www.microsoft.com
Open in
urlscan Pro
2a02:26f0:6c00:290::356e
Public Scan
URL:
https://www.microsoft.com/security/blog/threat-protection/
Submission: On May 18 via api from US — Scanned from DE
Submission: On May 18 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMName: searchForm — GET https://www.microsoft.com/en-us/security/site-search
<form class="c-search" autocomplete="off" id="searchForm" name="searchForm" role="search" action="https://www.microsoft.com/en-us/security/site-search" method="GET" data-seautosuggest=""
data-seautosuggestapi="https://www.microsoft.com/msstoreapiprod/api/autosuggest"
data-m="{"cN":"GlobalNav_Search_cont","cT":"Container","id":"c3c1c9c3c1m1r1a1","sN":3,"aN":"c1c9c3c1m1r1a1"}" aria-expanded="false"
style="overflow-x: visible;">
<div class="x-screen-reader" aria-live="assertive"></div>
<input id="cli_shellHeaderSearchInput" aria-label="Search Expanded" aria-controls="universal-header-search-auto-suggest-transparent" aria-owns="universal-header-search-auto-suggest-ul" type="search" name="q" role="text"
placeholder="Search Microsoft Security" data-m="{"cN":"SearchBox_nav","id":"n1c3c1c9c3c1m1r1a1","sN":1,"aN":"c3c1c9c3c1m1r1a1"}" data-toggle="tooltip" data-placement="right"
title="Search Microsoft Security" style="overflow-x: visible;">
<button id="search" aria-label="Search Microsoft Security" class="c-glyph" data-m="{"cN":"Search_nav","id":"n2c3c1c9c3c1m1r1a1","sN":2,"aN":"c3c1c9c3c1m1r1a1"}"
data-bi-mto="true" aria-expanded="false" style="overflow-x: visible;">
<span role="presentation" style="overflow-x: visible;">Search</span>
<span role="tooltip" class="c-uhf-tooltip c-uhf-search-tooltip" style="overflow-x: visible;">Search Microsoft Security</span>
</button>
<div class="m-auto-suggest" id="universal-header-search-auto-suggest-transparent" role="group" style="overflow-x: visible;">
<ul class="c-menu" id="universal-header-search-auto-suggest-ul" aria-label="Search Suggestions" aria-hidden="true" data-bi-dnt="true" data-bi-mto="true" data-js-auto-suggest-position="default" role="listbox" data-tel="jsll"
data-m="{"cN":"search suggestions_cont","cT":"Container","id":"c3c3c1c9c3c1m1r1a1","sN":3,"aN":"c3c1c9c3c1m1r1a1"}" style="overflow-x: visible;"></ul>
</div>
</form>
Text Content
We use optional cookies to improve your experience on our websites, such as through social media connections, and to display personalized advertising based on your online activity. If you reject optional cookies, only cookies necessary to provide you the services will be used. You may change your selection by clicking “Manage Cookies” at the bottom of the page. Privacy Statement Third-Party Cookies Accept Reject Manage cookies Skip to main content Microsoft Edge is the only browser optimized for Windows. Maximize your PC performance with features like Sleeping Tabs and Startup Boost. Close Switch now Skip to main content Microsoft Microsoft Security Microsoft Security Microsoft Security * Home * Solutions * Cloud security * Control and manage access * Information protection & governance * Ransomware * Secure remote work * Risk management * SIEM & XDR * Small & medium business * Zero Trust * Products * Identity & access management Identity & access management * Azure Active Directory * CloudKnox Permissions Management * Verifiable credentials in Azure AD * Azure Key Vault * SIEM & XDR SIEM & XDR * Microsoft Sentinel * Microsoft Defender for Cloud * Microsoft 365 Defender * Microsoft Defender for Endpoint * Microsoft Defender for Office 365 * Microsoft Defender for Identity * Microsoft Defender for Cloud Apps * Microsoft Defender Vulnerability Management * Cloud Security Cloud Security * Microsoft Defender for Cloud * Azure Firewall * Azure Web App Firewall * Azure DDoS Protection * GitHub Advanced Security * Endpoint security Endpoint security * Microsoft 365 Defender * Microsoft Defender for Endpoint * Microsoft Defender for IoT * Microsoft Defender for Business * Microsoft Defender Vulnerability Management * Identity Threat Protection Identity Threat Protection * Microsoft Defender for Identity * Azure AD Identity Protection * Risk Management & Privacy Risk Management & Privacy * Microsoft Purview Overview * Microsoft Purview Insider Risk Management * Microsoft Purview Communication Compliance * Microsoft Purview eDiscovery * Microsoft Purview Compliance Manager * Microsoft Priva Risk Management * Information Protection Information Protection * Microsoft Purview Overview * Microsoft Purview Information Protection * Microsoft Purview Data Lifecycle Management * Microsoft Purview Data Loss Prevention * Device Management Device Management * Microsoft Endpoint Manager * Services * Partners * Resources * Get started Get started * Customer stories * Security 101 * Product trials * How we protect Microsoft * Reports and analysis Reports and analysis * Microsoft Security Insider * Microsoft Digital Defense Report * Security Response Center * Community Community * Microsoft Security Blog * Microsoft Security Events * Microsoft Tech Community * Documentation and training Documentation and training * Documentation * Technical Content Library * Training & certifications * Additional sites Additional sites * Microsoft Trust Center * Security Engineering Portal * Service Trust Portal * Contact sales * More * Start free trial * All Microsoft * * Microsoft Security * Azure * Dynamics 365 * Microsoft 365 * Microsoft Teams * Windows 365 * Tech & innovation Tech & innovation * Microsoft Cloud * AI * Azure Space * Mixed reality * Microsoft HoloLens * Microsoft Viva * Quantum computing * Sustainability * Industries Industries * Education * Automotive * Financial services * Government * Healthcare * Manufacturing * Retail * All industries * Partners Partners * Find a partner * Become a partner * Partner Network * Find an advertising partner * Become an advertising partner * Azure Marketplace * AppSource * Resources Resources * Blog * Microsoft Advertising * Developer Center * Documentation * Events * Licensing * Microsoft Learn * Microsoft Research * View Sitemap Search Search Microsoft Security Cancel Microsoft showcases the future of comprehensive security at RSA 2022 May 16, 2022 • 4 min read MICROSOFT SHOWCASES THE FUTURE OF COMPREHENSIVE SECURITY AT RSA 2022 RSA 2022 is happening in person—find out about Microsoft-sponsored sessions, pre-day events, speakers, awards, and more. Read more Microsoft showcases the future of comprehensive security at RSA 2022 bars Category filters menu Recent articles Products and solutions * * See all * Azure Active Directory * Azure Information Protection * Microsoft 365 Defender * Microsoft 365 Security * Microsoft Authenticator * See all * Azure Active Directory * Azure Information Protection * Microsoft 365 Defender * Microsoft 365 Security * Microsoft Authenticator * * Microsoft Defender for Cloud * Microsoft Defender for Cloud Apps * Microsoft Defender for Endpoint * Microsoft Defender for Office 365 * Microsoft Endpoint Manager * Microsoft Graph Security API * Microsoft Defender for Cloud * Microsoft Defender for Cloud Apps * Microsoft Defender for Endpoint * Microsoft Defender for Office 365 * Microsoft Endpoint Manager * Microsoft Graph Security API * * Microsoft Sentinel * Office 365 Security * Secure Score * Windows Security * XDR * Microsoft Sentinel * Office 365 Security * Secure Score * Windows Security * XDR Topics * * See all * AI and machine learning * Automation * Cloud Access Security Broker * Compliance * Cybersecurity policy * Data governance * Email security * See all * AI and machine learning * Automation * Cloud Access Security Broker * Compliance * Cybersecurity policy * Data governance * Email security * * Encryption * Endpoint security * GDPR * Identity and access management * Incident response * Information/data protection * IoT * Mobile security * Encryption * Endpoint security * GDPR * Identity and access management * Incident response * Information/data protection * IoT * Mobile security * * Network security * Phishing * Privacy * Ransomware * Security deployment * Security intelligence * Security management * Security operations * Network security * Phishing * Privacy * Ransomware * Security deployment * Security intelligence * Security management * Security operations * * Security strategies * SIEM * Threat protection * XDR * Zero trust * Security strategies * SIEM * Threat protection * XDR * Zero trust Series * * See all * CISO series * Compliance and data governance * Identity and access management * Integrated Threat Protection * IoT security * Microsoft Detection and Response Team (DART) * See all * CISO series * Compliance and data governance * Identity and access management * Integrated Threat Protection * IoT security * Microsoft Detection and Response Team (DART) * * Microsoft Intelligent Security Association (MISA) * Microsoft Security Experts * Microsoft security intelligence * Secure remote work * Security deployment * Voice of the community * Voice of the customer * Microsoft Intelligent Security Association (MISA) * Microsoft Security Experts * Microsoft security intelligence * Secure remote work * Security deployment * Voice of the community * Voice of the customer Related blogs * * Azure Active Directory Identity * Microsoft 365 * Microsoft Endpoint Management * Microsoft Security Guidance * Microsoft Security Response Center * Security in Azure * Tech Community * Azure Active Directory Identity * Microsoft 365 * Microsoft Endpoint Management * Microsoft Security Guidance * Microsoft Security Response Center * Security in Azure * Tech Community Subscribe Featured image for Learn the latest cybersecurity techniques at the Microsoft Security Summit April 11, 2022 • 3 min read LEARN THE LATEST CYBERSECURITY TECHNIQUES AT THE MICROSOFT SECURITY SUMMIT On May 12, 2022, at the Microsoft Security Summit digital event, join other cybersecurity professionals in exploring how a comprehensive approach to security can empower organizations to innovate fearlessly—even in the face of evolving cyberthreats. Read more Learn the latest cybersecurity techniques at the Microsoft Security Summit Featured image for Forrester names Microsoft a Leader in 2022 Enterprise Detection and Response Wave™ report April 6, 2022 • 3 min read FORRESTER NAMES MICROSOFT A LEADER IN 2022 ENTERPRISE DETECTION AND RESPONSE WAVE™ REPORT Microsoft was named as a Leader in The Forrester Wave™: Enterprise Detection and Response for Q1 of 2022—the ninth Leader position for Microsoft Security in a Forrester Wave™. Read more Forrester names Microsoft a Leader in 2022 Enterprise Detection and Response Wave™ report Featured image for The final report on NOBELIUM’s unprecedented nation-state attack December 15, 2021 • 5 min read THE FINAL REPORT ON NOBELIUM’S UNPRECEDENTED NATION-STATE ATTACK In the final post of a four-part series on the NOBELIUM nation-state attack, we explore key findings from the after-action report on the attack. Read more The final report on NOBELIUM’s unprecedented nation-state attack Featured image for Preparing for your migration from on-premises SIEM to Azure Sentinel July 6, 2021 • 4 min read PREPARING FOR YOUR MIGRATION FROM ON-PREMISES SIEM TO AZURE SENTINEL Learn how to plan and prepare for migration from a traditional on-premises SIEM to Microsoft’s cloud-native SIEM for intelligent security analytics at cloud scale. Read more Preparing for your migration from on-premises SIEM to Azure Sentinel Featured image for Why we invite security researchers to hack Azure Sphere October 6, 2020 • 5 min read WHY WE INVITE SECURITY RESEARCHERS TO HACK AZURE SPHERE Fighting the security battle so our customers don’t have to IoT devices are becoming more prevalent in almost every aspect of our lives—we will rely on them in our homes, our businesses, as well as our infrastructure. In February, Microsoft announced the general availability of Azure Sphere, an integrated security solution for IoT devices and… Read more Why we invite security researchers to hack Azure Sphere Featured image for Microsoft Security—detecting empires in the cloud September 24, 2020 • 8 min read MICROSOFT SECURITY—DETECTING EMPIRES IN THE CLOUD Microsoft threat analysts have detected another evolution in GADOLINIUM’s tooling that the security community should understand when establishing defenses. Read more Microsoft Security—detecting empires in the cloud Featured image for STRONTIUM: Detecting new patterns in credential harvesting September 10, 2020 • 5 min read STRONTIUM: DETECTING NEW PATTERNS IN CREDENTIAL HARVESTING Microsoft has tied STRONTIUM to a newly uncovered pattern of Office365 credential harvesting activity aimed at US and UK organizations directly involved in political elections. Read more STRONTIUM: Detecting new patterns in credential harvesting Featured image for How can Microsoft Threat Protection help reduce the risk from phishing? August 26, 2020 • 4 min read HOW CAN MICROSOFT THREAT PROTECTION HELP REDUCE THE RISK FROM PHISHING? The true costs from phishing may be higher than you think. Microsoft Threat Protection can help you mitigate your risk. Read more How can Microsoft Threat Protection help reduce the risk from phishing? Featured image for Inside Microsoft 365 Defender: Solving cross-domain security incidents through the power of correlation analytics July 29, 2020 • 7 min read INSIDE MICROSOFT 365 DEFENDER: SOLVING CROSS-DOMAIN SECURITY INCIDENTS THROUGH THE POWER OF CORRELATION ANALYTICS Through deep correlation logic, Microsoft Threat Protection automatically finds links between related signals across domains. It connects related existing alerts and generates additional alerts where suspicious events that could otherwise be missed can be detected. Read more Inside Microsoft 365 Defender: Solving cross-domain security incidents through the power of correlation analytics Featured image for Inside Microsoft 365 Defender: Correlating and consolidating attacks into incidents July 9, 2020 • 4 min read INSIDE MICROSOFT 365 DEFENDER: CORRELATING AND CONSOLIDATING ATTACKS INTO INCIDENTS The incidents view in Microsoft Threat Protection empowers SOC analysts by automatically fusing attack evidence and providing a consolidated view of an attack chain and affected assets, as well as a single-click remediation with easy-to-read analyst workflows. Read more Inside Microsoft 365 Defender: Correlating and consolidating attacks into incidents Featured image for Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them July 2, 2020 • 2 min read AFTERNOON CYBER TEA: CYBERSECURITY & IOT: NEW RISKS AND HOW TO MINIMIZE THEM Every year billions of new connected devices come online. These devices enable businesses to finetune operations, optimize processes, and develop analytics-based services. Read more Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them Featured image for Best security, compliance, and privacy practices for the rapid deployment of publicly facing Microsoft Power Apps intake forms June 29, 2020 • 1 min read BEST SECURITY, COMPLIANCE, AND PRIVACY PRACTICES FOR THE RAPID DEPLOYMENT OF PUBLICLY FACING MICROSOFT POWER APPS INTAKE FORMS Security is a major concern of not only major governments but of other entities using Microsoft Power App intake forms. Read more Best security, compliance, and privacy practices for the rapid deployment of publicly facing Microsoft Power Apps intake forms * 1 * 2 * 3 * … * 10 * Next Page Get all the news, updates, and more at @MSFTSecurity twitter What's new * Surface Pro 8 * Surface Laptop Studio * Surface Pro X * Surface Go 3 * Surface Duo 2 * Surface Pro 7+ * Windows 11 apps * HoloLens 2 Microsoft Store * Account profile * Download Center * Microsoft Store support * Returns * Order tracking * Virtual workshops and training * Microsoft Store Promise * Flexible Payments Education * Microsoft in education * Devices for education * Microsoft Teams for Education * Microsoft 365 Education * Education consultation appointment * Educator training and development * Deals for students and parents * Azure for students Business * Microsoft Cloud * Microsoft Security * Dynamics 365 * Microsoft 365 * Microsoft Power Platform * Microsoft Teams * Microsoft Industry * Small Business Developer & IT * Azure * Developer Center * Documentation * Microsoft Learn * Microsoft Tech Community * Azure Marketplace * AppSource * Visual Studio Company * Careers * About Microsoft * Company news * Privacy at Microsoft * Investors * Diversity and inclusion * Accessibility * Sustainability English (United States) * Sitemap * Contact Microsoft * Privacy * Manage cookies * Terms of use * Trademarks * Safety & eco * About our ads * © Microsoft 2022