Enterprise Mobility and Security Blog

EMS_STB13_Joseph_01

Securing your digital transformation with Microsoft Enterprise Mobility + Security

Digital transformation highlights the growing need for securing corporate data as employees interact and collaborate across mobile devices and cloud apps. Microsoft is committed to delivering an innovative approach to securing this transition for our customers. Microsoft Enterprise Mobility + Security (EMS) delivers identity-driven security without getting in the way of your users’ productivity experience....

Continue reading

#AzureAD Mailbag: International Deployments Round 2

Hey y’all, Mark Morowczynski here with another Friday mailbag. I realize we’ve been sort of slacking on these for the last 2 months but we are looking to finish the calendar year strong. Key word being looking. We’ll continue last week’s topic of things to consider with international deployments. Let’s dive in.   Question 1:...

Continue reading

Now Available: Update 1610 for System Center Configuration Manager

Happy Friday! We are delighted to announce that we have released version 1610 for the Current Branch (CB) of System Center Configuration Manager that includes some great new features and product enhancements. We continue to see a strong adoption of the Current Branch model by our customers. There are now more than 25,000 organizations managing...

Continue reading

Combining your Skype account and your Microsoft account. You want to do this!

Howdy folks, You may have seen our recent announcement about how you can now use your Skype name to sign into all Microsoft apps and services. You may also have noticed that sign-in screens for Microsoft accounts now mention you can enter your Skype name in addition to your email address or phone number: This...

Continue reading

Microsoft Authenticator for Windows Phone is Generally Available!

Howdy folks, Back in July we blogged about our plan to combine the two different authenticator apps from Microsoft into one new app, Microsoft Authenticator. Since then, we’ve released the iOS and Android versions of the application and updated them both quite a few times. Today I’m happy to let you know that late last...

Continue reading

#AzureAD Mailbag: International Deployments

All right, it’s time for some mandatory fun! Chad here again – ready to talk about some FAQ’s. I’m taking on a different approach than before (we previously talked about Azure MFA and Azure AD Connect). In this Mailbag we will be shifting focus on something that should be near and dear to many folks...

Continue reading

#AzureAD: We’ve just turned on detailed auditing and sign-in logs in the new Azure portal!

Howdy folks, As you know, we turned on the public preview of the Azure AD admin experience with the new Azure portal just a couple months ago. At the time the preview went live, I promised we’d keep making improvements to create an experience with the all the capabilities of the classic portal and some...

Continue reading

Uncover insider threats, blind spots in your network with Advanced Threat Analytics

You’ve probably heard time and again that more than 63% of network intrusions are due to compromised user credentials. Once on the network, the adversary remains undetected for months. You’ve spent years building up your perimeter and have a comprehensive protection strategy in place. That said, attackers are still coming through and/or you are worried about...

Continue reading

Azure Information Protection and Cloud App Security integration: Extend control over your data to the cloud

At Ignite, we showcased the integration between Cloud App Security and Azure Information Protection in the Cloud App Security session and Azure Information Protection session. Today, we’re excited to share more about this integration and demonstrate how it helps in extending security for your data as it travels to the cloud. With the digital transformation...

Continue reading

Understanding ATA Suspicious Activity Alerts

Advanced Threat Analytics (ATA) detects a variety of suspicious activities (SA) in different phases of the attack-kill-chain. The information appears in the ATA console in a clear and efficient social network-type timeline that helps the security admin filter out noise to identify actual suspicious activities. ATA only raises alerts once it has aggregated suspicious activities...

Continue reading