurity #MicrosoftPurview
Protecting and Watermarking CAD files in Microsoft 365
techcommunity.microsoft.com
To view or add a comment, sign in
-
Microsoft Purview is an AI-powered platform that offers classifiers to identify and protect sensitive information at scale. These classifiers are trained and tested on various types of data and provide unparalleled speed and scale. Watch the video and gain insight into new features in Word, SharePoint, OneDrive, and Teams to enhance data security and compliance. Purview offers customizable classifiers and allows users to create their own custom classifiers for document protection. Overall, Microsoft Purview provides intelligent and automated data security for organizations. #MicrosoftPurview #DataSecurity #AI #MicrosoftSecurity
AI-powered Data Classification | Microsoft Purview
techcommunity.microsoft.com
To view or add a comment, sign in
-
Conditional Access overview dashboard and templates aim to help organizations improve their security coverage and gain insights into their security posture. The overview dashboard provides a comprehensive view of Conditional Access policies and identifies any gaps in coverage. It also offers reporting capabilities and helps administrators quickly create new policies using predefined templates. The templates align with Microsoft's recommendations and cover scenarios such as secure foundation, zero trust, remote work, protecting administrators, and emerging threats. Users can give feedback and access more information through the provided links. #MicrosoftSecurity #ConditionalAccessOverview #SecurityPostureInsights #Zerotrust
Conditional Access Overview and Templates are now Generally Available!
techcommunity.microsoft.com
To view or add a comment, sign in
-
The post focuses on Azure Firewall Premium IDPS, which offers advanced threat protection for sensitive industries. It provides over 67,000 signature rules across various detection categories and continuously updates them in real-time. The post also explains how Azure Firewall Premium IDPS can detect and block scanning attacks using tools like Nmap. It demonstrates the setup and configuration of Azure Firewall Premium IDPS and provides insights into monitoring and analyzing logs for potential threats. In conclusion, signature-based IDPS is a crucial component of cybersecurity that helps identify known threats effectively, and Azure Firewall Premium IDPS offers robust protection for Azure environments. #AzureFirewallPremium #Cybersecurity
Intrusion Detection and Prevention System (IDPS) Based on Signatures
techcommunity.microsoft.com
To view or add a comment, sign in
-
Azure OpenAI Private Endpoints are a new solution within the Azure ecosystem that enhance the security of data transmission between Azure resources and OpenAI services. By establishing a private link, these endpoints ensure that data remains shielded from public internet exposure. This comprehensive guide provides step-by-step instructions on setting up and configuring Azure OpenAI Private Endpoints, including creating a VNet, deploying virtual machines, and setting up VNet peering. It also explains how to configure the Private Endpoint and provides considerations for securing access to the endpoint. Overall, Azure OpenAI Private Endpoints play an indispensable role in safeguarding sensitive data in today's interconnected digital landscape. #AzureSecurity #PrivateEndpoints #DataProtection #AzureOpenAI
Azure OpenAI Private Endpoints: Connecting Across VNET’s
techcommunity.microsoft.com
To view or add a comment, sign in