Microsoft Intune announces device-only subscription for shared resources
The meaning of “devices” has evolved in the modern workplace, with IT expected to support not only corporate PCs and bring-your-own (BYO) devices, but also manage kiosks, shared single-purpose devices,...
View ArticleHow to win the latest security race over NTLM relay
Detecting ExchangePriv vulnerability with Azure ATP NTLM relay vulnerability is not a new phenomenon. With the added security mechanisms implemented in signed NTLMv2 making successful attacks seem more...
View ArticleIntroducing Investigation Priority built on User and Entity Behavior Analytics
This post is authored by Itay Argoety, Product Manager, Azure ATP Enterprise security operations (SecOps) often have limited resources and staff, and security analysts face evolving, more sophisticated...
View ArticleUnified SecOps Investigation for Hybrid Environments
This post is authored by Yossi Basha, Senior Program Manager, Azure ATP With 81 percent of security breaches caused by compromised user credentials, identity security is paramount for all...
View ArticleMicrosoft Cloud App Security @RSAC 2019
RSA is the world’s largest cybersecurity conference and a key moment for the industry, which our product team has eagerly been working towards. Today we are excited to announce more than 15 new product...
View ArticleEvolution of macOS management capabilities in Microsoft Intune
Back in 2015 I wrote a blog about Mac management with Intune, however it’s been a few years and I feel it’s time we re-visit Mac management with Intune to learn more about what’s changed. You’ll soon...
View ArticleProtect your data in Box environments with Microsoft Cloud App Security
This article was co-authored by Last week researchers found dozens of companies had inadvertently exposed their sensitive corporate and customer data in their corporate Box accounts, because employees...
View ArticleMicrosoft Intune extends ruggedized Android devices support with Zebra
Microsoft Intune is pleased to announce partnership with Zebra Technologies, a leading manufacturer of ruggedized devices used by several industries such as retail, healthcare, manufacturing,...
View ArticleMicrosoft Intune security tasks extend Microsoft Defender ATP’s Threat &...
Effectively identifying, assessing, and remediating endpoint weaknesses is pivotal in running a healthy security program and reducing organizational risk. Today, we are happy to introduce Microsoft...
View ArticleWhat's new in System Center Configuration Manager and Microsoft Intune:...
As you work to empower your employees to be more productive wherever they are, on the devices of their choice, one of your greatest challenge may be how you manage and secure those known and unknown...
View ArticleAnnouncing general availability for Microsoft Edge mobile app integration...
We are thrilled to announce the upcoming general availability of Microsoft Intune app protection policies in Microsoft Edge for iOS and Android for secure access to internal and external sites. This is...
View ArticleStep 7. Discover shadow IT and take control of your cloud apps: Top 10...
Cloud-based services have significantly increased productivity for today’s workforce, prompting users to adopt new cloud apps and services and making it a challenge for you to keep up. Microsoft Cloud...
View ArticleStep 7. Discover shadow IT and take control of your cloud apps: Top 10...
Cloud-based services have significantly increased productivity for today’s workforce, prompting users to adopt new cloud apps and services and making it a challenge for you to keep up. Microsoft Cloud...
View ArticleStep 6. Manage mobile apps: top 10 actions to secure your environment
In our last blog, Step 5. Set up mobile device management, we introduced ContosoCars to illustrate the journey of implementing Intune as part of your UEM strategy. We continue their story to...
View ArticleSecure your mobile email with Microsoft EMS and Microsoft Outlook for iOS and...
(This post is co-authored by Adrian Moore, Senior Program Manager, and Mayunk Jain, Product Manager, Microsoft 365 Security) Whether you have an official BYOD (bring your own device) policy or not,...
View ArticlePart 3: Intune’s Journey to a Highly Scalable Globally Distributed Cloud Service
Over the last couple months I’ve been writing about Intune’s journey to become a globally scaled cloud service running on Azure. I’m treating this as Part 3 (here’s Part 1 and Part 2) of a 4-part...
View ArticleLDAP Reconnaissance – the foundation of Active Directory attacks
When an attacker manages to break into an on-premises domain environment, one of the first steps they normally take is to gather information and perform domain reconnaissance. Reconnaissance involves...
View ArticleDetecting LDAP based Kerberoasting with Azure ATP
In a typical Kerberoasting attack, attackers exploit LDAP vulnerabilities to generate a list of all user accounts with a Kerberos Service Principal Name (SPN) available. Once successful at listing...
View ArticleMicrosoft Edge on iOS and Android now supports conditional access and single...
Microsoft Enterprise Mobility + Security (EMS) is excited to deliver conditional access protection for Microsoft Edge on iOS and Android. This integration expands your management capabilities as you...
View ArticleMicrosoft expands BitLocker management capabilities for the enterprise
Microsoft is excited to announce enhancements to BitLocker management capabilities in both Microsoft Intune and System Center Configuration Manager (SCCM), coming in the second half of 2019. Whether...
View Article