18 Apr 2018

Windows Template Studio 2.0 is now available!

Author: Clint Rutkas
Go to Source

Windows Template Studio has released our 2.0 release and can’t wait for everyone to create some amazing applications with it. Template Studio is an open source project whose sole goal is to get you building applications quicker with best practices with a solid initial code base.

We’re extremely proud of our community driven project and the massive contributions / partnerships we’ve had with you over the past year since we launched.

Windows Template Studio 2.0

How to get the update:

There are two paths to update to the newest build.

  • Already installed: Visual Studio should auto update the extension. To force an update, Go to Tools->Extensions and Updates. Then go to Update expander on the left, and you should see Windows Template Studio in there, and click “Update.”
  • Not installed:Head to https://aka.ms/wtsinstall, click “download,” and double click the VSIX installer.

What has happened under the hood?

We’ve done a lot of work improving the user interface and being sure we’re fully accessible for all developers. By partnering with the Visual Studio team, we feel the new interface is faster and more approachable. We’ve improved our template updating experience, our actual templates and much more. Our wizard also now detects dark, light and high contrast modes of Visual Studio.

In addition, once the next update to Windows 10 is released, we’ll adopt the platform NavigationView control over the UWP Community Toolkit’s great Hamburger menu control, which already does do a smart flip between their classic and the platform control. We’re currently working on documentation to aid in that transition between the existing control and the new platform control as well.

Documentation, everyone’s favorite friend

We are pushing hard on improving our docs and will continue to do so. Over time, most of our docs will migrate to docs.microsoft.com that cover our templates and using the actual wizard. The docs that will stay on WTS’s GitHub will be docs on modifying the engine or creating a template for the wizard to consume.

Future progress, getting updates and community interaction

Moving forward, we’ll continue to push hard and add in new features and templates.

Some of our largest additions, bugs and best feature ideas came from you, the community. The WTS team are extremely honored to have been a part of this and everyone that has filed a bug to submit a PR, you should too. We encourage everyone to log bugs, submit feature requests, and contribute back at https://aka.ms/wts on GitHub.

Go to Source

Share this
17 Apr 2018
17 Apr 2018

Windows 10 Tip: Five things you might not know you can do right now with your Windows 10 PC

Author: Elana Pidgeon
Go to Source

 1. Choose your performance and battery balance

The new Performance/Power slider

The new Performance/Power slider lets you set the right balance between battery-life longevity and system performance and responsiveness.* Optimize for battery life on a long flight; go with performance when you’re gaming or photo editing at home.**

Simply click on the battery icon in the taskbar and use the slider to choose your performance and battery balance.

2. Travel easier with the built-in currency converter

Open Calculator, click on the menu button on the left, and select what you’d like to convert

Just open Calculator, click on the menu button on the left, and select what you’d like to convert.* It also includes converters for things like time, power and temperature – so you can easily, quickly convert from Fahrenheit to Celsius and back again. If you’re browsing in Microsoft Edge, you can also simply type the currency you want to convert into the address bar and it will convert it for you.

3. Annotate your books in Microsoft Edge

Annotate your books in Microsoft Edge

Easily personalize your books when you’re reading in Microsoft Edge* by adding highlights in four colors, underlining, adding comments or copying text. To see the menu with these options, simply highlight the preferred word or sentence with your mouse or finger. You can also select the Cortana icon from the same menu to find more information about the content you are reading without leaving the reading experience.

Get started by downloading a book to personalize from the Books section in the Microsoft Store!

4. Lower the blue light emitted from your PC with Night light

To get started with Night light, go to Settings (or Windows key + I), click on System, and, under Display, click to turn Night light on or off.

By reducing the blue light emitted by your screen, the Night light feature helps you sleep better.*** To get started, head to the search box on your taskbar and search for “Night light” – or, go to Settings (Windows key + I), click on System, and, under Display, click to turn Night light on or off. You can also customize the color temperature or schedule by clicking “Night light settings.”

5.  Pin your favorite websites to the taskbar

Pin to Taskbar

You can pin your favorite websites to the taskbar and have the icon show up in the taskbar for instant access when you browse in Microsoft Edge – just head to the menu, select “Pin this page to the taskbar,” and watch the site icon appear on your Windows taskbar!*

*Requires the Windows 10 Fall Creators Update or higher.
**Available on most Intel and AMD devices with battery.
***Available on select Windows 10 PCs running the Windows 10 Creators Update or higher.

Go to Source

Share this
17 Apr 2018

Windows Hello and FIDO2 Security Keys enable secure and easy authentication for shared devices

Author: Pieter Wigleven
Go to Source

We have been on a journey to eliminate passwords. Today, we are delighted to announce an important milestone.

Microsoft has been aligned with the Fast Identity Online (FIDO) working group from the start, the alliance represents 250 organizations from various industries on a joint mission to replace passwords with an easy to use strong credential. With the recent ratification of FIDO2 security keys by the FIDO working group, we’re updating Windows Hello to enable secure authentication for many new scenarios.

FIDO2 Security Key

FIDO2 Security Key

Imagine a helpdesk scenario where an employee can walk up to any device and simply log in using Windows Hello and not username and password. Another scenario is hospital medical staff that need access a patient records on a device no matter where the patient is located. Or a public-sector organization that wants secure authentication on devices while adhering to security policies and directives where the users credential needs to be physically separate from the device itself.

Microsoft and its partners have been working together on FIDO2 security keys for Windows Hello to enable easy and secure authentication on shared devices. Security keys allow you to carry your credential with you and safely authenticate to an Azure AD joined Windows 10 PC that’s part of your organization. A user can walk up to any device belonging to the organization and authenticate in a secure way – no need to enter a username and password or set-up Windows Hello beforehand. Unlike traditional passwords, these keys rely on high-security, public-key cryptography to provide strong authentication. These keys have all the benefits of a Trusted Platform Module (TPM) while also being portable enabling the increasing number of mobile workers.

FIDO2 compliant security keys provide secure authentication, independent of the form factor. The security key holds your credential and can be protected with an additional second factor like fingerprint (integrated into the security key) or a PIN to be entered at the Windows sign-in.

Our partners are working on a variety of security key form factors. Some examples include USB security keys and NFC enabled smartcards, just to name a few. We are looking forward to seeing new form factors and possibly applications on your phone that comply with the FIDO2 specification.

Here’s a glimpse into the security keys from our partners we’ve been working closely with

Yubico – Security key for Windows Hello

HID – Security key for Windows Hello

Feitian – Security key for Windows Hello with biometric sensor

The Windows Hello FIDO2 Security Key feature is now in limited preview. Please let us know if you would like to be added to the waitlist.

Go to Source

Share this
17 Apr 2018

New capabilities of Windows Defender ATP further maximizing the effectiveness and robustness of endpoint security

Author: Moti Gindi
Go to Source

Our mission is to empower every person and every organization on the planet to achieve more. A trusted and secure computing environment is a critical component of our approach. When we introduced Windows Defender Advanced Threat Protection (ATP) more than two years ago, our target was to leverage the power of the cloud, built-in Windows security capabilities and artificial intelligence (AI) to enable our customers’ to stay one step ahead of the cyber-challenges.

With the next update to Windows 10, we are further expanding Windows Defender ATP to provide richer capabilities for businesses to improve their security posture and solve security incidents more quickly and efficiently. Let’s dive in into these new capabilities in more detail.

Automatic investigation and remediation of threats

Now you can go from alert to remediation in minutes—at scale! Automated investigation and response dramatically reduces the volume of alerts that security analysts need to handle. It uses artificial intelligence to investigate alerts, exercise in minutes sophisticated playbooks mimicking the best human analysts’ decisions and forensic processes, determine if a threat is active, its origin and then decide the appropriate steps to automatically remediate it. When Windows Defender ATP identifies that the incident includes multiple machines, it automatically expands the investigation across the entire scope of breach and performs the required actions on those in parallel. Threat investigation and remediation decisions can be taken automatically by Windows Defender ATP based on extensive historical data collected, stored and analyzed in our cloud (“time travel”).

With the new security automation capabilities, Windows Defender ATP can now prevent and find breaches; it can fix them. These actions can be set to run automatically for simple, clear-cut cases, or can be reviewed prior to execution. Either way, time and effort are saved by SecOps, enabling those talented professionals to focus on more complex and strategic problems. In addition, the organization’s security team moves faster, thereby better executing on their critical mission.

Microsoft 365 conditional access based on device-risk

If a threat gets detected, the next logical step would be to block access to your sensitive business data from the device while the threat is still active. This is now possible! We worked with our colleagues from the Microsoft Intune and Azure Active Directory (AAD) team, to enrich one of our most popular security scenarios of Microsoft 365 conditional access.

Available in the next update, the dynamic machine risk level can be used to define corporate access policies and prevent risk to corporate data.

As an example, if a bad threat lands on your endpoints, even using the most advanced file less attacks, Windows Defender ATP can detect it and automatically protect your precious corporate information through conditional access. In parallel, Windows Defender ATP will start an automated investigation to quickly remediate the threat. Once the threat is remediated, based on the preference set (automatic or reviewed), the risk level is set back to “no risk” – and access is granted again.

With Windows Defender ATP, you can now control access based on the risk level of the device itself, helping to ensure devices are always trusted.

Advanced hunting

When it comes to more complex issues, security analysts seek rich optics and the right tools to quickly hunt and investigate. We developed a new, powerful query-based search that we call Advanced Hunting designed to unleash the hunter in you.

With Advanced Hunting, you can proactively hunt and investigate across your organization’s data. From new process creation, file modification, machine login, network communication, registry update, remediation actions and many other event types – are entities you can now easily query, correlate and intersect. Advanced hunting is an integral part of our investigation experience, so your hunting results, such as machines and files, can leverage the rich set of features we already provide in Windows Security Center (correlate with worldwide information, VT data, trigger block or containment actions etc.)

To help you get started, we added a set of sample queries within the tool, and we also have a project on GitHub which contains additional sample queries.

Here’s a sample query which hunts for persistence or privilege escalation done by attaching a debugger process to Windows accessibility processes.

| where RegistryKey startswith @"HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options" 

    and RegistryValueName contains "debugger" 

    and isnotempty(RegistryValueData) 

// Parse the debugged process name from the registry key 

| parse RegistryKey with @"HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options" DebuggedFile 

| where DebuggedFile in~ ("utilman.exe","osk.exe","magnify.exe","narrator.exe","displayswitch.exe","atbroker.exe","sethc.exe", "helppane.exe")  

| project Technique="AttachedDebugger", DebuggedFile, DebuggerCommandline=RegistryValueData, InitiatingProcessCommandLine, EventTime, ComputerName 

Signal sharing across the Intelligent Security Graph

Our services also learn from each other. Through the Microsoft Intelligent Security Graph (ISG) we share detections to automatically update our protection and detection mechanism across Microsoft 365 and orchestrate remediation. For example, if a threat gets detected by any of the Windows Defender ATP components, that threat will instantly be blocked if it is encountered through an email that is protected by Office 365 ATP – and the other way around.

When it comes to investigating threats, other Microsoft ATP services might have information important to understanding the full picture. We are excited to share that we are expanding how Windows, Office, and now Azure Advanced Threat Protection (ATP) work together. We are providing wider Advanced Threat Protection coverage across identities (Azure ATP), apps and data (Office 365 ATP) and devices (Windows Defender ATP). This means relevant information is displayed right at your fingertips and seamless navigation between the consoles without losing context.

We added improved prevention for ransomware, exploits and advanced attacks.

Attackers are using new techniques like “fileless” attacks to compromise and deliver ransomware and other types of malware. To address these types of threats we significantly improved our existing exploit protection and behavior monitoring techniques which are already consistently earning top scores on independent tests to protect from these scenarios. Cloud protection has also been updated to inspect and block a broader range of content types (e.g.: java scripts, macros, and documents) regardless of whether it was downloaded from the web, USB stick, etc.

We’ve added new capabilities to prevent unauthorized lateral movement and new techniques to address aggressive ransomware attacks that attempt to render devices unbootable through boot sector tampering (e.g.: NotPetya).

Faster performance and reaction times to fast-moving outbreaks have also been added. The Intelligent Security Graph can now be used to instantly update devices with the latest dynamic intelligence as soon as a new outbreak is detected.  We’ve also added new accelerated memory scanning capability which takes advantage of Intel’s Threat Detection Technology (TDT). This capability leverages Intel’s integrated graphics processor to live-scan memory for advanced threats offering improved performance, user experience, and better battery life.

Microsoft Secure Score

We all know that fixing a problem before it happens, is the best way to keep you safe. Windows Secure Score does this by helping you run reports on your devices’ security posture and providing actionable recommendations, ensuring your entire organization is fortified against the next attack. But we know that the security state of devices is not everything, that’s why we display your Secure Score across Windows and Office in a single view with the Microsoft Secure Score.

If you’re worried about the latest threat, we’ve got you covered with a new dashboard that provides insights about the exposure level of your organization – currently for the Meltdown and Spectre vulnerability, so you can easily understand what machines are still exposed. This includes information about your network, operating system updates, and microcode level information against these threats.

Windows Defender ATP today

These new Windows Defender ATP innovations place an emphasis on leveraging intelligence, cloud, and analytics to build deeper levels of advanced threat protection for our customers. We are expanding the platform coverage beyond Windows 10: Windows Defender ATP is now built into Windows Server 2019, is currently in private preview for Windows 7 and 8.1 with general availability coming soon, and extends across macOS, Linux, iOS, and Android devices through our Microsoft Intelligent Security Association.

All these new capabilities are already available in Public Preview today. Sign up for a 90-day trial of Windows Defender ATP today or enable Preview features on existing tenants.

Go to Source

Share this
16 Apr 2018

Announcing Windows 10 Insider Preview Build 17134 for Fast

Author: Dona Sarkar
Go to Source

Hello Windows Insiders!

Today, we are releasing Windows 10 Insider Preview Build 17134 (RS4) to Windows Insiders in the Fast ring. This build has no new features and includes the fixes from KB4100375 as well as some fixes for general reliability of the OS. As Build 17133 progressed through the rings, we discovered some reliability issues we wanted to fix. In certain cases, these reliability issues could have led to a higher percentage of (BSOD) on PCs for example. Instead of creating a Cumulative Update package to service these issues, we decided to create a new build with the fixes included. This just reinforces that Windows Insiders are critical to helping us find and fix issues before releasing feature updates to all our customers so thank you!

No downtime for Hustle-As-A-Service,
Dona <3

Go to Source

Share this
16 Apr 2018

Preparing for a new era in privacy regulation with the Microsoft Cloud

Author: the Microsoft 365 team
Go to Source

Microsoft has extensive expertise in protecting data, championing privacy, and complying with complex regulations. Microsoft adheres to a set of privacy principals and offers EU Model Clauses to all customers. We believe that the General Data Protection Regulation (GDPR) is an important step forward for clarifying and enabling individual privacy rights.

As the GDPR enforcement date nears, your organization may soon need to demonstrate that it has taken appropriate steps to protect your customers’ personal data in response to regulatory audits and information requests.

Implementing appropriate security controls is a key step to demonstrating accountability. Equally important is putting the right processes in place—such as responding to a Data Subject Request (DSR) and providing a breach notification—to help you be GDPR compliant and gain the trust of your customers.

Today, we are announcing several new resources and capabilities to help you respond to GDPR obligations with the Microsoft Cloud. These updates include:

  • Public preview of new privacy resources across the Microsoft Cloud.
  • New capabilities to help with DSRs across Microsoft Cloud services for GDPR.
  • New audit-ready, privileged access management capabilities in Office 365.
  • Enabling a single Office 365 tenant to span across multiple Office 365 datacenter geographies.

Read on for more details and several other updates.

Enhance your ability to meet GDPR obligations with the Service Trust Portal

To support GDPR, today we are announcing the public preview of new GDPR-related tools and resources—including DSRs and data breach notifications for Office 365, Dynamics 365, Azure, Windows, Intune, and Professional Services on the Service Trust Portal.

The GDPR resources include documentation on data breach notifications, which describes when and how Microsoft will notify you and others about personal data breaches, what information Microsoft will provide, and the tools you can use to help ensure the right people in your organization are notified.

We have centralized all our DSR resources into a single page, which provides tools you can leverage in the Office 365 Security & Compliance Center and the Azure Admin Center—along with documents to guide you through the process of locating, exporting, and erasing data from a Microsoft Cloud service.

Visit Service Trust Portal privacy resources to learn more.

Responding to DSRs across Microsoft Cloud services

To support DSRs across Microsoft Cloud services, we are implementing several new capabilities—including a Data Privacy tab in Office 365, an Azure DSR portal, and new DSR search capabilities in Dynamics 365.

  • Office 365 Data Privacy tab—To help you effectively and efficiently manage your Office 365 related DSRs, we added the Data Privacy tab (in preview) to the Office 365 Security & Compliance Center. Under the Data Privacy tab, you will find a section dedicated to GDPR, which includes documentation and resources to help you on your GDPR journey, as well as a tab dedicated to the execution of a DSR.

The new DSR experience is designed to provide you with the tools to create a case for a data subject request, search and refine relevant data across Office 365 locations—such as Exchange, SharePoint, OneDrive, Groups, and now Microsoft Teams—and export the data.

One DSR scenario an organization may encounter is when a departing employee requests that their data is provided to them. To help with this scenario and others like it, the Event-based retention feature of Advanced Data Governance is now generally available for Office 365 E5 customers.

To see how the DSR experience in Office 365 works, watch the Mechanics video:


  • Azure DSR portal—We plan to release the ability to process Azure DSRs before the May 25, 2018 GDPR compliance deadline. Azure tenant admins will have a simple, powerful tool to quickly process the DSR for GDPR. Using the Azure DSR portal, tenant admins can identify information associated with a user and then correct, amend, delete, or export the user’s data. Admins can also identify information associated with a data subject and will be able to execute DSRs against system-generated logs (data Microsoft generates to provide a given service).

Azure DSR portal to help process a DSR.

To learn more, visit the Azure blog.

  • Dynamics 365 DSR search capabilities—To help customers respond to DSRs in Dynamics 365, we are providing two new search capabilities: Relevance Search and the Person Search Report. Relevance Search gives you a fast and simple way to find what you are looking for and is powered by Azure Search. The Person Search report offers a pre-packaged set of extendible entities, which Microsoft authored, to identify personal data that is used to define a person and the roles they might be assigned to.

Handling data breaches under the new GDPR regulations

For GDPR, organizations must meet stricter requirements in the event of a data breach. This includes notifying both regulators and those impacted by a breach—generally within 72 hours of becoming aware of a data breach. Microsoft 365 has a robust set of capabilities that can help protect, detect, and respond to data breaches. For example, Office 365 Advanced Threat Protection (ATP) protects an organization’s Office 365 ecosystem by helping prevent malicious emails or business critical files from compromising a user account. Windows Defender ATP focuses on protecting against malicious web-based files or device malware from corrupting a user account.

ATP Safe Attachments blocking malicious email attachment.

In the event Microsoft identifies a personal data breach as defined by the GDPR, we will notify your tenant administrator. Additionally, we recommend that you also designate a privacy contact alias in Azure Active Directory who will also be notified in addition to notification of admins.

Collecting, processing, and reviewing user consent with Azure Active Directory

With GDPR, companies now need a way to process consent from a user as well as have audit-ready reporting. With Azure Active Directory terms of use, organizations now have an easy way to collect, process, and review user consent. You can require a user to view and consent to your organization’s terms of use before they’re able access to an application. ​The terms can be any document relevant to your organization’s business or legal policies.

Example of an Azure Active Directory terms of use with multiple languages.

To learn more, review our Azure Active Directory terms of use documentation.

Leverage audit-ready controls for privileged admin access

While organizations look to minimize the risk of data breaches from threats to privileged accounts, they are also finding that they need to respond to regulators and provide a documented trail of privileged access, which outlines the scenario of how a customer’s data is accessed. To help organizations protect their data and respond to these compliance obligations, today we are introducing new privileged access management capabilities in Microsoft 365—which provide audit-ready access controls that are time bound and can limit the scope of data access.

With privileged access management in Office 365, you can better protect your data by tracking or enforcing an approval workflow scoped to your high-risk tasks within Office 365. For example, broad admin privileges enable admins to execute tasks that can provide unfettered access to organizational data, such as a journal rule, which can send emails to an external mailbox and exfiltrate sensitive data undetected. Privileged access management in Office 365 enables you to apply policies that require approval before anyone can execute these high-risk tasks. Requests for access can be automatically or manually approved, and all this activity is logged and auditable. Watch this video to learn more:

We are excited about rolling out the public preview of privileged access management in Office 365. Visit the Office Previews page and enter the code PAM044 to get started today.

Addressing global data residency requirements

Increasingly, governments, third-party regulators, and corporate compliance requirements are enacting data residency guidelines to address privacy issues. These guidelines restrict the free flow of information across borders and require that an organization’s data is stored within defined geographies. While GDPR does not mandate data residency, many customers tell us they need the flexibility to store their data in chosen geographies to meet regional, industry-specific, or organizational data residency requirements.

Multi-Geo Capabilities enables a single Office 365 tenant to span across multiple Office 365 datacenter geographies and gives customers the ability to store their Office 365 data at-rest, on a per-employee basis, in their chosen geographies. Multi-Geo has been launched for Exchange Online and OneDrive for Business. Read “Introducing Multi-Geo in Office 365” to learn more, and then watch this video:

Get started today on your GDPR journey with the Microsoft Cloud

No matter where you are in your GDPR efforts, we are here to help on your journey to GDPR compliance and have several resources available to help you get started today:

Learn more about how Microsoft can help you prepare for the GDPR.

—Alym Rayani, director of Microsoft 365

The post Preparing for a new era in privacy regulation with the Microsoft Cloud appeared first on Office Blogs.

Go to Source

Share this
16 Apr 2018

Korn Ferry earns client trust with Multi-Geo Capabilities in Office 365

Author: Guest Author
Go to Source

Today’s post was written by Bryan Ackermann, senior vice president and chief information officer at Korn Ferry.

Korn Ferry is a global organizational consulting firm. We combine strategy and talent to drive superior performance and create opportunities for our clients. Our approximately 8,000 colleagues serve clients in more than 50 countries. As a partner to 93 percent of Fortune 100 companies, we know that the world’s most successful companies have great people with access to intelligent technology that empowers them to do their best work, every day. We chose Microsoft 365, a complete, intelligent solution, for that very reason. We use Microsoft 365 cloud-based services to empower our employees to collaborate more closely with customers and help them attract and retain top talent. It’s the best of both worlds.

As a global company serving customers from 85 offices around the world, we look to invest in technology that fosters productivity and collaboration, while ensuring data security and privacy. We at Korn Ferry gain the trust of our clients by meeting their compliance and data residency requirements, but with customers operating in different countries and within different industries adhering to varied regulations, it’s a challenge. The evolution in global data protection requirements, such as Europe’s General Data Protection Regulation (GDPR), adds to the complexity of protecting the confidential personal information of millions of people around the world—the lifeblood of our business.

We use the Multi-Geo Capabilities in Office 365 to store customers’ data in their chosen geographies. Adhering to our clients’ regional, industry-specific, or organizational data residency requirements rewards the trust they place in our enterprise. It also helps to differentiate the highly secure and accommodating nature of our global services and solutions. With Multi-Geo, we no longer have to stand up additional Office 365 tenants for customers in Europe. We can satisfy the complex security and compliance needs of all our clients, regardless of location, allowing us to focus on collaborating with customers to deliver tailored recruiting and consulting services that meet their evolving needs.

It’s not just our clients who benefit from Multi-Geo. Replacing our file server infrastructure with a single Multi-Geo-enabled Office 365 tenant is a key development in our ongoing quest to help our globally dispersed employees work together seamlessly. Multi-Geo supports a frictionless collaboration experience across the enterprise: the entire wealth of knowledge in Korn Ferry is opened up to our employees because the collaborative roadblocks created by on-premises silos have been replaced with global availability. Now that we don’t have to compromise security for accessibility to data, employees are better able to access the information they need, where they need it, to provide outstanding customer solutions.

At Korn Ferry, we are committed to finding and developing the right talent for our customers around the world. Multi-Geo delivers huge value because it simplifies how we comply with the data residency and privacy issues that underpin all our business partnerships in a truly global marketplace.

Read the case study to learn how Korn Ferry is using Multi-Geo Capabilities to protect information and exceed client expectations.

The post Korn Ferry earns client trust with Multi-Geo Capabilities in Office 365 appeared first on Office Blogs.

Go to Source

Share this
16 Apr 2018

New intelligent security tools and technologies to help manage cyberthreats

Author: the Microsoft 365 team
Go to Source

At a news conference in San Francisco today, we announced new intelligent security innovations—including Microsoft Secure Score, Attack Simulator, and more—to help strengthen the way businesses manage threats from cloud to edge. Read the full story on the Microsoft Secure blog.

The post New intelligent security tools and technologies to help manage cyberthreats appeared first on Office Blogs.

Go to Source

Share this
13 Apr 2018

© 2010-2018 Alt-Tech Inc. All rights reserved.

Click Me