Trending

#DefenderForCloud

Latest posts tagged with #DefenderForCloud on Bluesky

Latest Top
Trending

Posts tagged #DefenderForCloud

Preview
Introducing effective settings: See security configurations enforced on your device | Microsoft Community Hub See exactly which security configurations are enforced on your device Security teams spend significant time defining policies for Microsoft Defender security...

Introducing effective settings: See security configurations enforced on your device techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

2 0 0 0
Preview
Scaling security operations with Microsoft Defender autonomous defense and expert-led services | Microsoft Security Blog This new guide from Microsoft explains why manual defense fails and how autonomous, expert-led security transforms modern protection against AI-powered cyberattacks.

Scaling security operations with Microsoft Defender autonomous defense and expert-led services www.microsoft.com/en...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

0 0 0 0
Preview
From signal to strategy: Closing attack paths with identity intelligence | Microsoft Community Hub Compromised credentials remain one of the most common entry points for attackers. In the first half of 2025 alone, identity-based attacks surged more than...

From signal to strategy: Closing attack paths with identity intelligence techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

0 0 0 0
Preview
New built‑in Alert Tuning rules in Defender We’ve often talked about alert fatigue here on the socautomators blog and how too many alerts create noise which can be the enemy of speed. The new built‑in alert tuning rules in Defender XDR improve how alerts are processed. These rules are meant to help analysts focus on the alerts most likely to require action, while automated triage runs behind the scenes.

New built‑in Alert Tuning rules in Defender socautomators.substa...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

0 0 0 0
Preview
New Clickfix variant ‘CrashFix’ deploying Python Remote Access Trojan | Microsoft Security Blog CrashFix crashes browsers to coerce users into executing commands that deploy a Python RAT, abusing finger.exe and portable Python to evade detection and persist on high‑value systems.

New Clickfix variant ‘CrashFix’ deploying Python Remote Access Trojan www.microsoft.com/en...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

0 0 0 0
Preview
Extending Defender’s AI Threat Protection to Microsoft Foundry Agents | Microsoft Community Hub Today’s blog post introduces new capabilities to strengthen the security and governance of AI agents using Microsoft Foundry Agent Service and explores how...

Extending Defender’s AI Threat Protection to Microsoft Foundry Agents techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

0 0 0 0
Preview
Architecting Trust: A NIST-Based Security Governance Framework for AI Agents | Microsoft Community Hub Architecting Trust: A NIST-Based Security Governance Framework for AI Agents The "Agentic Era" has arrived. We are moving from chatbots that simply talk to...

Architecting Trust: A NIST-Based Security Governance Framework for AI Agents techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

1 0 0 0
Preview
Splitting single-tenant Microsoft Defender XDR Sentinel logs in multiple company scenarios | Microsoft Community Hub This article describes a simple, yet effective solution for the problem of segregating Microsoft Defender XDR and Entra ID Sentinel logs ingestion in a...

Splitting single-tenant Microsoft Defender XDR Sentinel logs in multiple company scenarios techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

0 0 0 0
Preview
Turning threat reports into detection insights with AI | Microsoft Security Blog Security teams often spend days manually turning long incident reports and threat writeups into actionable detections by extracting TTPs. This blog post shows an AI-assisted workflow that does the same job in minutes. It extracts the TTPs, maps them to existing detection coverage, and flags potential gaps. Defenders can respond faster, with human experts still reviewing and validating the results.

Turning threat reports into detection insights with AI www.microsoft.com/en...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

0 0 0 0
Preview
Threat Analytics in Microsoft Defender: Complete Guide Learn what Threat Analytics actually does in Microsoft Defender. Real workflows, email notifications, vulnerability profiles, and how to stop wasting time on irrelevant threats.

Threat Analytics in Microsoft Defender: Complete Guide www.itprofessor.clou...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

0 0 0 0
Preview
A new era of agents, a new era of posture  | Microsoft Security Blog AI agents are transforming how organizations operate, but their autonomy also expands the attack surface.

A new era of agents, a new era of posture www.microsoft.com/en...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

1 0 0 0
Preview
Determine Defender for Endpoint offboarding state for Linux devices | Microsoft Community Hub There are certain instances when a machine or machines are offboarded that the corresponding status takes an unusual amount of time to report in the Defender...

Determine Defender for Endpoint offboarding state for Linux devices techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

0 0 0 0
Preview
Change to auto-remediation in Defender for Office We don’t usually cover Defender for Office (MDO) here on the blog but this new addition to MDO helps with SOC automation so we thought we could sneak it in.

Change to auto-remediation in Defender for Office socautomators.substa...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

0 0 0 0
Preview
Secure collaboration in Microsoft Teams with efficient and automated Threat Protection and response | Microsoft Community Hub New Layers of Protection for Teams Messages With more than 300 million monthly active users on Microsoft Teams, ensuring secure collaboration has become...

Secure collaboration in Microsoft Teams with efficient and automated Threat Protection and response techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

0 0 0 0
Preview
Determine Defender for Endpoint offboarding state of Windows machines using PowerShell | Microsoft Community Hub There are certain instances when a machine or machines are offboarded that the corresponding status takes an unusual amount of time to report in the Defender...

Determine Defender for Endpoint offboarding state of Windows machines using PowerShell techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

0 0 0 0
Preview
Introducing AI-powered incident prioritization in Microsoft Defender | Microsoft Community Hub Every SOC analyst faces this challenge: multiple incidents, same severity, and different sources. When everything looks equally urgent, the real question...

Introducing AI-powered incident prioritization in Microsoft Defender techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

0 0 0 0
Preview
Introducing the Microsoft Defender Experts Suite: Elevate your security with expert-led services | Microsoft Security Blog Announcing Microsoft Defender Experts Suite, a integrated set of expert-led services that helps security teams keep pace with modern cyberattacks.

Introducing the Microsoft Defender Experts Suite: Elevate your security with expert-led services www.microsoft.com/en...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

1 0 0 0
Preview
Announcing public preview: Uncovering hidden threats with the Dynamic Threat Detection Agent | Microsoft Community Hub At Ignite, we announced the Security Copilot Dynamic Threat Detection Agent in Microsoft Defender: an always on, adaptive backend agent that uncovers hidden...

Announcing public preview: Uncovering hidden threats with the Dynamic Threat Detection Agent techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

0 0 0 0
Learn Microsoft defender for cloud in 60 Seconds | One Minute of Azure
Learn Microsoft defender for cloud in 60 Seconds | One Minute of Azure YouTube video by Barbara Forbes | Ba4bes

Day 23 brings Microsoft Defender for Cloud, and in One Minute of Azure we cover how it spots risks across your resources and helps tighten your security posture.

#Azure#DefenderForCloud#CloudSecurity#SecurityPosture#OneMinuteOfAzure

youtube.com/shorts/YBLbu...

0 0 0 0
Post image

𝐍𝐞𝐰 𝐛𝐚𝐝𝐠𝐞 𝐮𝐧𝐥𝐨𝐜𝐤𝐞𝐝: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐨𝐦𝐦𝐮𝐧𝐢𝐭𝐲 𝐈𝐧𝐟𝐥𝐮𝐞𝐧𝐜𝐞𝐫 2025
www.credly.com/badges/961bb...
#MVPBuzz #OZPerts #followoz #CloudSecurity #Azure #DefenderForCloud #MicrosoftSentinel #CNAPP #DevSecOps #Terraform #IaC #Community #Panama #MicrosoftSecurity

0 0 0 0
Preview
Demystifying AI Security Posture Management | Microsoft Community Hub Introduction In the ever-evolving paradigm shift that is Generative AI, adoption is accelerating at an unprecedented level. Organizations find it...

Demystifying AI Security Posture Management techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

1 0 0 0
Preview
Microsoft Defender: Smart Containment Stops Exposed Privileged AD Domain Accounts | Microsoft Community Hub Introduction In today’s connected business environment, domain accounts are critical assets and increasingly vulnerable. When credentials are leaked,...

Microsoft Defender: Smart Containment Stops Exposed Privileged AD Domain Accounts techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

1 0 0 0
Preview
The Microsoft Defender for AI Alerts | Microsoft Community Hub I will start this blog post by thanking my Secure AI GBB Colleague Hiten Sharma for his contributions to this Tech Blog as a peer-reviewer. Microsoft...

The Microsoft Defender for AI Alerts techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

1 0 0 0
Preview
Microsoft Defender Experts - S.T.A.R. Series | Microsoft Community Hub Co-author: Samantha Gardener To stay ahead of today’s sophisticated cyber threats, organizations must embrace a proactive defense strategy that includes...

Microsoft Defender Experts - S.T.A.R. Series techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

0 0 0 0
Preview
Microsoft Defender for Cloud Customer Newsletter | Microsoft Community Hub What's new in Defender for Cloud?  Defender for Cloud integrates into the Defender portal as part of the broader Microsoft Security ecosystem, now in...

Microsoft Defender for Cloud Customer Newsletter techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

1 0 0 0
Preview
Beyond Visibility: Hybrid Identity Protection with Microsoft Entra & Defender for Identity | Microsoft Community Hub In a previous blog, we explored how Microsoft Entra and Defender for Identity form a powerful duo for hybrid identity protection. But visibility alone isn’t...

Beyond Visibility: Hybrid Identity Protection with Microsoft Entra & Defender for Identity techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

0 0 0 0
Preview
Key findings from product telemetry: top storage security alerts across industries | Microsoft Community Hub 1.0 Introduction Cloud storage stands at the core of AI-driven applications, making its security more vital than ever. As generative AI continues to drive...

Key findings from product telemetry: top storage security alerts across industries techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

0 0 0 0
Preview
Defender for AI services: Threat Protection and AI red team workshop | Microsoft Community Hub Generative AI is reshaping how enterprises operate, introducing new efficiencies—and new risks. Imagine launching a helpful chatbot, only to learn a cleverly...

Defender for AI services: Threat Protection and AI red team workshop techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

0 0 0 0
Preview
Strengthening calendar security through enhanced remediation | Microsoft Community Hub In today’s evolving threat landscape, phishing attacks are becoming increasingly sophisticated, often leveraging meeting invites to bypass traditional...

Strengthening calendar security through enhanced remediation techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

1 0 0 0
Preview
Using the Microsoft Defender for Endpoint Files API to Validate Malware Hashes | Microsoft Community Hub Introduction Security advisories frequently include file hashes (SHA-1 or SHA-256) as indicators of compromise (IoCs). Microsoft Defender for Endpoint (MDE)...

Using the Microsoft Defender for Endpoint Files API to Validate Malware Hashes techcommunity.micros...

#MicrosoftDefender #DefenderforCloud #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence

0 0 0 0