By Jason Weber, Corporate Vice President and Distinguished Engineer, Microsoft Defender for Endpoint


Critical infrastructure is a key target of both physical and cyberattacks. Microsoft has observed an increase in reported attacks on internet-exposed operational technology (OT) devices that control real-world critical processes—like water and wastewater systems, as well as critical functions across industries including healthcare, manufacturing, energy, and more.1 Our previous Microsoft Digital Defense Reports have shown that unfortunately the security of OT devices has not kept pace with the strengthened security of IT hardware and software. As of July 2024, we had identified and shared more than 300 vulnerabilities in third-party OT applications. The initiative contributed to significant improvements in security across the OT industry.1 It highlights a need for organizations to integrate OT devices into their broader endpoint security strategy.  

We are excited to announce that Gartner has named Microsoft a Leader in the 2025 Gartner® Magic Quadrant™ for Cyber Physical Systems Protection Platforms. Gartner defines cyber-physical systems (CPS) as “engineered systems that orchestrate sensing, computation, control, networking and analytics” that connect the digital and physical worlds. They span industrial control systems (ICS), OT devices, Internet of Things (IoT) devices, and more.   

CPS devices are an inherent component to any security strategy, and as the only security platform vendor now recognized as a Leader in both endpoint and CPS security, it highlights, in our opinion, our commitment to providing customers with holistic endpoint security on any platform. Our cross-platform strategy is key to making continued progress in helping organizations protect their endpoints against the latest, and most sophisticated cyberattacks as they span operating systems and cross into CPS infrastructure, while driving continued efficiency for security operations center (SOC) teams. Read the report here.  

  

Gartner, Magic Quadrant for CPS Protection Platforms, 127 February 2025, By Katell Thielemann, Wam Voster, Ruggero Contu

Meeting the unique OT security needs of organizations in every major industry  

The core of Microsoft’s CPS offering to help secure OT environments is Microsoft Defender for IoT, which provides CPS capabilities though purpose-built sensors, and combined with Defender for Endpoint, helps provide holistic endpoint security to organizations worldwide. Both are native components of our unified security operations platform.  

CPS security is deeply embedded into Microsoft’s approach to securing devices across the platforms our customers operate on. Defender for Endpoint uses its network traffic insights to discover devices that it centralizes in a unified device inventor; we provide holistic vulnerability management for software on both user, as well as CPS devices, and bring information together in a unified incident investigation experience to enable analysts to investigate endpoint-focused attacks end-to-end.

Further, Microsoft is deeply committed to helping customers achieve cost efficiencies through our strategic Microsoft 365 E5 Security bundles, while equally allowing maximum purchasing flexibility through our standalone offers for each solution.  

Secure your enterprise IoT devices with Microsoft Defender for IoT

Innovations that drive better defense strategies  

Over the last 12 months, Microsoft has delivered significant innovations that help defenders gain the upper hand against OT and other cyberthreats including:   

Microsoft’s unified security operations platform brings the foundational tools a SOC needs into a single experience, with a consistent data model, unified capabilities, and broad protection. This unified experience helps SOCs close critical security gaps and streamline their operations, delivering better overall protection, reducing their response time by 88%, and improving overall efficiency.2 Defender for IoT is core to this platform, which combines the power of leading solutions in security information and event management (SIEM), extended detection and response (XDR), and Generative AI for security. It enables security teams to detect and respond to cyberthreats across OT environments and get key insights into their OT security posture, detect cyberthreats, and understand them in context of broader incidents.  

The unified agent combines protection across endpoints, OT devices, identities and data loss prevention (DLP) to help security teams streamline deployment and protection. The sensor is the software component that monitors and protects critical infrastructure, serving as one of the first lines of defense against cyberthreat actors. With our platform approach that brings together Microsoft Sentinel and Microsoft Defender XDRwe now have the first platform-level platform-level agent that unifies protection across four solution areas. The streamlined agent simplifies how you activate and manage core capabilities to more easily and swiftly reap the benefits of our AI-powered protection. Read more about the unified agent platform on the Microsoft Defender for Endpoint blog.  

Circular diagram displaying Unified platform agent in the middle with Endpoints, OT devices, Data loss prevention, and Identities revolving around the exterior. 

Microsoft Security Exposure Management is part of the unified security operations portal and provides a unified view of security posture across company assets and workloads. Security initiatives are an experience that provides a simple way to assess security readiness for a specific security area or workload, and to constantly track and measure exposure risk over time. The OT Securityinitiative improves your OT site security posture by monitoring and protecting OT environments in the organization, and employing network layer monitoring. This initiative identifies devices and ensures that systems are working correctly, and data is protected. Your security teams can use the OT Security initiative to identify unprotected devices and harden posture across sites through vulnerability assessments, with actionable guidance to help remediate at-risk devices. Read more about security initiatives.   

Reduce risk and optimize your security posture with Microsoft Security Exposure Management

Thank you to all our customers. You inspire us as together we work to create a safer world.  

Learn more with Microsoft Security

Visit Microsoft Defender for IoT to learn how your organization can get real-time asset discovery, vulnerability management, and cyberthreat protection for your Internet of Things (IoT) and industrial infrastructure, such as industrial control systems (ICS) and operational technology (OT).   

Are you a regular user of Microsoft Defender for Endpoint or Defender for IoT? Review your experience on Gartner Peer Insights™ and get a $25 gift card.      

To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (Microsoft Security) and X (@MSFTSecurity) for the latest news and updates on cybersecurity.  


1Microsoft Digital Defense Report, Microsoft. 2024.
2The Total Economic Impact™ Of Microsoft SIEM And XDR, August 2022.

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Microsoft.  

Gartner does not endorse any vendor, product, or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.  

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, Magic Quadrant is a registered trademark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved.  

Gartner, Magic Quadrant for CPS Protection Platforms, 17 February 2025, By Katell Thielemann, Wam Voster, Ruggero Contu

By Dasha Zenkovich, Senior Product Marketing Manager

AI adoption is picking up speed. Many companies are growing their technology estates by embracing powerful new solutions like generative AI. But to maximize the benefits of new technology with confidence, security professionals need to stay compliant with the evolving regulatory and audit requirements in the age of AI. It is in this spirit that Microsoft invites you to join us at RSACTM 2025 Conference in San Francisco, where we will showcase end-to-end security designed to help organizations accelerate the secure adoption of AI with ready-to-go security and governance tools and solutions to multiply security teams’ productivity.

Across the Microsoft Security portfolio, our innovations, together with world-class threat and regulatory intelligence, will help give security experts the advantage they need in the era of AI. From our signature Pre-Day to hands-on demos and one-on-one meetings, join the Microsoft experience at RSAC 2025 designed just for you.

A group of men standing around a table with laptops

Microsoft at RSAC

From our signature Pre-Day to hands-on demos and one-on-one meetings, discover how Microsoft Security can give you the advantage you need in the era of AI.

Explore events 

Kick things off at Microsoft Pre-Day

The Microsoft experience at RSAC 2025 begins with Microsoft Pre-Day on Sunday, April 27, 2025, at the Palace Hotel, just around the corner from the Moscone Center. For the fourth year running, the keynote speech held on Microsoft Pre-Day will kick off the full lineup of Microsoft events and activities throughout RSAC 2025. By joining us on Sunday, you’ll have the chance to hear directly from Microsoft Security business leaders—including Vasu Jakkal, Corporate Vice President, Microsoft Security Business; Charlie Bell, Executive Vice President, Microsoft Security; Sherrod DeGrippo, Director of Threat Intelligence Strategy; and other Microsoft Security leaders as they share reporting on emerging cyberthreat trends and the product innovations designed to protect against them. Vasu will also take the RSAC 2025 stage on Day 1 for the conference keynote.

At Pre-Day, attendees will hear Microsoft Security threat intelligence on emerging trends, explore new AI-first tools, demos, and best practices, and attain a better understanding of how Microsoft can help them secure and govern their AI deployments. Attend to discover how the adaptive, end-to-end security platform from Microsoft, including Microsoft Security Copilot, can help your team catch what others miss, speed up remediation, lower your total cost of ownership, and boost—rather than burden—you and your teams.

Stick around after Pre-Day for the reception—an evening of fun, networking, and entertainment, celebrating the vibrant security community. This is a unique opportunity to meet Microsoft security leaders, expand your professional network, and learn how others are addressing the latest security trends and challenges. Light refreshments will be served. CISOs who register to attend Microsoft Pre-Day will automatically be invited to a chief information security officer (CISO) dinner with Vasu Jakkal.  

Make sure to register for Microsoft Pre-Day to join in on all the day’s activities.

Register for Microsoft Pre-Day at RSAC 2025

Dedicated calendar of events for CISOs

Microsoft will be hosting a number of events tailored to CISOs throughout RSAC 2025. To kick off the week, Microsoft will be hosting a Pre-Day, followed by the exclusive CISO dinner on April 27, 2025. Following, there will be daily lunch and learn opportunities that address some of the primary challenges facing CISOs organizations:

  • Monday April 28, 2025: Innovating Securely CISO LunchLearn insights concerning secure innovation centered around the new AI regulations, including the EU Act, Digital Operational Resilience Act (DORA), and more.
  • Tuesday April 29, 2025: SFI Executive Lunch—Open to all and focused around the needs of Latin America-based CISOs, this lunch will bring together leaders and experts interested in understanding the latest Secure Future Initiative (SFI) progress and exchanging their thoughts on related best practices.
  • Wednesday April 30, 2025Embracing Cyber resilience CISO Lunch—Attendees are invited to network, learn, and exchange their insights regarding cyber resilience as the AI landscape evolves.

Finally, CISOs who attend RSAC 2025 are invited to stay through the end of the conference to attend the Microsoft Post-Day Forum at the Microsoft Experience Center at Silicon Valley on Thursday, May 1, 2025, from 9:00 AM PT to 1:00 PM PT. The day will be full of insightful presentations, interactive discussions, networking opportunities, and a curated CISO roundtable session. This informative day will also include an immersive tour of the unique state-of-the-art Microsoft Experience Center, which highlights larger-than-life solutions that show Microsoft’s cutting-edge technology solving many of today’s challenges. This experience is facilitated by envisioning specialists who spark inspired conversations, creative ideas, and new opportunities for leaders to participate in before returning home.

Sign up for Microsoft experiences at RSAC, including the Pre-Day, the CISO dinner, CISO lunch, and the Post-Day Forum. Request a one-on-one meeting with Microsoft experts to discuss your most pressing questions here.

Discover solutions to your challenges during the keynote speech and Microsoft sessions

Vasu Jakkal speaking at RSAC 2024.

As part of the RSAC agenda, Vasu Jakkal will take the stage on Monday, April 28, 2025, at 4:40 PM PT. During the speech, she will discuss the potential of agentic workflows to dramatically reshape the security landscape. Agentic AI has the power to enable more complex problem-solving, deeper agent collaboration, and iterative learning. All of this leads us toward a previously unheard-of new paradigm for security. Join Vasu Jakkal for an imaginative look at the future of AI security agents and how the people of our security teams will work alongside them to change the game.

​After the keynote and throughout the conference, attendees will be able to split their time between the Microsoft Security sessions included in the RSAC 2025 agenda, live demonstrations at booth #5744 in Moscone North, and a variety of roundtables, one-on-one meetings, and presentations at the Microsoft Security Hub at the Palace Hotel.

Here are two sessions not to miss:

  • Tuesday, April 29, 2025, at 9:40 AM PTShaping the Future of Security with Agentic AI​—In a time of rapidly evolving cyberthreats, agentic AI is emerging as a transformative force in security. Join Dorothy Li, Corporate Vice President of Microsoft Security Copilot and Marketplace, to discover how autonomous decision-making is reshaping our approach to cybersecurity. This session will reveal how agentic AI empowers organizations to proactively mitigate risks, enhance operational efficiency, and elevate the effectiveness of your security tools. Attendees will gain actionable insights and practical strategies for harnessing the potential of agentic AI. Prepare to rethink the future of security and position your organization at the forefront of innovation.​
  • Wednesday, April 30, 2025, at 9:40 AM PT: Accelerate AI Adoption with Stronger Security—AI adoption is accelerating, creating both new opportunities and security challenges. Led by Neta Haiby, Partner Product Manager at Microsoft​, this session covers key AI adoption trends, emerging risks, and common cyberthreats. Discover actionable steps to secure and govern AI, from establishing a dedicated security team for AI to adopting AI-specific solutions, ensuring your organization can innovate with confidence.​

Other well-known Microsoft experts will host session sharing what they’ve learned from their work pioneering and securing AI:

  • Wednesday, April 30, 2025 at 8:30 AM PT: Guardians of the Cyber Galaxy: Allies Against AI-Powered Cybercrime by Sean Farrell, Assistant General Counsel, Digital Crimes Unit.
  • Monday, April 28, 2025 at 1:10 PM PT: AI Era Authentication: Securing the Future with Inclusive Identity by Abhilasha Bhargav-Spantzel, Partner Security Architect, and Aditi Shah, Senior Data and Applied Scientist.
  • Tuesday, April 29, 2025, at 8:30 AM PT: AI Safety: Where Do We Go From Here? by Ram Shankar Siva Kumar, Principal Research Lead, AI Red Team Lead.
  • Tuesday, April 29, 2025, at 2:25 PM PT: Lessons Learned from a Year(ish) of Countering Malicious Actors’ Use of AI by Sherrod DeGrippo, Director, Threat intelligence strategy.

View live demonstrations and discover engaging ways to learn at booth #5744

A woman smiling at the Microsoft booth at RSAC 2024.

At the Microsoft booth, attendees will have the chance to engage with experts, discover ready-to-go security and governance tools built for generative AI, and watch theater sessions showcasing the latest products, innovations, and industry perspectives from Microsoft. They’ll also get to enjoy a fun and interactive gaming experience. 

Microsoft product and partner experts will be on hand to showcase the newest advancements through captivating demonstrations, informative videos, and valuable resources. 

Visit the Microsoft booth theater for exclusive 20-minute demos and expert-led sessions on the latest in security and AI. Explore strategies to protect, govern, and secure AI. Listen in to insights on identity, compliance, privacy, threat defense, data protection, and more. Don’t miss this opportunity to learn from industry leaders and stay ahead in the ever-evolving security landscape.

Meetings and connections at the Microsoft Security Hub

The historic and luxurious Palace Hotel is home base for Microsoft during the week. RSAC 2025 attendees are invited to meet with Microsoft experts and executives, attend thought leadership sessions and roundtable lunches, and join networking opportunities. Detailed information about individual sessions can be found on the Microsoft Security Experiences at RSAC 2025 Landing Page.

Customers are also invited to deepen their understanding of the latest cybersecurity threats, trends, and developments by discussing their most important security product and threat intelligence questions directly with Microsoft security experts through scheduled one-on-one meetings, held from Monday, April 28, 2025, to Wednesday, April 30, 2025, at the Palace Hotel. Request your meeting directly through the Microsoft Security Experiences at RSAC 2025 Home Page.

The Microsoft Intelligent Security Association (MISA) will once again have a considerable presence at RSAC 2025. MISA partners will be featured in the Microsoft Booth #5744 and included in other events happening throughout the week. Additionally, the sixth annual Microsoft Security Excellence Awards, presented by MISA, will be held at the Palace Hotel in San Francisco on April 28, 2025, celebrating our finalists and announcing winners in nine award categories as well as enjoying a time of connecting. 

Activities include:

  • MISA demo station: Stop by the Microsoft Booth to explore the innovative solutions developed by MISA members, which integrate Microsoft Security technology.
  • Theater sessions: Attend one or more of our five theater sessions at the Microsoft booth, led by MISA members, focusing on partner strategies and solutions for cyberthreat protection.
  • View the MISA demo and theater schedule.
  • MISA Partner awards: MISA members are invited to attend the Microsoft Security Excellence Awards on Monday, April 28, 2025, where winners will be announced in nine security award categories.

Get the most by staying through Microsoft Post-Day

Microsoft Post-Day Forum is a unique experience designed to help customers, CISOs, and security leaders dive deep into new concepts, ask questions they need answered about product features, and prepare to realize and enable the AI-first, end-to-end security concepts they’ve learned about throughout RSAC 2025. The Microsoft Post-Day Forum, hosted by Microsoft Security executives, will be held on Thursday, May 1, 2025, from 10:00 AM PT to 1:00 PM PT, at the Silicon Valley Experience Center. Pick up for the event will be held at the Palace Hotel at 8:00 AM PT, with drop off organized for 2:00 PM PT.

We look forward to seeing you at RSAC 2025!

Learn more about the Microsoft experience at RSAC 2025

Customers and partners can register for the events highlighted in this blog as well as other Microsoft ancillary events and more here.

Explore Microsoft Security events at RSAC 2025

By Microsoft Threat Intelligence

In mid-November 2024, Microsoft Menace Intelligence noticed the Russian risk actor we observe as Star Blizzard sending their typical targets spear-phishing messages, this time providing the supposed alternative to affix a WhatsApp group. That is the primary time we’ve recognized a shift in Star Blizzard’s longstanding techniques, strategies, and procedures (TTPs) to leverage a brand new entry vector. Star Blizzard’s targets are mostly associated to authorities or diplomacy (each incumbent and former place holders), protection coverage or worldwide relations researchers whose work touches on Russia, and sources of help to Ukraine associated to the battle with Russia.

In our final weblog publish about Star Blizzard, we mentioned how the risk actor focused dozens of civil society organizations—journalists, suppose tanks, and non-governmental organizations (NGOs)—between January 2023 and August 2024 by deploying spear-phishing campaigns to exfiltrate delicate info and intervene of their actions. Since October 3, 2024, Microsoft and the US Division of Justice have seized or taken down greater than 180 web sites associated to that exercise. Whereas this coordinated motion had a short-term affect on Star Blizzard’s phishing operations, we famous on the time that after this risk actor’s lively infrastructure was uncovered, they swiftly transitioned to new domains to proceed their operations, indicating that the risk actor is extremely resilient to operational disruptions.

We assess the risk actor’s shift to compromising WhatsApp accounts is probably going in response to the publicity of their TTPs by Microsoft Menace Intelligence and different organizations, together with nationwide cybersecurity businesses. Whereas this marketing campaign seems to have wound down on the finish of November, we’re highlighting the brand new shift as an indication that the risk actor could possibly be in search of to alter its TTPs to be able to evade detection.

As a part of our steady monitoring, evaluation, and reporting on the risk panorama, we’re sharing our info on Star Blizzard’s newest exercise to lift consciousness of this risk actor’s shift in tradecraft and to teach organizations on harden their assault surfaces towards this and related exercise. We additionally straight notify clients who’ve been focused or compromised, offering them with the required info to assist safe their environments.

Focusing on WhatsApp account information

Star Blizzard’s new spear-phishing marketing campaign, whereas novel in that it makes use of and targets WhatsApp for the primary time, reveals acquainted spear-phishing TTPs for Star Blizzard, with the risk actor initiating e mail contact with their targets, to have interaction them, earlier than sending them a second message containing a malicious hyperlink. The sender tackle utilized by the risk actor on this marketing campaign impersonates a US authorities official, persevering with Star Blizzard’s observe of impersonating recognized political/diplomatic figures, to additional guarantee goal engagement. The preliminary e mail despatched to targets comprises a fast response (QR) code purporting to direct customers to affix a WhatsApp group on “the most recent non-governmental initiatives geared toward supporting Ukraine NGOs.” This code, nonetheless, is deliberately damaged and won’t direct the consumer in the direction of any legitimate area; that is an effort to coax the goal recipient into responding.

A close-up of a text
Determine 1. Star Blizzard preliminary spear-phishing e mail with damaged QR code

When the recipient responds, Star Blizzard sends a second e mail containing a Protected Hyperlinks-wrapped t[.]ly shortened hyperlink as the choice hyperlink to affix the WhatsApp group.

A black text on a white background
Determine 2. Star Blizzard follow-on spear-phishing e mail with URL hyperlink

When this hyperlink is adopted, the goal is redirected to a webpage asking them to scan a QR code to affix the group. Nonetheless, this QR code is definitely utilized by WhatsApp to attach an account to a linked machine and/or the WhatsApp Internet portal. Because of this if the goal follows the directions on this web page, the risk actor can achieve entry to the messages of their WhatsApp account and have the aptitude to exfiltrate this information utilizing current browser plugins, that are designed for exporting WhatsApp messages from an account accessed through WhatsApp Internet.

Screenshot of the phish attempt displaying a legitimate WhatsApp webpage called To join the US-Ukraine NGOs Group, followed by instructions directing the user to scan the redacted QR code to link their device.
Determine 3. Malicious Star Blizzard phish try utilizing WhatsApp linking QR code

Whereas this marketing campaign was restricted and appeared to have terminated on the finish of November, it nonetheless marked a break in long-standing Star Blizzard TTPs and highlighted the risk actor’s tenacity in persevering with spear-phishing campaigns to achieve entry to delicate info even within the face of repeated degradations of their operations.

Microsoft Menace Intelligence recommends that each one e mail customers belonging to sectors that Star Blizzard sometimes targets all the time stay vigilant when coping with e mail, particularly emails containing hyperlinks to exterior assets. These targets are mostly associated to:

  • Authorities or diplomacy (incumbent and former place holders)
  • Analysis into protection coverage or worldwide relations when associated to Russia
  • Help to Ukraine associated to the continuing battle with Russia

When doubtful, contact the particular person you suppose is sending the e-mail utilizing a recognized and beforehand used e mail tackle to confirm that the e-mail was certainly despatched by them.

Mitigations

To harden networks towards the Star Blizzard exercise listed above, defenders can implement the next:

  • Implement Microsoft Defender for Endpoint on Android and iOS, which incorporates anti-phishing capabilities that additionally apply to QR code phishing assaults, blocking phishing websites from being accessed. 
  • Enable network protection in Microsoft Defender for Endpoint
  • Make sure that tamper protection is enabled in Microsoft Dender for Endpoint
  • Run endpoint detection and response in block mode in order that Microsoft Defender for Endpoint can block malicious artifacts, even when your non-Microsoft antivirus doesn’t detect the risk or when Microsoft Defender Antivirus is operating in passive mode.
  • Configure investigation and remediation in full automated mode to let Microsoft Defender for Endpoint take speedy motion on alerts to resolve breaches, considerably decreasing alert quantity.
  • Turn on PUA protection in block mode in Microsoft Defender Antivirus
  • Activate cloud-delivered protection in Microsoft Defender Antivirus or the equal on your antivirus product to cowl quickly evolving attacker instruments and strategies.
  • Activate Microsoft Defender Antivirus real-time protection.
  • Encourage customers to make use of Microsoft Edge and different internet browsers that help SmartScreen, which identifies and blocks malicious web sites, together with phishing websites, rip-off websites, and websites that host malware.
  • Activate Safe Links and Safe Attachments for Workplace 365.
  • Use the Attack Simulator in Microsoft Defender for Workplace 365 to run lifelike, but protected, simulated phishing and password assault campaigns. Make the most of the QR code payload in assault simulation coaching eventualities to reflect Star Blizzard’s and different risk actor’s QR code spear-phishing strategies.

Microsoft Defender XDR detections

Microsoft Defender XDR clients can consult with the listing of relevant detections beneath. Microsoft Defender XDR coordinates detection, prevention, investigation, and response throughout endpoints, identities, e mail, apps to offer built-in safety towards assaults just like the risk mentioned on this weblog.

Prospects with provisioned entry may also use Microsoft Security Copilot in Microsoft Defender to analyze and reply to incidents, hunt for threats, and defend their group with related risk intelligence.

Microsoft Defender for Endpoint

The next alerts may point out risk exercise related to this risk. These alerts, nonetheless, might be triggered by unrelated risk exercise and usually are not monitored within the standing playing cards supplied with this report.

  • Star Blizzard exercise group

Searching queries

Microsoft Defender XDR

Floor occasions which will have communicated with the Star Blizzard C2s

let domainList = dynamic(["civilstructgeo.org", "aerofluidthermo.org"]);union(    DnsEvents    | the place QueryType has_any(domainList) or Identify has_any(domainList)    | venture TimeGenerated, Area = QueryType, SourceTable = "DnsEvents"),(    IdentityQueryEvents    | the place QueryTarget has_any(domainList)    | venture Timestamp, Area = QueryTarget, SourceTable = "IdentityQueryEvents"),(    DeviceNetworkEvents    | the place RemoteUrl has_any(domainList)    | venture Timestamp, Area = RemoteUrl, SourceTable = "DeviceNetworkEvents"),(    DeviceNetworkInfo    | prolong DnsAddresses = parse_json(DnsAddresses), ConnectedNetworks = parse_json(ConnectedNetworks)    | mv-expand DnsAddresses, ConnectedNetworks    | the place DnsAddresses has_any(domainList) or ConnectedNetworks.Identify has_any(domainList)    | venture Timestamp, Area = coalesce(DnsAddresses, ConnectedNetworks.Identify), SourceTable = "DeviceNetworkInfo"),(    VMConnection    | prolong RemoteDnsQuestions = parse_json(RemoteDnsQuestions), RemoteDnsCanonicalNames = parse_json(RemoteDnsCanonicalNames)    | mv-expand RemoteDnsQuestions, RemoteDnsCanonicalNames    | the place RemoteDnsQuestions has_any(domainList) or RemoteDnsCanonicalNames has_any(domainList)    | venture TimeGenerated, Area = coalesce(RemoteDnsQuestions, RemoteDnsCanonicalNames), SourceTable = "VMConnection"),(    W3CIISLog    | the place csHost has_any(domainList) or csReferer has_any(domainList)    | venture TimeGenerated, Area = coalesce(csHost, csReferer), SourceTable = "W3CIISLog"),(    EmailUrlInfo    | the place UrlDomain has_any(domainList)    | venture Timestamp, Area = UrlDomain, SourceTable = "EmailUrlInfo"),(    UrlClickEvents    | the place Url has_any(domainList)    | venture Timestamp, Area = Url, SourceTable = "UrlClickEvents")| order by TimeGenerated desc

Microsoft Sentinel

Microsoft Sentinel clients can use the TI Mapping analytics (a collection of analytics all prefixed with ‘TI map’) to mechanically match the malicious area indicators talked about on this weblog publish with information of their workspace. If the TI Map analytics usually are not presently deployed, clients can set up the Menace Intelligence answer from the Microsoft Sentinel Content Hub to have the analytics rule deployed of their Sentinel workspace.

Whereas the beneath queries usually are not linked to any particular risk actor, they’re efficient in detecting potential phishing makes an attempt. Implementing these queries may also help you keep vigilant and safeguard your group from phishing assaults

Microsoft Safety Copilot

Safety Copilot clients can use the standalone expertise to create their own prompts or run the next pre-built promptbooks to automate incident response or investigation duties associated to this risk:

  • Incident investigation
  • Microsoft Consumer evaluation
  • Menace actor profile
  • Menace Intelligence 360 report primarily based on MDTI article

Notice that some promptbooks require entry to plugins for Microsoft merchandise equivalent to Microsoft Defender XDR or Microsoft Sentinel.

Menace intelligence reviews

Microsoft clients can use the next reviews in Microsoft merchandise to get probably the most up-to-date details about the risk actor, malicious exercise, and strategies mentioned on this weblog. These reviews present the intelligence, safety info, and really helpful actions to forestall, mitigate, or reply to related threats present in buyer environments.

Microsoft Defender Menace Intelligence

Microsoft Safety Copilot clients may also use the Microsoft Security Copilot integration in Microsoft Defender Menace Intelligence, both within the Safety Copilot standalone portal or within the embedded experience within the Microsoft Defender portal to get extra details about this risk actor.

Indicators of compromise

IndicatorSortFinal seen
civilstructgeo[.]orgAreaOctober 2024
aerofluidthermo[.]orgAreaOctober 2024

References

Study extra

For additional info on the threats detailed on this weblog publish, refer to those further Microsoft blogs:

For the most recent safety analysis from the Microsoft Menace Intelligence group, try the Microsoft Menace Intelligence Weblog: https://aka.ms/threatintelblog.

To get notified about new publications and to affix discussions on social media, comply with us on LinkedIn at https://www.linkedin.com/showcase/microsoft-threat-intelligence, and on X (previously Twitter) at https://twitter.com/MsftSecIntel.

To listen to tales and insights from the Microsoft Menace Intelligence group in regards to the ever-evolving risk panorama, hearken to the Microsoft Menace Intelligence podcast: https://thecyberwire.com/podcasts/microsoft-threat-intelligence.

By Benjamin Lim, Director, Microsoft Safety Occasions

Inspiration can spark immediately once you’re at a convention. Maybe you uncover a brand new instrument throughout a keynote that might prevent hours of time. Or possibly a peer shares a narrative over espresso that makes you rethink an strategy. One dialog, one session, or one occasion may offer you recent concepts, renewed pleasure, and a imaginative and prescient for what to do subsequent.

Within the present AI panorama, inspiration and knowledge are extra vital than ever for safety professionals to remain forward of risk actors. So when you’re seeking to enhance your abilities and keep forward of the risk panorama, be a part of Microsoft Safety on the prime cybersecurity occasions in 2025.

Whether or not you be a part of us at an business staple like RSAC or one among our personal occasions like Microsoft Safe, you’ll be able to profit in a number of key methods:

  • Get insights and techniques wanted to beat obstacles and drive your safety initiatives ahead with confidence.
  • See reside demos of the most recent merchandise, product options, abilities, and instruments you should utilize in your work. Be among the many first to listen to about Microsoft Safety improvements, corresponding to Microsoft’s Safe Future Initiative and XSPA (cross-site port assault) updates attendees of Microsoft Ignite 2024 heard.
  • Study from Microsoft Safety consultants on international risk intelligence.
  • Community with different like-minded safety professionals, be taught greatest practices out of your friends, and meet one-on-one with our consultants.

No matter your function, there’s an occasion for you and a path to efficiently safeguarding your group.

A group of men standing around a table with laptops

Microsoft at RSAC

From our signature Pre-Day to hands-on demos and one-on-one conferences, uncover how Microsoft Safety can provide the benefit you want within the period of AI.

Register now 

Conferences to encourage and have interaction everybody

Large crowd of people attending Microsoft Ignite in Chicago, November 2024.

Safety professionals of all ranges can profit from attending one of many greatest cybersecurity occasions, together with RSAC, Black Hat, plus two premier Microsoft occasions—Microsoft Safe (digital) and Microsoft Ignite (in-person and digital). If you happen to love being the primary to listen to about Microsoft product improvements, don’t miss these Microsoft occasions with insights each safety skilled can put to good use.

Microsoft Safe

Date: April 9, 2025
Location: On-line solely

Microsoft Safe is Microsoft’s cybersecurity convention. This 12 months’s one-hour digital showcase will highlight AI-first, end-to-end safety improvements with clear use circumstances and buyer tales of how they use our instruments every day. Attendees will deep-dive into cybersecurity merchandise and techniques together with hundreds of different cybersecurity professionals.

RSAC

Dates: April 27-Could 1, 2025
Location: San Francisco, CA

RSAC 2025 is a can’t-miss safety convention, bringing collectively greater than 40,000 safety professionals to debate the most recent cybersecurity challenges and innovation with one of the best of one of the best. With the theme of “Many Voices. One Neighborhood,” RSAC will function keynotes, monitor classes, interactive classes, networking alternatives, and an expo designed to foster superior safety methods.

All through RSAC, Microsoft Safety will showcase end-to-end safety improvements and share world class risk and regulatory intelligence to provide the benefit you want within the period of AI. From our signature Pre-Day to hands-on demos and one-on-one conferences, uncover how Microsoft Safety can provide the benefit you want within the period of AI.​ Try the full Microsoft at RSAC experience.

Learn more about the Microsoft Events at RSA Conference 2025

Black Hat

Dates: August 2-7, 2025
Location: Las Vegas, NV

The Black Hat Conference is a premier studying occasion within the cybersecurity business, identified for its in-depth technical classes and cutting-edge analysis displays on subjects like essential infrastructure and knowledge safety analysis information.

Microsoft is a key sponsor of the convention annually, the place we showcase our newest discoveries and AI analysis on real-world issues and options. Final 12 months, our AI Pink Teaming in Follow coaching classes and our AI Summit roundtables have been successful. Black Hat can also be identified for its safety group celebrations, together with the Cybersecurity Lady of the 12 months Awards and the Researcher celebrations, which we participate in yearly.

Learn more about the Black Hat Conference 2025

Microsoft Ignite

Dates: November 17-21, 2025
Location: San Francisco, CA, and on-line

Microsoft Ignite is Microsoft’s greatest annual convention for builders, IT professionals, enterprise leaders, safety professionals, and companions. Hundreds of safety professionals such as you attend yearly to listen to the most important safety product bulletins from Microsoft Safety and acquire coaching and skilling to organize for future developments in AI. Safety professionals of all ranges can be a part of interactive labs, workshops, keynotes, technical breakout classes, demos, and extra, led by Microsoft Safety leaders and consultants.

Over the previous few years, we’ve actually boosted Microsoft Safety experiences at Microsoft Ignite. Final 12 months, we hosted the Microsoft Ignite Safety Discussion board for safety leaders and two workshops on AI crimson teaming and Microsoft 365 Copilot deployment. Plus, we hosted greater than 30 sessions demoing new options that will help you safe your setting, use your favourite Microsoft instruments safely and securely, and ensure your organizational processes prioritize safety first.

If you happen to attend Microsoft Ignite in particular person this 12 months, you gained’t need to miss our Safety Leaders Dinner or the safety group social gathering. If you happen to’re not capable of attend in particular person, you’ll be able to register for our digital occasion.​ Signal as much as be taught extra.

Learn more about Microsoft Ignite 2025

Occasions for safety leaders and decision-makers

A woman presenting during the Microsoft AI Tour.

Microsoft AI Tour

Dates: By way of Could 30, 2025
Location: A number of worldwide

The Microsoft AI Tour is a free, one-day occasion for executives that explores the methods AI can drive progress and create lasting worth in a number of cities across the globe. Whether or not you’re a purposeful decision-maker who evaluates investments, an IT staff member charged with safety, or a CISO revamping your safety technique, there can be useful safety content material tailor-made to your wants.

Microsoft Safety’s prime enterprise leaders attend AI tour places worldwide to share with you the way Microsoft Security Copilot enables you to shield on the velocity and scale of AI. They’re additionally out there to fulfill with you.

Reserve your spot at an event near you

Occasion locationOccasion date
Dubai, United Arab EmiratesFebruary 6, 2025
Singapore, Southeast AsiaFebruary 19, 2025
Tokyo, JapanFebruary 26-27, 2025
London, United KingdomMarch 5, 2025
Brussels, BelgiumMarch 25, 2025
Seoul, South KoreaMarch 26, 2025
Paris, FranceMarch 26, 2025
Madrid, SpainMarch 27, 2025
Tokyo, JapanMarch 27, 2025
Beijing, ChinaApril 23, 2025
Athens, GreeceCould 27-30, 2025

Gartner Safety and Danger Administration Summit

Dates: June 11th of September, 2025
Location: Nationwide Harbor, MD

The Gartner Security and Risk Management Summit (Gartner SRM) explores traits in cybersecurity threat administration, together with the combination of generative AI, being an efficient CISO, the significance of balancing response and restoration efforts with prevention, combating misinformation, and shutting the cybersecurity abilities hole to construct a resilient workforce.

Microsoft Safety executives host classes at Gartner SRM that will help you make sure the safety of AI techniques and undertake AI to drive innovation and effectivity. Our hottest subjects focus on securing and governing AI.

Learn more about the Gartner Security and Risk Management Summit

Occasions for technical and safety practitioners

People attending the Microsoft booth at RSAC 2024.

Safety groups search for conferences that present specialised data on the business by which they work or on a slender cybersecurity matter.

Legalweek

Dates: March 24-27, 2025
Location: New York, NY

Legalweek is a weeklong convention the place roughly 6,000 members of the authorized group will collect to community with their friends, discover rising traits, highlight the most recent tech, and provide a roadmap by way of business shifts. Matters explored at previous Legalweek conferences embrace the moral and regulatory influence of utilizing your knowledge to coach AI, litigation within the age of cybersecurity, and maximizing effectivity and authorized automation.  

This 12 months, we’ll be sponsoring three classes on AI and one on collaboration in advanced litigation. As in years previous, Microsoft is internet hosting an Government Breakfast at Legalweek from 7:30 AM ET-8:45 AM ET on Tuesday, March 25, 2025. RSVP today and cease by Sales space #3103 in New York Hilton Midtown Americas Corridor 2 to be taught extra in regards to the newest Microsoft Purview improvements. If you happen to’d like to fulfill with our staff whereas at Legalweek, sign up for a one-on-one meeting.

Learn more about Legalweek 2025

Identiverse

Dates: June 3-6, 2025
Location: Las Vegas, NV

Limiting entry to AI, apps, and assets to these with the correct permissions is a vital a part of safety. The Identiverse conference supplies schooling, collaboration, and perception into the way forward for identification safety. Greater than 2,500 attendees will share insights, develop new concepts, and advance the state of contemporary digital identification and safety.

The occasion options classes on greatest practices, business traits, and newest applied sciences; an exhibition corridor to showcase the most recent identification answer improvements; and networking alternatives. Microsoft will host a sales space the place attendees can join with Microsoft Safety consultants and leaders.

Learn more about Identiverse 2025

Occasions for builders

The cybersecurity expertise scarcity is requiring many to step up even when cybersecurity isn’t of their official job description. In case you are an IT skilled being tasked with cybersecurity or somebody with an eagerness to be taught cybersecurity ways, be a part of our Microsoft occasions geared toward serving to you uplevel your cybersecurity abilities.

Microsoft Construct

Dates: Could 19-22, 2025
Location: Seattle, WA

Safety is a staff sport and builders are more and more the primary string staff members who construct safety into the event of functions. Microsoft Build Conference 2025 is Microsoft’s developer-focused occasion. It should showcase thrilling updates and improvements from Microsoft Safety for builders to create AI-enabled safety options for his or her organizations.

The occasion consists of connection alternatives, demos, and security-focused classes. Previous subjects have included utilizing AI to speed up improvement processes, instruments for enhancing the developer expertise, and techniques for constructing within the cloud. Keep updated on Microsoft Construct information and find out when registration is open.

Learn more about the Microsoft Build Conference 2025

Discover your inspiration at an occasion this 12 months

Cybersecurity occasions foster a tradition of steady studying and adaptation, empowering you to remain forward of rising cyberthreats and keep a resilient safety posture. The concepts will stream freely at these occasions. Whether or not you attend one of many greatest conferences of the 12 months or a smaller occasion (or each), you’ll be in good firm. Microsoft Safety can be there be, too, excited to share and wanting to be taught.

Hope to see you at a future occasion!

To be taught extra about Microsoft Safety options, go to our website. Bookmark the Security blog to maintain up with our professional protection on safety issues. Additionally, comply with us on LinkedIn (Microsoft Security) and X (@MSFTSecurity) for the most recent information and updates on cybersecurity.

By Scott Woodgate, General Manager, Threat Protection

As October draws to a close, marking 21 years of Cybersecurity Awareness Month, cyberattacks continue to be a challenge for businesses of all sizes, however, small and medium businesses (SMBs) face distinct challenges when it comes to cybersecurity. Although SMBs face heightened cybersecurity threats, unlike large enterprises, they often lack the resources and expertise to implement extensive security measures or manage complex security solutions, making them prime targets for bad actors. Both the risks that SMBs face and their current level of security readiness are not widely understood.

To help us better understand the SMB security needs and trends, Microsoft partnered with Bredin, a company specializing in SMB research and insights, to conduct a survey focused on security for businesses with 25 to 299 employees. As we share these insights below, and initial actions that can take to address them, SMBs can also find additional best practices to stay secure in the Be Cybersmart Kit.  

Decorative image of three bars - one blue, one yellow, and one green

SMB Cybersecurity Research Report

Read the full report to learn more about how security is continuing to play an important role for SMBs.

Discover more 

Graphic of 7 top 7 cybersecurity trends for small and medium sized businesses

1. One in three SMBs have been victims of a cyberattack 

With cyberattacks on the rise, SMBs are increasingly affected. Research shows that 31% of SMBs have been victims of cyberattacks such as ransomware, phishing, or data breaches. Despite this, many SMBs still hold misconceptions that increase their risk and vulnerability. Some believe they are too small to be targeted by hackers or assume that compliance equates to security. It is crucial to understand that bad actors pose a threat to businesses of all sizes, and complacency in cybersecurity can lead to significant risks. 

How can SMBs approach this?

Microsoft, in collaborating with the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA), has outlined four simple best practices to creates a strong cybersecurity foundation.

  • Use strong passwords and consider a password manager.
  • Turn on multifactor authentication.
  • Learn to recognize and report phishing.
  • Make sure to keep your software updated.
Graphic of 1 in 3 of all SMBs have experienced of a cyberattack

2. Cyberattacks cost SMBs more than $250,000 on average and up to $7,000,000 

The unexpected costs of a cyberattack can be devastating for an SMB and make it difficult to financially recover from. These costs can include expenses incurred for investigation and recovery efforts to resolve the incident, and associated fines related to a data breach. Cyberattacks not only present an immediate financial strain but can also have longer term impacts on an SMB. Diminished customer trust due to a cyberattack can cause broader reputational damage and lead to missed business opportunities in the future. It’s difficult to anticipate the impact of a cyberattack because the time it takes to recover can vary from one day to more than a month. While many SMBs are optimistic about their ability to withstand a cyberattack, some fail to accurately estimate the time needed to restore operations and resume normal business activities 

How can SMBs approach this?

SMBs can conduct a cybersecurity risk assessment to understand gaps in security and determine steps to resolve them. These assessments can help SMBs uncover areas open to attack to minimize them, ensure compliance with regulatory requirements, establish incident response plans, and more. Effectively and proactively planning can help minimize the financial, reputational, and operational costs associated with a cyberattack should one happen. Many organizations provide self-service assessments, and working with a security specialist or security service provider can bring additional expertise and guidance through the process as needed.

Graphic of The average cost of an attack for SMBs is over $250,000

3. 81% of SMBs believe AI increases the need for additional security controls

The rapid advancement of AI technologies and the ease of use through simple user interfaces creates notable challenges for SMBs when used by employees. Without the proper tools in place to secure company data, AI use can lead to sensitive or confidential information getting in the wrong hands. Fortunately, more than half of companies currently not using AI security tools intend to implement them within the next six months for more advanced security. 

How can SMBs approach this?

Data security and data governance play a critical role in successful adoption and use of AI. Data security, which includes labeling and encrypting documents and information, can mitigate the chance of restricted information being referenced in AI prompts. Data governance, or the process of managing, understanding, and securing data, can help establish a framework to effectively organize data within.

Graphic of 81% of SMBs believe AI increases the need for additional security controls

4. 94% consider cybersecurity critical to their business 

Recognizing the critical importance of cybersecurity, 94% of SMBs consider it essential to their operations. While it was not always considered a top priority given limited resources and in-house expertise, the rise in cyberthreats and increased sophistication of cyberattacks now pose significant risks for SMBs that is largely recognized across the SMB space. Managing work data on personal devices, ransomware, and phishing and more are cited as top challenges that SMBs are facing. 

How can SMBs approach this?

For SMBs that want to get started with available resources to train and educate employees, security topics across Cybersecurity 101Phishing, and more are provided through Microsoft’s Cybersecurity Awareness site.

Graphic of 94% of SMBs consider cybersecurity critical to their companies

5. Less than 30% of SMBs manage their security in-house 

Given the limited resources and in-house expertise within SMBs, many turn to security specialists for assistance. Less than 30% of SMBs manage security in-house and generally rely on security consultants or service providers to manage security needs. These security professionals provide crucial support in researching, selecting, and implementing cybersecurity solutions, ensuring that SMBs are protected from new threats. 

How can SMBs approach this?

Hiring a Managed Service Provider (MSP) is commonly used to supplement internal business operations. MSPs are organizations that help manage broad IT services, including security, and serve as strategic partners to improve efficiency and oversee day-to-day IT activities. Examples of security support can consist of researching and identifying the right security solution for a business based on specific needs and requirements. Additionally, MSPs can implement and manage the solution by configuring security policies and responding to incidents on the SMBs behalf. This model allows more time for SMBs to focus on core business objectives while MSPs keep the business protected.

Graphic of Less than 30% of SMBs manage their security in-house

6. 80% intend to increase their cybersecurity spending, with data protection as top area of spend 

Given the heightened importance of security, 80% of SMBs intend to increase cybersecurity spending. Top motivators are protection from financial losses and safeguards for client and customer data. It’s no surprise that data protection comes in as the top investment area with 65% of SMBs saying that is where increased spending will be allocated, validating the need for additional security with the rise of AI. Other top areas of spending include firewall services, phishing protection, ransomware and device protection, access control, and identity management.  

How can SMBs approach this?

Prioritizing these investments in the areas above, SMBs can improve security posture and reduce the risk of cyberattacks. Solutions such as Data Loss Prevention (DLP) help identify suspicious activity and prevent sensitive data from leaving leaking outside of the business, Endpoint Detection and Response (EDR) help protect devices and defend against threats, and Identity and Access Management (IAM) help ensure only the right people get access to the right information.

Graphic of 80% of SMBs intend to increase their cybersecurity spending

7. 68% of SMBs consider secure data access a challenge for remote workers 

The transition to hybrid work models has brought new security challenges for SMBs, and these issues will continue as hybrid work becomes a permanent fixture. With 68% of SMBs employing remote or hybrid workers, ensuring secure access for remote employees is increasingly critical. A significant 75% of SMBs are concerned about data loss on personal devices. To safeguard sensitive information in a hybrid work setting, it is vital to implement device security and management solutions so employees can securely work from anywhere.  

How can SMBs approach this?

Implement measures to protect data and internet-connected devices that include installing software updates immediately, ensuring mobile applications are downloaded from legitimate app stores, and refraining from sharing credentials over email or text, and only doing so over the phone in real-time.

Graphic of 68% of SMBs find secure data access for remote workers a challenge

1000’s of safety professionals will be part of us for Microsoft Ignite 2023 from November 14 to 17, 2023, the place we’ll share the best way to embrace the AI period confidently, with safety for folks, knowledge, units, and apps that extends throughout clouds and platforms. With greater than 45 safety periods, there are numerous thrilling keynotes, breakouts, and demonstrations to fill your time. That will help you navigate the Microsoft Safety expertise at Microsoft Ignite, we’ve put collectively a information of featured periods for safety professionals of all ranges, whether or not you’re attending in individual or on-line.  

Whereas our in-person tickets have offered out, registration for the digital occasion continues to be obtainable to take part within the Microsoft Safety expertise at Microsoft Ignite, which incorporates periods on safety methods and sensible functions. In each tracks,​ you’ll be taught concerning the newest improvements and implementation methods from Microsoft Safety throughout complete safety, unified visibility, and Microsoft Safety Copilot. Preserve studying this weblog submit for concepts on keynotes, breakout periods, and discussions to take a look at. Register to browse our session catalog and bookmark periods you’d prefer to attend.

Catch the information highlights throughout our keynote

Our announcement-packed keynote from Charlie Bell, Govt Vice President, Microsoft Safety, and Vasu Jakkal, Company Vice President, Safety, Compliance, Id, and Administration, Microsoft, might be highlighted on Day 2 of Microsoft Ignite. Don’t miss insights from them throughout their keynote, “The Future of Security with AI.” They are going to share how Microsoft is delivering AI for safety with Microsoft Security Copilot, and the way we allow organizations to safe and govern AI with new capabilities. This new period of AI affords unprecedented alternatives to raise human potential but additionally challenges organizations with unknowns and dangers.

Register for Microsoft Ignite Security sessions

Be taught safety methods for as we speak’s and tomorrow’s challenges 

Our cybersecurity technique periods are centered on equipping you to leverage AI and Microsoft Safety options to strengthen your risk protection technique. Be part of these periods to take your methods to the following stage throughout identification safety, code-to-cloud approaches, business finest practices for AI, and the newest learnings in risk intelligence.   

Technique periods to contemplate becoming a member of embrace:

  • How we secure the Microsoft estate (BRK291H: in-person and on-line): Be part of a hearth chat with Bret Arsenault, Company Vice President and Chief Info Safety Officer, on Microsoft’s strategy to safety and the way Microsoft plans to adapt because the business continues to embrace the brand new period of AI.
  • Boosting ID Protection Amid Sophisticated Attacks (BRK294H: in-person and on-line): Alex Weinert, Vice President, Id Safety, and Mia Reyes, Director, Foundational Safety—Cybersecurity, will supply a deep dive into the escalating panorama of cyberthreats focusing on digital identities amid the evolving tech realms of the Web of Issues, operational expertise, and hybrid workspaces. Study innovation in automated key administration and {Hardware} Safety Modules for fortified key storage, essential in mitigating human errors and bolstering defenses in opposition to refined aggressors.
  • This Year In Threats: Tales From Microsoft’s Global Fight Against APTs” (BRK299: in-person solely): Sherrod DeGrippo, Director of Risk Intelligence, and John Lambert, Company Vice President, Distinguished Engineer, Microsoft Safety Analysis, will talk about how Microsoft defends prospects on the nexus of the cyber and bodily worlds and the way they’ll be part of our international alliance to assist in giving unhealthy actors nowhere to cover. This 12 months, Microsoft Risk Intelligence stood with its companions on the forefront of the worldwide response to probably the most impactful threats and incidents. On this session, look again on the risk actors and campaigns that outlined 2023 and listen to our consultants inform their favourite tales from the entrance line.
  • Secure access in the AI era: What’s new in Microsoft Entra (BRK297H: in-person and on-line): Jade D’Souza, Product Supervisor; John Savill, Cloud Answer Architect; and Pleasure Chik, President, Id and Community Entry, will supply particulars on improvements for Microsoft Entra ID (previously Azure Lively Listing) that may enable you to robotically forestall identification compromise, implement granular entry insurance policies, govern permissions, and leverage AI to safe entry for anybody to something from wherever. This demo-centric session will observe an worker as they onboard, entry sources, and collaborate.
  • Unifying XDR + SIEM: A new era in SecOps” (BRK293H: in-person and on-line): Preeti Krishna, Principal Product Supervisor, and Rob Lefferts, Company Vice President, Microsoft Risk Safety, will supply insights on how the newest improvements in generative AI, computerized assault disruption, embedded risk intelligence, decoy property, a reimagined consumer interface, and cloud posture administration capabilities will supercharge your risk detection, response, and protection.
  • Secure and govern your data in the era of AI” (BRK296H: in-person and on-line): Erin Miyake, Principal Product Supervisor; Herain Oberoi, Advertising Chief; Tina Ying, Senior Product Advertising Supervisor, Insider Danger Administration; and Rudra Mitra, Company Vice President, Microsoft Information Safety and Compliance, will reveal how Microsoft Purview’s complete strategy to knowledge safety, compliance, and privateness helps empower organizations to guard and govern their knowledge.
  • Security for AI: Prepare, protect, and defend in the AI era” (BRK298H: in-person and on-line): Douglas Santos, Senior Product Supervisor; Maithili Dandige, Associate Group Program Supervisor, Microsoft 365 Safety and Compliance; and Shilpa Bothra, Senior Product Advertising Supervisor, will talk about the significance of stopping delicate knowledge leaks in AI as third-party AI apps develop exponentially and hackers proceed to launch adversarial assaults utilizing generative AI. Depart this session with a stable protection and methods to safe knowledge as you work together with AI utilizing Microsoft’s complete safety suite.

Achieve sensible functions with in-depth product views

When strategizing a safety strategy, expertise options play a vital position. That will help you turn into an professional on safety options and implement new options inside your group, Microsoft Ignite will embrace periods exploring the use instances of Microsoft options, together with Safety Copilot, Microsoft Entra, Microsoft Purview, and Microsoft Intune.

Sensible utility periods to contemplate becoming a member of embrace:

  • Boost multicloud security with a comprehensive code to cloud strategy” (BRK261H: in-person and on-line): Safeena Begum, Principal Product Supervisor, and Yuri Diogenes, Principal Product Supervisor, will discuss how Microsoft Defender for Cloud may also help you fortify your defenses and improve your incident response technique with cloud safety graphic insights and tailor-made analytics from Defender for Cloud workload safety plans.
  • Fortified security and simplicity come together with Microsoft Intune” (BRK263H: in-person and on-line): Archana Devi Sunder Rajan, Associate Group Product Supervisor, Microsoft Intune; Dilip Radhakrishnan, Associate Group Product Supervisor, Microsoft Intune; Jason Roszak, Chief Product Officer, Microsoft Intune; and Sangeetha Visweswaran, Associate Director of Engineering, will talk about how the following era of endpoint administration and safety capabilities from Microsoft Intune assist remodel safety and IT operations. Learn to simplify app updates, reduce the price of public key infrastructure lifecycle administration, mitigate dangers with AI-derived insights, and unencumber sources by automating IT workflows.
  • Modern management innovation shaping endpoint security (BRK295H: in-person and on-line): Jeff Pinkston, Director of Engineering; Ramya Chitrakar, Company Vice President, Intune Engineering; and Steve Dispensa, Company Vice President, will discover the best way to defend in opposition to the evolving sophistication of cyberthreats whereas guaranteeing a productive workforce. The most recent wave of Microsoft Intune innovation can form your defense-in-depth technique for a safe and productive finish consumer computing property.
  • Beyond traditional DLP: Comprehensive and AI-powered data security” (BRK262H: in-person and on-line): Maithili Dandige, Shilpa Bothra, and Talhah Mir, Product Supervisor, will share how AI-powered Microsoft Purview Info Safety and Microsoft Purview Insider Danger Administration can remodel your knowledge loss prevention (DLP) program, enabling Adaptive Safety and fortifying your knowledge safety posture. Additionally, you will hear about new options that improve incident response and increase endpoint protection and achieve insights on the best way to improve their knowledge safety methods.
  • How Microsoft Purview helps you protect your data” (OD07: on-line solely): Anna Chiang, Senior Product Advertising Supervisor, and Tony Themelis, Principal Product Supervisor, will discover organizational paradoxes and the way Microsoft Purview may also help strengthen your knowledge safety posture. They may also reveal how our newest AI-powered and contextual classifiers can establish delicate commerce secrets and techniques, personally identifiable info, and extra in seconds throughout your digital property.
  • Effortless application migration using Microsoft Entra ID” (OD03: on-line solely): David Gregory, Director of Product Advertising, Id Compete, will share how our newly proposed device provides a one-click configuration to combine functions into Microsoft Entra ID. Throughout this on-demand session, we’ll present an outline of how our device affords a guided expertise to seamlessly facilitate the migration of your functions from Lively Listing Federation Companies to Microsoft Entra ID.
  • Bringing Passkey into your Passwordless journey” (OD02: on-line solely): Calvin Lui, Product Supervisor; Erik Dauner, Senior Program Supervisor; and Mayur Santani, Product Supervisor, stroll you thru the background of the place passkeys got here from, their influence on the passwordless ecosystem, and the product options and roadmap bringing passkeys into the Microsoft Entra passwordless portfolio and phishing-resistant technique.
  • The power of Microsoft’s XDR: they attempted, we disrupted” (BRK265H: in-person and on-line): Dustin Duran, Director of Safety Analysis, and Kim Kischel, Director of Product Advertising—XDR, will talk about Microsoft 365 Defender’s computerized assault disruption expertise and provide you with a transparent understanding of assault disruption and the way it’s offering instant worth to prospects in the actual world as we speak.
  • Making end-to-end security real (BRK267H: in-person and on-line): Mark Simos, Lead Cybersecurity Architect, and Sarah Younger, Senior Cloud Safety Advocate, will share fast wins that clear up real-world issues utilizing Microsoft’s built-in safety merchandise. This session will present you the best way to make progress on end-to-end safety throughout identification, safety operations, and extra.

Work together with the consultants

Microsoft Security Team experts participating at Microsoft Ignite 2023.

Deliver your questions on Microsoft options. Our consultants have solutions. Join with them throughout dwell discussions to be taught extra.

Alternatives to work together with the consultants embrace:

  • Windows 11, Windows 365, & Microsoft Intune Q&A” (DIS657H: in-person and on-line): Gabe Frost, Group Product Supervisor; Harjit Dhaliwal, Senior Product Advertising Supervisor; Jason Githens, Principal Group Product Supervisor; and Joe Lurie, Senior Product Supervisor, will take part in a collaborative query and reply session about the place we’re as we speak with Home windows 11 and gadget administration—and what it’s essential to propel your group and IT methods. We’ll shortly define just a few of the newest industrial enhancements, however the focus right here is in your ideas and questions.
  • Preventing loss of sensitive data: Microsoft Purview DLP Q&A” (DIS666H: in-person and on-line): Shekhar Palta, Principal Product Advertising Supervisor, and Shilpa Bothra will talk about Microsoft Purview DLP and the best way it may well forestall unintended or intentional lack of delicate knowledge throughout apps and units. Be part of us to debate how one can modernize your DLP and get began shortly, and find out how DLP works with Microsoft Defender merchandise.
  • Panel discussion: Resilient. Compliant. Secure by default” (DISFP375: on-line solely): Joye Purser, International Lead, Area Cybersecurity, Veritas Applied sciences; Saurabh Sensharma, Principal Product Supervisor, Microsoft; Simon Jelley, Normal Supervisor for SaaS Safety, Endpoint and Backup Govt, Veritas Applied sciences; and Tim Burlowski, Senior Director of Product Administration, Veritas Applied sciences, will talk about safety methods. Be part of Veritas consultants for an interactive query and reply on guaranteeing your cloud functions are resilient and your knowledge is protected, compliant, and recoverable when it issues most.

Socialize with us and your friends

As you’ve in all probability skilled your self at earlier conferences and enterprise networking occasions, a few of the finest concepts are sparked throughout conversations with different safety professionals. Get social and be part of us and your cybersecurity friends at two unimaginable networking occasions.

  • The Lounge at Microsoft Ignite: Positioned within the Hub on Stage 5 (Summit Conference Heart), the Lounge is the principle gathering space for group. The Lounge might be staffed by Microsoft full time workers and attending Most Helpful Professionals (MVPs) to supply steady query and reply alternatives.
  • Microsoft Ignite Safety After Get together: Community and join over drinks and appetizers on Wednesday, November 15, 2023, at The Collective. Companions, prospects, Microsoft MVPs, and Microsoft subject-matter consultants will combine and mingle. Register to reserve your spot.

Register as we speak for Microsoft Ignite

Be part of us on-line from wherever from November 15 to 16, 2023, to listen to main product bulletins, inspiring messages, and professional insights on the way forward for cybersecurity and Microsoft options. And in the event you’re not in a position to take part in any respect this 12 months, you possibly can nonetheless try loads of session content material, product bulletins, and keynotes after Microsoft Ignite wraps up. Will probably be obtainable on demand after the occasion. Reserve your spot today. Hope you possibly can be part of us!

Be part of the Safety Tech Accelerator

We’re additionally having a Tech Accelerator occasion on Wednesday, December 6, 2023. Ask questions concerning the newest product bulletins from Ignite and join together with your safety friends at this digital skilling occasion hosted on the Safety Tech Neighborhood—register today.

Be taught extra

To be taught extra about Microsoft Safety options, go to our website. Bookmark the Security blog to maintain up with our professional protection on safety issues. Additionally, observe us on LinkedIn (Microsoft Security) and X (previously often known as Twitter) (@MSFTSecurity) for the newest information and updates on cybersecurity.

By Joy Chik, President, Identity & Network Access

A year ago when we announced the Microsoft Entra product family, we asked what the world could achieve if we had trust in every digital experience and interaction.1 This question inspired us to offer a vision for securing the millions and millions of connections that happen every second between people, machines, apps, and devices that access and share data.

Protecting identities and access is critical. As our work and lives become increasingly digital, cyberattacks are becoming more frequent and more sophisticated, affecting organizations of every size, in every industry, and in every part of the world. In the last 12 months, we saw an average of more than 4,000 password attacks per second, an almost threefold increase from the 1,287 attacks per second we saw the previous year.2 We’re also seeing far more sophisticated attacks, including ones that manage to evade critical defenses, such as multifactor authentication, to steal access tokens, impersonate a rightful user, and gain access to critical data.

https://www.microsoft.com/en-us/videoplayer/embed/RW16VoB

To help organizations protect their ever-evolving digital estates, we’ve been expanding beyond managing directories and authenticating users to securing and governing access for any identity to any app or resource. Today, we’re thrilled to announce the next milestone in our vision of making it easy to secure access with two new products: Microsoft Entra Internet Access and Microsoft Entra Private Access. We’re adding these capabilities to help organizations instill trust, not only in their digital experiences and services but in every digital interaction that powers them.

Secure access to any app or resource, from anywhere

Flexible work arrangements and the resulting increase in cloud workloads are straining traditional corporate networks and legacy network security approaches. Using VPNs to backhaul traffic to the legacy network security stack weakens security posture and damages the user experience while using siloed solutions and access policies leaves security gaps.

Microsoft Entra Internet Access is an identity-centric Secure Web Gateway that protects access to internet, software as a service (SaaS), and Microsoft 365 apps and resources. It extends Conditional Access policies with network conditions to protect against malicious internet traffic and other threats from the open internet. For Microsoft 365 environments, it enables best-in-class security and visibility, along with faster and more seamless access to Microsoft 365 apps, so you can boost productivity for any user, anywhere. Microsoft 365 scenarios in Microsoft Entra Internet Access are in preview today, and you can sign up for the preview of capabilities for all internet traffic and SaaS apps and resources that will be available later this year.

Microsoft Entra Private Access is an identity-centric Zero Trust Network Access that secures access to private apps and resources. Now any user, wherever they are, can quickly and easily connect to private apps—across hybrid and multicloud environments, private networks, and data centers—from any device and any network. Now in preview, Microsoft Entra Private Access reduces operational complexity and cost by replacing legacy VPNs and offers more granular security. You can apply Conditional Access to individual applications, and enforce multifactor authentication, device compliance, and other controls to any legacy application without changing those applications.

Together, Internet Access and Private Access, coupled with Microsoft Defender for Cloud Apps, our SaaS security-focused cloud access security broker, comprise Microsoft’s Security Service Edge (SSE) solution. We’ll continue to evolve our SSE solution as an open platform that delivers the flexibility of choice between solutions from Microsoft and our partners. Pricing for Microsoft Entra Internet Access and Microsoft Entra Private Access will be available when those products reach general availability.

Graphic showing the Microsoft security service edge ecosystem. It illustrates how you can secure access to any app or resource, from anywhere.

Figure 1. Microsoft’s Security Service Edge (SSE) solution.

Neither identity nor network security alone can protect the breadth of access points and scenarios that modern organizations require. That’s why, as cyberattacks get more sophisticated, we’re adding identity-centric network access to our cloud identity solutions. We’re converging controls for identity and network access so you can create unified Conditional Access policies that extend all protections and governance to all identities and resources. With a single place to safeguard and verify identities, manage permissions, and enforce intelligent access policies, protecting your digital estate has never been easier.

Microsoft Azure Active Directory is becoming Microsoft Entra ID

When we introduced Microsoft Entra in May of 2022, it included three products: Microsoft Azure Active Directory (Azure AD), Microsoft Entra Permissions Management, and Microsoft Entra Verified ID.1 We later expanded the Microsoft Entra family with Microsoft Entra ID Governance and Microsoft Entra Workload ID.3 Today, Microsoft Entra protects any identity and secures access to any resource—on-premises, across clouds, and anywhere in between—with a product family that unifies multicloud identity and network access solutions.

To simplify our product naming and unify our product family, we’re changing the name of Azure AD to Microsoft Entra ID. Capabilities and licensing plans, sign-in URLs, and APIs remain unchanged, and all existing deployments, configurations, and integrations will continue to work as before. Starting today, you’ll see notifications in the administrator portal, on our websites, in documentation, and in other places where you may interact with Azure AD. We’ll complete the name change from Azure AD to Microsoft Entra ID by the end of 2023. No action is needed from you.

Chart outlining all the product name changes that come with the renaming of Azure AD to Microsoft Entra ID.

Figure 2. With the name change to Microsoft Entra ID, the standalone license names are changing. Azure AD Free becomes Microsoft Entra ID Free. Azure AD Premium P1 becomes Microsoft Entra ID P1. Azure AD Premium P2 becomes Microsoft Entra ID P2. And our product for customer identities, Azure AD External Identities, becomes Microsoft Entra External ID. SKU and service plan name changes take effect on October 1, 2023.

More innovations in Microsoft Entra

Today we’d also like to highlight other innovations in the Microsoft Entra portfolio that strengthen defenses against attackers who are becoming more adept at exploiting identity-related vulnerabilities such as weak credentials, misconfigurations, and excessive access permissions.

Prevent identity takeover in real time

Several exciting changes to Microsoft Entra ID Protection (currently Azure AD Identity Protection) help IT and identity practitioners prevent account compromise. Instead of reactively revoking access based on stale data, ID Protection uses the power of advanced machine learning to identify sign-in anomalies and anomalous user behavior and then block, challenge, or limit access in real time. For example, it may trigger a risk-based Conditional Access policy that requires high-assurance and phishing-resistant authentication methods for accessing sensitive resources.

A new dashboard demonstrates the impact of the identity protections that organizations deploy with a comprehensive snapshot of prevented identity attacks and the most common attack patterns. On the dashboard, you can view simple metric cards and attack graphs that show risk origins, security posture over time, types of current attacks, as well as recommendations based on risk exposure, while highlighting the business impact of enforced controls. With these insights, you can further investigate your organization’s security posture in additional tools and applications for enhanced recommendations.

New Microsoft Entra ID Protection dashboard showing likely attacks and recommendations.

Figure 3. New Microsoft Entra ID Protection dashboard.

Automate access governance

An important part of securing access for any identity to any app is ensuring that only the right identities have the right access at the right time. Some organizations only realize they need to take this approach when they fail a security audit. Microsoft Entra ID Governance, now generally available, is a complete identity governance solution that helps you comply with organizational and regulatory security requirements while increasing employee productivity through real-time, self-service, and workflow-based app entitlements.4

ID Governance automates the employee identity lifecycle to reduce manual work for IT and provides machine learning-based insights about identities and app entitlements. Because it’s cloud-delivered, it scales to complex cloud and hybrid environments, unlike traditional on-premises identity governance point solutions. It supports cloud and on-premises apps from any provider, as well as custom-built apps hosted in the public cloud or on-premises. Our global system integrator partners—including Edgile, a Wipro company, EY, KPMG, and PwC—started helping with the planning and deployment of ID Governance on July 1, 2023.

New Microsoft Entra ID Governance dashboard showing governance posture and recommendations.

Figure 4. New Microsoft Entra ID Governance dashboard.

Personalize and secure access to any application for customers and partners

As we announced at Microsoft Build 2023, new developer-centric capabilities in Microsoft Entra External ID are now in preview. External ID is an integrated identity solution for external users, including customers, patients, citizens, guests, partners, and suppliers. It offers rich customization options, Conditional Access, identity protection, and support for social identity providers. Using our comprehensive developer tools, even those developers who have little to no identity experience can create personalized sign-in and sign-up experiences for their applications within minutes.

Simplify identity verification with Microsoft Entra Verified ID

Since we announced the general availability of Microsoft Entra Verified ID last summer, organizations around the world have been reinventing business processes, such as new employee onboarding, around this new, simpler way of verifying someone’s identity.5 For example, we recently announced that millions of LinkedIn members will be able to verify their place of work using a Verified ID credential.6 At the 2023 Microsoft Build event, we launched the Microsoft Entra Verified ID SDK so that developers can quickly add a secure digital wallet to any mobile application. The app can then store and verify a wide range of digital ID cards.

Microsoft Entra: Secure access for a connected world

You can see our expanded Microsoft Entra product family in Figure 5. Visit the Microsoft Entra website to learn more.

Microsoft Entra family of identity and network access products.

Figure 5. The Microsoft Entra family of identity and network access products.

We’re committed to building a more secure world for all and making life harder for threat actors, easier for admins, and more secure for every user. As part of that commitment, we’ll keep expanding Microsoft Entra to provide the broadest possible coverage along with a flexible and agile model where people, organizations, apps, and even smart things can confidently make real-time access decisions.

Encourage your technical teams to dive deeper into these announcements by attending the Tech Accelerator event on July 20, 2023, on the Microsoft Tech Community.

Microsoft Entra

Meet the family of multicloud identity and access products.

Learn more 

a man looking at the camera

Learn more

To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (Microsoft Security) and Twitter (@MSFTSecurity) for the latest news and updates on cybersecurity.


1Secure access for a connected world—meet Microsoft Entra, Joy Chik and Vasu Jakkal. May 31, 2022.

2Microsoft internal data.

3Do more with less—Discover the latest Microsoft Entra innovations, Joy Chik. October 19, 2022.

4Microsoft Entra ID Governance is generally available, Joseph Dadzie. June 7, 2023.

5Microsoft Entra Verified ID now generally available, Ankur Patel. August 8, 2022.

6LinkedIn and Microsoft Entra introduce a new way to verify your workplace, Joy Chik. April 12, 2023.

By Steve Faehl, Federal Security Chief Technology Officer, Microsoft

As Department of Defense (DoD) Chief Information Officer Hon. John Sherman said recently, Cybersecurity Maturity Model Certification (CMMC) is necessary to ensure that the United States raises the bar for protecting sensitive information.1 The DoD is leading by example towards this goal by implementing Zero Trust practices and introducing CMMC to strengthen the supply chain throughout the Defense Industrial Base (DIB) because shared information is only as secure as the weakest link.2

The DIB as a whole has been making progress toward improving its security posture, but it can still be challenging to prepare for the required full third-party audit—especially for small and medium-sized businesses (SMBs).3 While some DIB organizations may be well-positioned to pass a Third-Party Assessment Organization (3PAO) audit, it’s important for all DIB organizations to achieve CMMC compliance to realize the objective.

Microsoft is introducing new capabilities in Microsoft Entra ID and Microsoft Purview that support CMMC compliance while also helping DIB organizations accelerate their Zero Trust journeys. Identity and data protection are central to compliance, security, and empowering more user productivity and collaboration.

Voluntary self-assessment? Why would we do that?

Although CMMC 2.0 is still in its early stages, DIB companies should move ahead with meeting today’s CMMC requirements, including undergoing voluntary assessments. Doing so helps bolster national security while also preparing companies for future DoD compliance requirements.

One of the callouts from the National Cybersecurity Strategy is that those that can do more, should. Microsoft affirmed this principle by signing up for CMMC voluntary assessment effort, where we earned a perfect 110-point score. This validation demonstrates that Microsoft Azure Government and Microsoft 365 GCC High services can be effectively used to help DIB members accelerate their compliance.

Microsoft is taking the opportunity to share lessons learned and best practices that can inform planning within the DIB. Adopting Microsoft 365 GCC High and Azure Government as starting points allows organizations to use familiar Microsoft 365 productivity tools and Microsoft Azure Cloud Services while accelerating their compliance journey. As a primary platform for collaboration, Microsoft 365 also satisfies controls beyond the cloud; its configuration is a well-documented path to compliance with the National Institute of Standards and Technology (NIST) SP 800-171 controls.

We have recently developed capabilities and guidance for identity, data, and device protection that can help DIB members achieve and measure progress on compliance faster and more effectively.

The benefits of utilizing cloud identity

CMMC encompasses 72 practices across 13 domains, so the ability to address them holistically through Microsoft Entra ID delivers huge advantages in terms of time, resources, and visibility. Identity provides a strong starting point for CMMC 2.0 compliance given its ability to address multiple domains in CMMC 2.0 Levels 1-3.

AZURE ACTIVE DIRECTORY IS BECOMING MICROSOFT ENTRA IDLearn more 

Microsoft Entra ID is unique in providing elevated security, increased collaboration, and a better user experience. The newest features of Microsoft Entra ID make passwordless authentication easier and establishes trust through the cloud for business-to-business (B2B) collaboration, which are some of the ways Microsoft Entra ID helps enable CMMC compliance while also making users more productive and increasing teamwork within and across secure environments.

Identity empowers Zero Trust

CMMC documents several key identity components and controls critical to achieving security transformation with Zero Trust. Getting these aspects right from the start can enable a faster path to success across the other Zero Trust pillars.

One example is the utilization of a centralized identity management system which is also a requirement of Executive Order (EO) 14028. While smaller organizations are at a disadvantage for CMMC in some ways, this is one area in which SMBs can often be more agile. There are simple changes any organization can make to rapidly mature its posture—including implementing some of the best practices and prescriptive CMMC identity guidance published by Microsoft.

Strong authentication is pivotal for achieving higher levels of CMMC compliance. However, relying solely on the strongest authentication method available may be inflexible and at times hinder user productivity. Having multiple authentication methods offers users greater flexibility while enhancing their productivity. A new option in Microsoft Entra ID offers the strongest authentication option available by default, allowing organizations to safely direct users toward higher security measures.

There’s more than one way to approach user challenges. Organizations can take advantage of Microsoft Authenticator’s easy access to strong authentication tools. However, we also support tools from partners such as Yubico. This provides a variety of ways for DIB members to perform authentication, which we can then map to the appropriate level of assurance.

Secure sensitive data with a platform approach

Another goal of CMMC 2.0 is safeguarding sensitive information, such as Controlled Unclassified Information (CUI) and Federal Contract Information (FCI), which includes many categories of data such as personal records or contract information for sensitive projects. When this data is put at risk, it can have significant consequences for national security.

Microsoft’s data security platform, Microsoft Purview, can help government agencies identify and locate their data, detect data security risks, and prevent data loss across clouds, apps, and devices. Recently, Microsoft announced more than 25 new features for government and commercial customers to help them get ahead of potential security incidents, such as data leaks and theft, along with the availability of additional logs to enhance security monitoring and incident response. Data protection is supported by three key products within the Microsoft Purview family:

  1. CMMC requires organizations to implement specific security controls and practices based on the sensitivity of the data they handle, so information protection is essential. Microsoft Purview Information Protection enables customers to classify data, protect it through encryption, and gain visibility into sensitive data. It can also help government organizations discover, classify, and protect data using built-in and ready-to-use advanced classifiers, which include sensitive information types (SITs) that can identify personal information such as credit card numbers, addresses, and medical conditions. More complex data types and scenarios can utilize custom AI classifiers that can be easily trained from sample data.
  2. Falling under the CMMC Audit and Accountability domain, insider risk can be a significant challenge for organizations. According to a report by the Insider Threat Defense Group, insider risks accounted for 33 percent of all data breaches in the public sector.4 Microsoft Purview Insider Risk Management helps customers uncover elusive insider risks through multiple machine learning models with intelligent detection and analysis capabilities.
  3. Under CMMC, data loss prevention (DLP) solutions are a critical part of preventing the unauthorized transfer and use of data, as well as data exfiltration. Microsoft Purview Data Loss Prevention (DLP) acts as an integrated and extensible offering that allows organizations to manage their DLP policies from a single location.
Chart showing the Microsoft Partner Ecosystem categories of Information Protection, Inspire Risk Management, and Data Loss Prevention.

Each of these three solutions integrates seamlessly to enable agencies to fortify data security with a defense-in-depth approach—all while facilitating easier CMMC compliance.

Additionally, Compliance Manager provides CMMC assessment templates to help organizations assess their compliance posture against CMMC in a comprehensive control-by-control way. Regulations are added to Compliance Manager as new laws and regulations are enacted and can be used to help organizations meet national, regional, and industry-specific requirements governing the collection and use of data.

Go-forward guidance for DIB organizations

While the final rules under CMMC 2.0 have not yet been published, we do know that the underlying technical controls will continue to be based on NIST 800-171. For DIB members, having a trusted platform that has gone through accreditation requirements itself is a great starting point. Beyond a trusted platform adoption, DIB organizations can also follow the guidelines for secure configuration that we provide.

As we continue down this path with the adoption of CMMC 2.0, there will be more guidance that we can bring to the table with lessons learned from our own voluntary audit. The successful audit also provides evidence that Microsoft can accept the flow-down terms applicable to cloud service providers.

Compliance capability built for every DIB organization

Microsoft platforms and tools, including Microsoft Entra ID, Microsoft Authenticator, and Microsoft Purview, can ease compliance for DIB organizations of different sizes and structures, particularly companies that may be resource-constrained.

New capabilities and enhancements built on Secure-by-Design and Secure-by-Default principles are making it easier for organizations to improve their security posture and meet CMMC requirements. Our goal behind compiling CMMC-specific guidance in a single place is to empower the entire DIB ecosystem to support more secure, effective interactions with the federal government.

Learn more

Learn more about Microsoft Entra ID and Microsoft Purview.

To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (Microsoft Security) and Twitter (@MSFTSecurity) for the latest news and updates on cybersecurity.


1DOD CIO Says CMMC 2.0 Coming Soon: ‘We Want to Get This Right’, Charles Lyon-Burt. May 17, 2023.

2Defense Primer: U.S. Defense Industrial Base, Congressional Research Service. April 17, 2023.

3CMMC: Managing digital risk for the Defense Industrial Base (DIB) and beyond, CyberAB.

4Insider Threat Report, Cybersecurity Insiders. 2020.

Microsoft is proud to be recognized as a Leader in the Forrester Wave™: Zero Trust Platform Providers, Q3 2023 report. At Microsoft, we understand modernizing security is a complex task in this era of ever-evolving cyberthreats and complex digital environments. Serious threats have necessitated a paradigm shift in how organizations protect their digital estates. That’s why Microsoft embraces an end-to-end Zero Trust architecture: a comprehensive approach to security that helps our customers effectively mitigate business risk in the era of hybrid and remote work.

Microsoft’s leadership

Zero Trust has become the industry standard for securing complex, highly distributed digital estates. And Microsoft is in a unique position to help customers with their security needs, as Microsoft delivers end-to-end cross-cloud, cross-platform security solutions, which integrate more than 50 different categories across security, compliance, identity, device management, and privacy, informed by more than 65 trillion threat signals we see each day. Microsoft is actively engaged with the National Institute of Standards and Technology (NIST), most recently providing public commentary for the NIST National Cybersecurity Center of Excellence (NCCoE) and participating in The Open Group where we co-chaired the Zero Trust Architecture (ZTE) forum. As we look to the future, Microsoft recognizes that customers are entering the era of AI. And by combining the principles of Zero Trust with the capabilities of AI, organizations will have the potential to create a formidable defense against modern cyberthreats. In this blog, we will explore Forrester’s latest evaluation of the Microsoft end-to-end Zero Trust architecture and what the future will hold by leveraging the power of AI.

Forrester Wave™: Zero Trust Platforms report

See why Forrester recognizes Microsoft as a Leader in Zero Trust.

Read the report 

Side view close-up of a man typing on his phone while standing behind a Microsoft Surface Studio.

Comprehensive end-to-end protection

Its Copilot theme carries over to a notable vision to provide end-to-end, step-by-step guidance for implementing ZT while leveraging AI. This means customer can take their ZT journey with Microsoft in lockstep.Forrester Wave™: Zero Trust Platforms, Q3 2023 report

We are proud that the Microsoft Zero Trust platform has been recognized as a Leader in the Forrester Wave™: Zero Trust Platforms, Q3 2023 report, which we believe demonstrates Microsoft’s strong track record for being a comprehensive end-to-end platform.

Forrester Wave™: Zero Trust Platform Providers, Q3 2023 report

The Forrester Wave™ report evaluates Zero Trust platforms based on criteria that include network security, centralized management and usability, data security, device security, automation, orchestration, people, and identity security—along with both on-premises and cloud deployments. In the latest evaluation for Q3 2023, the Microsoft end-to-end Zero Trust architecture has demonstrated its excellence in these areas by being named a Leader in this inaugural Forrester Wave™ report evaluating Zero Trust Platform Providers. The Microsoft end-to-end Zero Trust model received the highest possible score in the following categories based on the Forrester analyst criteria: people and identity security, device security, enabling and protecting the hybrid workforce, data security, automation and orchestration, visibility, and analytics.

Zero Trust in the age of AI

In an era where AI is rapidly transforming how we work, its convergence with cybersecurity brings both immense opportunities and new challenges. Here’s why Zero Trust becomes even more crucial:

  1. Sophistication of threats: As cyberattacks have become more sophisticated and capable of evading traditional security measures, Zero Trust, with its emphasis on continuous verification, explicit verification, and least privileged access, offers a more effective defense against these advanced threats with or without AI capabilities.
  2. Data protection and privacy: AI relies on vast amounts of customers’ data to help the user be more productive, and safeguarding this data is paramount. Zero Trust’s data-centric approach ensures that access to sensitive data is highly controlled, mitigating the risk of unauthorized AI-driven breaches.
  3. Automated responses: AI-enabled security can provide rapid automated responses to threats. When integrated with Zero Trust, AI-driven responses become even more effective by improving alert fatigue, adapting access controls in real-time, minimizing damage, and containing potential breaches.

Looking to the future

Microsoft’s leadership in Zero Trust, as shown by the latest Forrester Wave™, highlights our commitment to continuously evolving cybersecurity to meet the security demands of the digital age. With AI becoming a cornerstone of modern threats and defenses, the Zero Trust principles of assume breach, least privileged access, and continual explicit verification are more crucial than ever. As organizations navigate the evolving landscape of cyberthreats, the synergy between Microsoft’s end-to-end Zero Trust strategy and the capability of AI provides a formidable defense mechanism that is both forward-looking and resilient.

For more information on this recognition, check out the full Forrester Wave™: Zero Trust Platforms, Q3 2023 report

Learn more


To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (Microsoft Security) and Twitter (@MSFTSecurity) for the latest news and updates on cybersecurity.


The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave™ are trademarks of Forrester Research, Inc. The Forrester Wave™ is a graphical representation of Forrester’s call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave™. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.

Forrester Wave™: Zero Trust Platform Providers, Q3 2023, Carlos Rivera and Heath Mullins, September 19th, 2023

While attacks are getting more sophisticated, so are our defenses. With recent innovations like secured-core PCs that are 60 percent more resilient to malware than non-secured-core PCs,1 and the Microsoft Pluton Security Processor that adds more protection by isolating sensitive data like credentials and encryption keys, Windows 11 has elevated the security bar for all. Our goal is to protect organizations by simplifying security, building in stronger protections from the chip to the cloud.

From more secure and easy-to-use authentication with multifactor authentication to adding extra layers of protection for applications and data, we’ve simplified and enabled more security features by default than ever before with Windows 11. These features are designed to help stop attacks we’re seeing now as well the more sophisticated and targeted attacks that we expect to become more mainstream in the future. We have also begun to adopt memory-safe languages like Rust, starting with using Rust code for two traditional attack targets—Font Parsing and Win32k Kernel.

When we launched Windows 11 it came with new hardware and software features like secure boot, virtualization-based security, hypervisor-protected code integrity, and Windows Hello using the Trusted Platform Module (TPM) on by default in many regions. Since turning those features on, organizations have reported a 58 percent reduction in security incidents, and a three times reduction in firmware attacks—a highly attractive and lucrative target for attackers. Our data shows that 83 percent of Windows 11 devices use three or more security features. 

We’re excited to take the next step on this journey with updates for security and IT professionals available today and on by default for new installs of Windows 11.

New Windows 11 security features

Windows 11 features give you the power to create, collaborate, and keep your stuff protected.

Learn more 

Side view close-up of a man typing on his phone while standing behind a Microsoft Surface Studio.

The next step towards eliminating passwords entirely

Microsoft global threat intelligence processes more than 65 trillion security signals every day. That intel has shown us there are more than 4,000 password attacks every second.2 Everyday cybercriminals as well as nation-state attackers like Peach Sandstorm are leveraging password spray attacks to compromise high-value targets in sectors like satellite, defense, and pharmaceuticals. Organizations can reduce their risk of compromise to these kinds of attacks with Windows passwordless authentication and multifactor authentication features that offer more protection than traditional passwords.

Passkeys make passwordless easier and more universal: Windows 11 will make it much harder for hackers who exploit stolen passwords through phishing attacks by empowering users to replace passwords with passkeys. Passkeys are the cross-platform future of secure sign-in management. Microsoft and other technology leaders are promoting passkeys as part of the FIDO Alliance. A passkey creates a unique, unguessable cryptographic credential that is securely stored on your device. Instead of using a username and password to access a website or application, Windows 11 users will be able to use and protect passkeys using Windows Hello or Windows Hello for Business, or their phone. This will allow users to access the site or app using their face, fingerprint, or device PIN. Passkeys on Windows 11 will work on multiple browsers including Microsoft Edge, Google Chrome, Firefox, and others. Setting up a passkey in Windows is accomplished by:

  • The website or application owner creates a passkey and offers it to you as a sign-in option instead of your password—website and app owners will need to develop their own passkeys infrastructure on their sign-in experience.
  • Once you create the passkey on your device, the next time you sign in to that website or app from your device it will recognize that you have its passkey, and you can use it instead of a password. If you are using Windows Hello or Windows Hello for Business, you will be able to use your face, PIN, or fingerprint to sign in more easily. In addition, you can now use a passkey from your phone or tablet to complete the sign-in process.
  • Users will have a management dashboard through Settings –> Accounts –> Passkeys to see and manage passkeys on their Windows 11 device.

Simplifying and modernizing security for IT by reducing the attack surface 

The latest Windows 11 will also include powerful new tools that enable IT teams to keep their organizations and employees more secure. We’re improving authentication, making it easier for IT to lock down and maintain policy configurations, adding more controls through Intune.

Phish-resistant credentials with Windows Hello for Business Passwordless: Windows 11 devices with Windows Hello for Business or FIDO2 security keys can protect user identities by removing the need to use passwords from day one. IT can now set a policy for Microsoft Entra ID-joined machines, so users no longer see the option to enter a password when accessing company resources. Once the policy is set, it will remove passwords from the Windows user experience, both for device unlock as well as in-session authentication scenarios. With this change, users can now navigate through their core authentication scenarios using strong, phish-resistant credentials like Windows Hello for Business or FIDO2 security keys. If ever necessary, users can leverage recovery mechanisms such as Windows Hello for Business PIN reset or web sign-in. Web sign-in is now available for all supported Microsoft Entra ID authentication mechanisms in addition to Temporary Access Pass (TAP) and education scenarios.

Maintain IT policy control with Config Refresh: Config Refresh is designed to revert policies to a secured state if they’ve been tampered with by potentially unwanted applications or user tampering with the registry. Config Refresh allows Windows 11 devices to be reset every 90 minutes by default, or every 30 minutes if desired, within the policy configuration service provider (CSP). This capability ensures that your settings are retained in the way IT configured them. The policy CSP covers hundreds of settings that were traditionally set with Group Policy and does so through Mobile Device Management, like Microsoft Intune. To enable help desk technicians to support their teams more efficiently Config Refresh can also be paused by IT administrators for a configurable period of time, after which it will be automatically re-enabled. It can also be turned back on at any time by an IT administrator. Starting today, Config Refresh is available to our Insiders and coming soon to all organizations.

Only allow trusted apps with Custom App Control: Applications are the lifeblood of our digital experiences, but they can also become entry points for attackers. With application control, only approved and trusted apps are allowed onto devices. By controlling unwanted or malicious code from running, application control is a critical part of an overall security strategy. Application control is often cited as one of the most effective means of defending against malware. Organizations using Windows 10 and above use App Control for Business (formerly called Windows Defender Application Control) and its next-generation capabilities to protect their digital estate from malicious code. Organizations using Microsoft Intune to manage their devices are now able to configure App Control for Business in the admin console, including setting up Intune as a managed installer.

New configurations in Windows Firewall: We are excited to announce some enhanced management and capabilities for the built-in Windows Firewall to help IT provide better overall protection. Windows Firewall now supports:

  • Application Control for Business (previously known as Windows Defender Application Control) app ID tagging with Windows Firewall rules though Intune. This enables IT to target Windows Firewall rules to specific applications without an absolute file path. 
  • The ability to configure network list manager settings to determine when a Microsoft Entra ID (previously known as Azure Active Directory) device is on your on-premises domain subnets so firewall rules can properly apply. The network list manager settings for Windows Firewall can be used for location awareness. 
  • There is now better support in settings to configure more granular Windows Firewall logging for domain, private, and public firewall profiles, as well as the ability to specify Windows Firewall inbound and outbound rules for ICMP types and codes.

Our continued investment in security and innovation

Our MORSE team, Microsoft Offensive Research and Security Engineering, has been working hard to ensure security is a critical piece of the software development lifecycle. In the last year, the team has dedicated 1.9 million virtual machine hours and more than 84,000 Azure CPU cores dedicated to proactively fuzzing code. In addition to that, we’ve made nearly 700 improvements in our code just the last few months by strengthening the software development lifecycle with security checks and balances, including new automation and AI to help developers find bugs on their own. The proactive work of this team to continue to improve the integrity of our code both old and new is part of our commitment to ongoing investment and innovation in security. The team has released learnings and tools to the community as well like our open source fuzzing tool, Microsoft OneFuzz.

We’re looking forward to continuing this journey to make Windows more secure from the chip to the cloud with every update.