Martijn Lammerts
My own digital place with a little of everything

Introducing the security configuration framework: A prioritized guide to hardening Windows 10

The security configuration framework is designed to help simplify security configuration while still allowing enough flexibility to allow you to balance security, productivity, and user experience. We are defining discrete prescriptive Windows 10 security configurations (levels 5 through 1) to meet many of the common device scenarios we see today in the enterprise.

The post Introducing the security configuration framework: A prioritized guide to hardening Windows 10 appeared first on Microsoft Security.

Continue reading...

Forcepoint DLP integration with Microsoft Information Protection—protecting your critical data

Microsoft and Forcepoint are working closely to develop an integrated solution that makes it easy to discover, classify, label, and protect critical business data.

The post Forcepoint DLP integration with Microsoft Information Protection—protecting your critical data appeared first on Microsoft Security.

Continue reading...

4 tried-and-true prevention strategies for enterprise-level security

Learn about the four cyber hygiene best practices recommended in the 24th edition of the Microsoft Security Intelligence Report (SIR) to help reduce your risk of attack.

The post 4 tried-and-true prevention strategies for enterprise-level security appeared first on Microsoft Security.

Continue reading...

Building the security operations center of tomorrow—better insights with compound detection

Learn how compound detection can help you apply the law of data gravity and correlate insights across your security platforms.

The post Building the security operations center of tomorrow—better insights with compound detection appeared first on Microsoft Security.

Continue reading...

Analysis of a targeted attack exploiting the WinRar CVE-2018-20250 vulnerability

A complex attack chain incorporating the CVE-2018-20250 exploit and multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.

The post Analysis of a targeted attack exploiting the WinRar CVE-2018-20250 vulnerability appeared first on Microsoft Security.

Continue reading...

Step 8. Protect your documents and email: top 10 actions to secure your environment

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 8. Protect your documents and email,” you’ll learn how to deploy Azure Information Protection and use Office 365 Advanced Threat Protection (ATP) and Exchange Online Protection to help secure your documents and emails.

The post Step 8. Protect your documents and email: top 10 actions to secure your environment appeared first on Microsoft Security.

Continue reading...