{"id":91346,"date":"2020-06-18T09:00:03","date_gmt":"2020-06-18T16:00:03","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=91346"},"modified":"2024-08-02T13:34:19","modified_gmt":"2024-08-02T20:34:19","slug":"inside-microsoft-threat-protection-mapping-attack-chains-from-cloud-to-endpoint","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/06\/18\/inside-microsoft-threat-protection-mapping-attack-chains-from-cloud-to-endpoint\/","title":{"rendered":"Inside Microsoft 365 Defender: Mapping attack chains from cloud to endpoint"},"content":{"rendered":"
\n
\n