September 2018
-
|
Microsoft uses threat intelligence to protect, detect, and respond to threats
This content has been archived, and while it was correct at time of publication, it may no longer be accurate or reflect the current situation at Microsoft. To combat cyber attacks and protect against urgent threats, Microsoft amasses billions of…
-
|
Optimizing network performance for Microsoft Office 365
This content has been archived, and while it was correct at time of publication, it may no longer be accurate or reflect the current situation at Microsoft. As the earliest adopter of Microsoft products, Microsoft Digital deployed Microsoft Office 365…
-
|
Predictive analytics in Azure Machine Learning optimizes credit collections
This content has been archived, and while it was correct at time of publication, it may no longer be accurate or reflect the current situation at Microsoft. When the treasury team at Microsoft wanted to streamline the collection process for…
-
|
Using Azure AD Privileged Identity Management for elevated access
This content has been archived, and while it was correct at time of publication, it may no longer be accurate or reflect the current situation at Microsoft. Microsoft uses Azure Active Directory (AD) Privileged Identity Management (PIM) to manage elevated…
-
|
Protecting files in the cloud with Azure Information Protection
This content has been archived, and while it was correct at time of publication, it may no longer be accurate or reflect the current situation at Microsoft. Microsoft migrated from Active Directory Rights Management Services to Azure Rights Management, the…