Securing Office 365 Defending Against Rules and Forms Injection Over the last year, Office 365 security has been tracking an emergent attacker persistence mechanism...
Securing Office 365 Defending Against Illicit Consent Grants Problem Overview Office 365 Security has been tracking an emergent threat to customer data in the...
Securing Office 365 Managing asset inventory in Office 365 In Office 365, servers are continuously provisioned and destroyed as the service is upgraded and...
Securing Office 365 Using Frequency Analysis to Defend Office 365 As security threats evolve, so must defense. In Office 365, we have engineering teams dedicated to...
Securing Office 365 Mitigating Client External Forwarding Rules with Secure Score Client created rules, that Auto-Forward email from users mailboxes to an external email address, are...
Securing Office 365 Hidden Treasure: Intrusion Detection with ETW (Part 2) In our last post, we discussed how Event Tracing for Windows (ETW) provides a wealth of knowledge in...
Securing Office 365 DNS Intrusion Detection using Dnsflow In the DNS Intrusion Detection in Office 365 post we introduced strategies implemented in Office 365...
Securing Office 365 DNS Intrusion Detection in Office 365 In Office 365, we are committed to protecting our customer's data. We implement and exercise...
Securing Office 365 Hidden Treasure: Intrusion Detection with ETW (Part 1) Today’s defenders face an increasing obstacle with information asymmetry. With the advent of...
Securing Office 365 Defending Office 365 with Graph Analytics In Office 365, we are continually improving the detection and response systems that safeguard your...