Skip to content

Microsoft Secure

Recent Posts

Secure file storage 

This is a blog series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series you’ll find context, answers, and guidance for deployment and driving adoption within your organization. In this blog, we explain how Microsoft 365 security solutions enable your users to securely store and...Read more

Ignite 2018 highlights: password-less sign-in, confidential computing, new threat protection, and more 

What a week it was in Orlando! Ignite is always a biggie, and this one was no exception. At this year’s event we put even greater emphasis on providing attendees with access to engineering experts throughout more than 100 focused sessions, workshops, and hands-on immersion experiences for the latest technologies in security....Read more

Collaborate securely 

This is a blog series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series you’ll find context, answers, and guidance for deployment and driving adoption within your organization. In this blog, we explain how Microsoft 365 security solutions enable your users to collaborate securely....Read more

Delivering security innovation that puts Microsoft’s experience to work for you 

Cybersecurity is the central challenge of our digital age. Without it, everything from our personal email accounts and privacy to the way we do business, and all types of critical infrastructure, are under threat. As attackers evolve, staying ahead of these threats is getting harder. Microsoft can help. We focus on three areas: running security...Read more

Office VBA + AMSI: Parting the veil on malicious macros 

As part of our continued efforts to tackle entire classes of threats, Office 365 client applications now integrate with Antimalware Scan Interface (AMSI), enabling antivirus and other security solutions to scan macros and other scripts at runtime to check for malicious behavior. Macro-based threats have always been a prevalent entry point for malware, but we...Read more