Monthly news – October 2024 by info.odysseyx@gmail.com October 1, 2024 written by info.odysseyx@gmail.com October 1, 2024 0 comment 22 views 22 Microsoft Defender Vulnerability Management Research Analysis and Guidance: Ensuring Adoption of Android Security Updates. Microsoft researchers analyzed anonymous, aggregated security patch level data from millions of Android devices enrolled in Microsoft Intune to better understand Android security update availability and adoption across Android device models. In this postWe explain our analysis and provide guidance to help users and businesses keep their devices up to date against discovered vulnerabilities. Microsoft Security Exposure Management ninja show: In this two-episode look at Microsoft Security Exposure Management, you’ll learn how to quantify risk, generate reports for key stakeholders, integrate your security stack, and optimize attack surface management. Join us October 1st and 3rd @ 9:00 AM Pacific Time Find tools and processes that support proactive risk management to help your organization stay ahead of evolving threats. > You can check the recordings from us. YouTube Playlist. Microsoft Security Expert Search by Microsoft Graph activity log. A variety of products and logs are available to help you investigate and detect threats. In this blog postLet’s take a look at the recently added Microsoft Graph activity logs that are becoming more common. available. The Microsoft Defender Experts service is now HIPAA and ISO certified.. We are excited to announce that Microsoft Defender Experts for XDR and Microsoft Defender Experts for Hunting are now available to help Healthcare and Life Sciences customers meet their Health Insurance Portability and Accountability Act (HIPAA) obligations. Microsoft IR Internship Blog Series “Microsoft Intern Experience – Through the Eyes of a DART Incident Response (IR) Intern”. Interns in the Detection and Response Team (DART), Microsoft’s Incident Response (IR) customer-facing business, gain insight into what it takes to become a cyber incident response investigator and gain first-hand experience working with our team of IR threat hunters. This blog series Written in the first person, based on interviews about internship experiences. Microsoft Defender for Cloud Apps (preview) Enforce Edge in-browser when accessing business apps. Administrators who understand the power of Microsoft Edge in-browser protection can now require users to use Microsoft Edge when accessing company resources. The main reason is security. This is because the barrier to bypassing session control using Microsoft Edge is much higher than reverse proxy technology. Click here For more information (preview) Defender for Cloud Apps now supports connections to: mural account Provide visibility and control over your organization’s Mural usage using the App Connector API. For more information, see: Removes the ability to email end users about blocked actions. It will take effect from October 1, 2024. If an end user’s action is blocked by a session policy, the ability to notify the end user via email is interrupted.. Administrators can no longer configure this setting when creating a new session policy. Existing session policies that use this setting will not trigger email notifications to end users when a blocking action occurs. End users will continue to receive blocking messages directly through their browser and will no longer receive blocking notifications via email. Microsoft Defender for Office 365 Use the report button built into Outlook: Built-in report put a button Outlook for Mac Apply Now User-reported settings An environment where you can report messages as phishing, junk, or not junk. Upcoming Ninja Show episodes: Defense in Depth with Dual-Use Scenarios: We explore the protection mechanisms built into Defender for Office 365 with Manfred Fischer, Senior Product Manager, and Dominik Hoefling, Cloud Solutions Architect. First-party email filtering services can still benefit from the powerful features and controls of Defender for Office 365. Bulk sender information in Microsoft Defender for Office 365: In this episode, Senior Product Manager Puneeth Kuthati explains the importance of bulk sender insights within Defender for Office 365. Learn how these insights can help you distinguish trusted bulk senders from potential threats, troubleshoot fine-tuning bulk email filters, and take the right action. Maintain a balance so that important emails reach your inbox without stress. By analyzing sender behavior and trends, organizations can strengthen email security, reduce bulk unsolicited traffic, and minimize false positives. Visit the show page and add the episode to your calendar. virtual ninja training Microsoft Defender for Identity Defender for Identity: The critical role of identity in stopping automated attacks. Read this blog post Learn about stopping automated attacks and how important it is to include Defender for Identity in your security strategy. Microsoft Security Blog Microsoft is named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms.. Gartner Microsoft Named a 2024 Gartner Leader® Magic Quadrant™ for Endpoint Protection Platforms Fifth time in a row. Storm-0501: Ransomware attack extending to hybrid cloud environments Microsoft said threat actors tracked by Storm-0501 are compromising hybrid cloud environments and performing lateral movements from on-premises to cloud environments, resulting in data exfiltration, credential theft, tampering, persistent backdoor access, and ransomware deployment. Future-proofing: September 2024 progress update on Microsoft’s Secure Future Initiative (SFI). In November 2023 we will Safe Future Initiative (SFI) advances cybersecurity protections for Microsoft, our customers, and the industry. since The initiative has begunWe brought the equivalent of 34,000 full-time engineers to SFI, creating the largest cybersecurity engineering effort in history. And now, We’re sharing major updates and milestones From the first SFI progress report. Source link Share 0 FacebookTwitterPinterestEmail info.odysseyx@gmail.com previous post Custom Policy- Reusable Logs Templates next post Azure Kubernetes Service Baseline – The Hard Way, Part Deux You may also like 7 Disturbing Tech Trends of 2024 December 19, 2024 AI on phones fails to impress Apple, Samsung users: Survey December 18, 2024 Standout technology products of 2024 December 16, 2024 Is Intel Equivalent to Tech Industry 2024 NY Giant? December 12, 2024 Google’s Willow chip marks breakthrough in quantum computing December 11, 2024 Job seekers are targeted in mobile phishing campaigns December 10, 2024 Leave a Comment Cancel Reply Save my name, email, and website in this browser for the next time I comment.