www.microsoft.com Open in urlscan Pro
2a02:26f0:6c00:290::356e  Public Scan

URL: https://www.microsoft.com/security/blog/threat-protection/
Submission: On May 18 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

Name: searchFormGET https://www.microsoft.com/en-us/security/site-search

<form class="c-search" autocomplete="off" id="searchForm" name="searchForm" role="search" action="https://www.microsoft.com/en-us/security/site-search" method="GET" data-seautosuggest=""
  data-seautosuggestapi="https://www.microsoft.com/msstoreapiprod/api/autosuggest"
  data-m="{&quot;cN&quot;:&quot;GlobalNav_Search_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c1c9c3c1m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c1c9c3c1m1r1a1&quot;}" aria-expanded="false"
  style="overflow-x: visible;">
  <div class="x-screen-reader" aria-live="assertive"></div>
  <input id="cli_shellHeaderSearchInput" aria-label="Search Expanded" aria-controls="universal-header-search-auto-suggest-transparent" aria-owns="universal-header-search-auto-suggest-ul" type="search" name="q" role="text"
    placeholder="Search Microsoft Security" data-m="{&quot;cN&quot;:&quot;SearchBox_nav&quot;,&quot;id&quot;:&quot;n1c3c1c9c3c1m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c3c1c9c3c1m1r1a1&quot;}" data-toggle="tooltip" data-placement="right"
    title="Search Microsoft Security" style="overflow-x: visible;">
  <button id="search" aria-label="Search Microsoft Security" class="c-glyph" data-m="{&quot;cN&quot;:&quot;Search_nav&quot;,&quot;id&quot;:&quot;n2c3c1c9c3c1m1r1a1&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c3c1c9c3c1m1r1a1&quot;}"
    data-bi-mto="true" aria-expanded="false" style="overflow-x: visible;">
    <span role="presentation" style="overflow-x: visible;">Search</span>
    <span role="tooltip" class="c-uhf-tooltip c-uhf-search-tooltip" style="overflow-x: visible;">Search Microsoft Security</span>
  </button>
  <div class="m-auto-suggest" id="universal-header-search-auto-suggest-transparent" role="group" style="overflow-x: visible;">
    <ul class="c-menu" id="universal-header-search-auto-suggest-ul" aria-label="Search Suggestions" aria-hidden="true" data-bi-dnt="true" data-bi-mto="true" data-js-auto-suggest-position="default" role="listbox" data-tel="jsll"
      data-m="{&quot;cN&quot;:&quot;search suggestions_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c3c1c9c3c1m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c3c1c9c3c1m1r1a1&quot;}" style="overflow-x: visible;"></ul>
  </div>
</form>

Text Content

We use optional cookies to improve your experience on our websites, such as
through social media connections, and to display personalized advertising based
on your online activity. If you reject optional cookies, only cookies necessary
to provide you the services will be used. You may change your selection by
clicking “Manage Cookies” at the bottom of the page. Privacy Statement
Third-Party Cookies

Accept Reject Manage cookies
Skip to main content
Microsoft Edge is the only browser optimized for Windows. Maximize your PC
performance with features like Sleeping Tabs and Startup Boost.
Close Switch now
Skip to main content
Microsoft
Microsoft Security
Microsoft Security
Microsoft Security
 * Home
 * Solutions
    * Cloud security
    * Control and manage access
    * Information protection & governance
    * Ransomware
    * Secure remote work
    * Risk management
    * SIEM & XDR
    * Small & medium business
    * Zero Trust

 * Products
    * Identity & access management Identity & access management
      * Azure Active Directory
      * CloudKnox Permissions Management
      * Verifiable credentials in Azure AD
      * Azure Key Vault
    * SIEM & XDR SIEM & XDR
      * Microsoft Sentinel
      * Microsoft Defender for Cloud
      * Microsoft 365 Defender
      * Microsoft Defender for Endpoint
      * Microsoft Defender for Office 365
      * Microsoft Defender for Identity
      * Microsoft Defender for Cloud Apps
      * Microsoft Defender Vulnerability Management
    * Cloud Security Cloud Security
      * Microsoft Defender for Cloud
      * Azure Firewall
      * Azure Web App Firewall
      * Azure DDoS Protection
      * GitHub Advanced Security
    * Endpoint security Endpoint security
      * Microsoft 365 Defender
      * Microsoft Defender for Endpoint
      * Microsoft Defender for IoT
      * Microsoft Defender for Business
      * Microsoft Defender Vulnerability Management
    * Identity Threat Protection Identity Threat Protection
      * Microsoft Defender for Identity
      * Azure AD Identity Protection
    * Risk Management & Privacy Risk Management & Privacy
      * Microsoft Purview Overview
      * Microsoft Purview Insider Risk Management
      * Microsoft Purview Communication Compliance
      * Microsoft Purview eDiscovery
      * Microsoft Purview Compliance Manager
      * Microsoft Priva Risk Management
    * Information Protection Information Protection
      * Microsoft Purview Overview
      * Microsoft Purview Information Protection
      * Microsoft Purview Data Lifecycle Management
      * Microsoft Purview Data Loss Prevention
    * Device Management Device Management
      * Microsoft Endpoint Manager

 * Services
 * Partners
 * Resources
    * Get started Get started
      * Customer stories
      * Security 101
      * Product trials
      * How we protect Microsoft
    * Reports and analysis Reports and analysis
      * Microsoft Security Insider
      * Microsoft Digital Defense Report
      * Security Response Center
    * Community Community
      * Microsoft Security Blog
      * Microsoft Security Events
      * Microsoft Tech Community
    * Documentation and training Documentation and training
      * Documentation
      * Technical Content Library
      * Training & certifications
    * Additional sites Additional sites
      * Microsoft Trust Center
      * Security Engineering Portal
      * Service Trust Portal

 * Contact sales
 * More
 * Start free trial

 * All Microsoft
    * * Microsoft Security
      * Azure
      * Dynamics 365
      * Microsoft 365
      * Microsoft Teams
      * Windows 365
    * Tech & innovation Tech & innovation
      * Microsoft Cloud
      * AI
      * Azure Space
      * Mixed reality
      * Microsoft HoloLens
      * Microsoft Viva
      * Quantum computing
      * Sustainability
    * Industries Industries
      * Education
      * Automotive
      * Financial services
      * Government
      * Healthcare
      * Manufacturing
      * Retail
      * All industries
    * Partners Partners
      * Find a partner
      * Become a partner
      * Partner Network
      * Find an advertising partner
      * Become an advertising partner
      * Azure Marketplace
      * AppSource
    * Resources Resources
      * Blog
      * Microsoft Advertising
      * Developer Center
      * Documentation
      * Events
      * Licensing
      * Microsoft Learn
      * Microsoft Research
    * View Sitemap


Search Search Microsoft Security

Cancel
Microsoft showcases the future of comprehensive security at RSA 2022
May 16, 2022 • 4 min read


MICROSOFT SHOWCASES THE FUTURE OF COMPREHENSIVE SECURITY AT RSA 2022

RSA 2022 is happening in person—find out about Microsoft-sponsored sessions,
pre-day events, speakers, awards, and more.

Read more Microsoft showcases the future of comprehensive security at RSA 2022
bars Category filters menu
Recent articles
Products and solutions
 *  * See all
    * Azure Active Directory
    * Azure Information Protection
    * Microsoft 365 Defender
    * Microsoft 365 Security
    * Microsoft Authenticator
   
   * See all
   * Azure Active Directory
   * Azure Information Protection
   * Microsoft 365 Defender
   * Microsoft 365 Security
   * Microsoft Authenticator
 *  * Microsoft Defender for Cloud
    * Microsoft Defender for Cloud Apps
    * Microsoft Defender for Endpoint
    * Microsoft Defender for Office 365
    * Microsoft Endpoint Manager
    * Microsoft Graph Security API
   
   * Microsoft Defender for Cloud
   * Microsoft Defender for Cloud Apps
   * Microsoft Defender for Endpoint
   * Microsoft Defender for Office 365
   * Microsoft Endpoint Manager
   * Microsoft Graph Security API
 *  * Microsoft Sentinel
    * Office 365 Security
    * Secure Score
    * Windows Security
    * XDR
   
   * Microsoft Sentinel
   * Office 365 Security
   * Secure Score
   * Windows Security
   * XDR

Topics
 *  * See all
    * AI and machine learning
    * Automation
    * Cloud Access Security Broker
    * Compliance
    * Cybersecurity policy
    * Data governance
    * Email security
   
   * See all
   * AI and machine learning
   * Automation
   * Cloud Access Security Broker
   * Compliance
   * Cybersecurity policy
   * Data governance
   * Email security
 *  * Encryption
    * Endpoint security
    * GDPR
    * Identity and access management
    * Incident response
    * Information/data protection
    * IoT
    * Mobile security
   
   * Encryption
   * Endpoint security
   * GDPR
   * Identity and access management
   * Incident response
   * Information/data protection
   * IoT
   * Mobile security
 *  * Network security
    * Phishing
    * Privacy
    * Ransomware
    * Security deployment
    * Security intelligence
    * Security management
    * Security operations
   
   * Network security
   * Phishing
   * Privacy
   * Ransomware
   * Security deployment
   * Security intelligence
   * Security management
   * Security operations
 *  * Security strategies
    * SIEM
    * Threat protection
    * XDR
    * Zero trust
   
   * Security strategies
   * SIEM
   * Threat protection
   * XDR
   * Zero trust

Series
 *  * See all
    * CISO series
    * Compliance and data governance
    * Identity and access management
    * Integrated Threat Protection
    * IoT security
    * Microsoft Detection and Response Team (DART)
   
   * See all
   * CISO series
   * Compliance and data governance
   * Identity and access management
   * Integrated Threat Protection
   * IoT security
   * Microsoft Detection and Response Team (DART)
 *  * Microsoft Intelligent Security Association (MISA)
    * Microsoft Security Experts
    * Microsoft security intelligence
    * Secure remote work
    * Security deployment
    * Voice of the community
    * Voice of the customer
   
   * Microsoft Intelligent Security Association (MISA)
   * Microsoft Security Experts
   * Microsoft security intelligence
   * Secure remote work
   * Security deployment
   * Voice of the community
   * Voice of the customer

Related blogs
 *  * Azure Active Directory Identity
    * Microsoft 365
    * Microsoft Endpoint Management
    * Microsoft Security Guidance
    * Microsoft Security Response Center
    * Security in Azure
    * Tech Community
   
   * Azure Active Directory Identity
   * Microsoft 365
   * Microsoft Endpoint Management
   * Microsoft Security Guidance
   * Microsoft Security Response Center
   * Security in Azure
   * Tech Community

Subscribe
Featured image for Learn the latest cybersecurity techniques at the Microsoft
Security Summit
April 11, 2022 • 3 min read


LEARN THE LATEST CYBERSECURITY TECHNIQUES AT THE MICROSOFT SECURITY SUMMIT

On May 12, 2022, at the Microsoft Security Summit digital event, join other
cybersecurity professionals in exploring how a comprehensive approach to
security can empower organizations to innovate fearlessly—even in the face of
evolving cyberthreats.
Read more Learn the latest cybersecurity techniques at the Microsoft Security
Summit
Featured image for Forrester names Microsoft a Leader in 2022 Enterprise
Detection and Response Wave™ report
April 6, 2022 • 3 min read


FORRESTER NAMES MICROSOFT A LEADER IN 2022 ENTERPRISE DETECTION AND RESPONSE
WAVE™ REPORT

Microsoft was named as a Leader in The Forrester Wave™: Enterprise Detection and
Response for Q1 of 2022—the ninth Leader position for Microsoft Security in a
Forrester Wave™.
Read more Forrester names Microsoft a Leader in 2022 Enterprise Detection and
Response Wave™ report
Featured image for The final report on NOBELIUM’s unprecedented nation-state
attack
December 15, 2021 • 5 min read


THE FINAL REPORT ON NOBELIUM’S UNPRECEDENTED NATION-STATE ATTACK

In the final post of a four-part series on the NOBELIUM nation-state attack, we
explore key findings from the after-action report on the attack.
Read more The final report on NOBELIUM’s unprecedented nation-state attack
Featured image for Preparing for your migration from on-premises SIEM to Azure
Sentinel
July 6, 2021 • 4 min read


PREPARING FOR YOUR MIGRATION FROM ON-PREMISES SIEM TO AZURE SENTINEL

Learn how to plan and prepare for migration from a traditional on-premises SIEM
to Microsoft’s cloud-native SIEM for intelligent security analytics at cloud
scale.
Read more Preparing for your migration from on-premises SIEM to Azure Sentinel
Featured image for Why we invite security researchers to hack Azure Sphere
October 6, 2020 • 5 min read


WHY WE INVITE SECURITY RESEARCHERS TO HACK AZURE SPHERE

Fighting the security battle so our customers don’t have to IoT devices are
becoming more prevalent in almost every aspect of our lives—we will rely on them
in our homes, our businesses, as well as our infrastructure. In February,
Microsoft announced the general availability of Azure Sphere, an integrated
security solution for IoT devices and…
Read more Why we invite security researchers to hack Azure Sphere
Featured image for Microsoft Security—detecting empires in the cloud
September 24, 2020 • 8 min read


MICROSOFT SECURITY—DETECTING EMPIRES IN THE CLOUD

Microsoft threat analysts have detected another evolution in GADOLINIUM’s
tooling that the security community should understand when establishing
defenses.
Read more Microsoft Security—detecting empires in the cloud
Featured image for STRONTIUM: Detecting new patterns in credential harvesting
September 10, 2020 • 5 min read


STRONTIUM: DETECTING NEW PATTERNS IN CREDENTIAL HARVESTING

Microsoft has tied STRONTIUM to a newly uncovered pattern of Office365
credential harvesting activity aimed at US and UK organizations directly
involved in political elections.
Read more STRONTIUM: Detecting new patterns in credential harvesting
Featured image for How can Microsoft Threat Protection help reduce the risk from
phishing?
August 26, 2020 • 4 min read


HOW CAN MICROSOFT THREAT PROTECTION HELP REDUCE THE RISK FROM PHISHING?

The true costs from phishing may be higher than you think. Microsoft Threat
Protection can help you mitigate your risk.
Read more How can Microsoft Threat Protection help reduce the risk from
phishing?
Featured image for Inside Microsoft 365 Defender: Solving cross-domain security
incidents through the power of correlation analytics
July 29, 2020 • 7 min read


INSIDE MICROSOFT 365 DEFENDER: SOLVING CROSS-DOMAIN SECURITY INCIDENTS THROUGH
THE POWER OF CORRELATION ANALYTICS

Through deep correlation logic, Microsoft Threat Protection automatically finds
links between related signals across domains. It connects related existing
alerts and generates additional alerts where suspicious events that could
otherwise be missed can be detected.
Read more Inside Microsoft 365 Defender: Solving cross-domain security incidents
through the power of correlation analytics
Featured image for Inside Microsoft 365 Defender: Correlating and consolidating
attacks into incidents
July 9, 2020 • 4 min read


INSIDE MICROSOFT 365 DEFENDER: CORRELATING AND CONSOLIDATING ATTACKS INTO
INCIDENTS

The incidents view in Microsoft Threat Protection empowers SOC analysts by
automatically fusing attack evidence and providing a consolidated view of an
attack chain and affected assets, as well as a single-click remediation with
easy-to-read analyst workflows.
Read more Inside Microsoft 365 Defender: Correlating and consolidating attacks
into incidents
Featured image for Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how
to minimize them
July 2, 2020 • 2 min read


AFTERNOON CYBER TEA: CYBERSECURITY & IOT: NEW RISKS AND HOW TO MINIMIZE THEM

Every year billions of new connected devices come online. These devices enable
businesses to finetune operations, optimize processes, and develop
analytics-based services.
Read more Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to
minimize them
Featured image for Best security, compliance, and privacy practices for the
rapid deployment of publicly facing Microsoft Power Apps intake forms
June 29, 2020 • 1 min read


BEST SECURITY, COMPLIANCE, AND PRIVACY PRACTICES FOR THE RAPID DEPLOYMENT OF
PUBLICLY FACING MICROSOFT POWER APPS INTAKE FORMS

Security is a major concern of not only major governments but of other entities
using Microsoft Power App intake forms.
Read more Best security, compliance, and privacy practices for the rapid
deployment of publicly facing Microsoft Power Apps intake forms
 * 1
 * 2
 * 3
 * …
 * 10
 * Next Page

Get all the news, updates, and more at
@MSFTSecurity twitter

What's new
 * Surface Pro 8
 * Surface Laptop Studio
 * Surface Pro X
 * Surface Go 3
 * Surface Duo 2
 * Surface Pro 7+
 * Windows 11 apps
 * HoloLens 2

Microsoft Store
 * Account profile
 * Download Center
 * Microsoft Store support
 * Returns
 * Order tracking
 * Virtual workshops and training
 * Microsoft Store Promise
 * Flexible Payments

Education
 * Microsoft in education
 * Devices for education
 * Microsoft Teams for Education
 * Microsoft 365 Education
 * Education consultation appointment
 * Educator training and development
 * Deals for students and parents
 * Azure for students

Business
 * Microsoft Cloud
 * Microsoft Security
 * Dynamics 365
 * Microsoft 365
 * Microsoft Power Platform
 * Microsoft Teams
 * Microsoft Industry
 * Small Business

Developer & IT
 * Azure
 * Developer Center
 * Documentation
 * Microsoft Learn
 * Microsoft Tech Community
 * Azure Marketplace
 * AppSource
 * Visual Studio

Company
 * Careers
 * About Microsoft
 * Company news
 * Privacy at Microsoft
 * Investors
 * Diversity and inclusion
 * Accessibility
 * Sustainability

English (United States)
 * Sitemap
 * Contact Microsoft
 * Privacy
 * Manage cookies
 * Terms of use
 * Trademarks
 * Safety & eco
 * About our ads
 * © Microsoft 2022