Skip to content

Microsoft Secure


Recommendations for deploying the latest Attack surface reduction rules for maximum impact 

The keystone to good security hygiene is limiting your attack surface. Attack surface reduction is a technique to remove or constrain exploitable behaviors in your systems. In this blog, we discuss the two attack surface reduction rules introduced in the most recent release of Windows and cover suggested deployment methods and best practices. Software applications...Read more

Why the Pipeline Cybersecurity Initiative is a critical step 

Working together with government to push a more coordinated effort around infrastructure security—particularly pipelines and utilities—is critical. The new Pipeline Cybersecurity Initiative will help ensure that additional resources, information-sharing, and coordination will help mitigate additional cyber-related risks against the U.S. energy industry in the coming years....Read more

Step 5. Set up mobile device management: top 10 actions to secure your environment 

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 5. Set up mobile device management,” you’ll learn how to plan your Microsoft Intune deployment and set up Mobile Device Management (MDM) as part of your Unified Endpoint Management (UEM)...Read more

Solving the TLS 1.0 problem 

The “Solving the TLS 1.0 Problem” white paper outlines the latest recommendations that can help remove technical blockers to disabling TLS 1.0...Read more