Zero Trust
-
Verifying device health at Microsoft with Zero Trust
Here at Microsoft, we’re using our Zero Trust security model to help us transform the way we verify device health across all devices that access company resources. Zero Trust supplies an integrated security philosophy and end-to-end strategy that informs how…
-
Hardware-backed Windows 11 empowers Microsoft with secure-by-default baseline
Windows 11 makes secure-by-default viable thanks to a combination of modern hardware and software. This ready out-of-the-box protection enables us to create a new baseline internally across Microsoft, one that level sets our enterprise to be more secure for a…
-
Implementing strong user authentication with Windows Hello for Business
[Editor’s note: This content was written to highlight a particular event or moment in time. Although that moment has passed, we’re republishing it here so you can see what our thinking and experience was like at the time.] Deploying Windows…
-
Building an anti-ransomware program at Microsoft focused on an Optimal Ransomware Resiliency State
Microsoft strives to deliver the productivity tools and services the world depends on. With this comes the responsibility of ensuring protection, continuity, and resilience from cyberattacks of all sorts—including emerging threats. Highlighted in the third edition of the Microsoft Digital…
-
Empowering our employees with generative AI while keeping the company secure
Generative AI (GenAI) is rapidly changing the way businesses operate, and everyone wants to be in on the action. Whether it’s to automate tasks or enhance efficiency, the allure of what GenAI can do is strong. However, for companies considering…
-
Empowering employee self-service with guardrails: How we’re using sensitivity labels to make Microsoft more secure
At Microsoft, empowering our employees to do their best work means trusting them with self-determination. But to do that safely, we need clear data loss prevention systems in place. We describe it as self-service with guardrails. Giving employees that level…
-
Using a Zero Trust strategy to secure Microsoft’s network during remote work
[Editor’s note: This content was written to highlight a particular event or moment in time. Although that moment has passed, we’re republishing it here so you can see what our thinking and experience was like at the time.] Microsoft’s cloud-first…
-
Looking back at deployment of Windows 11 at Microsoft
[Editor’s note: This content was written to highlight a particular event or moment in time. Although that moment has passed, we’re republishing it here so you can see what our thinking and experience was like at the time.] Windows 11,…
-
Lessons learned at Microsoft: Five steps you can take to reduce your ransomware risk
As a part of our journey to reduce our ransomware risk internally here at Microsoft, we’ve identified five principles that we believe every enterprise should follow to make themselves more secure from these attacks. We call these our Foundational Five…
-
Seamless and secure cloud printing with Universal Print
There are few office tasks that are as ubiquitous—or potentially as frustrating—as needing to print a document. Whatever your role and wherever you are, it’s likely that you’ll need to utilize the shared office printer next time you’re on site.…
-
Sharing what we learned deploying our secure federal environment
At Microsoft, we serve a diverse range of customers, from individual users and large businesses to sovereign governments with specific regulatory requirements. Our platform products such as Microsoft Azure and our Microsoft 365 productivity suite perform extremely well for these…
-
The future of Group Member Management: How Microsoft is leading the way with automation
Just as it is for everyone, maintaining accurate groups for email and apps such as Microsoft Viva and Microsoft Teams is challenging for us internally at Microsoft. Adding and removing employees from groups has been mostly a hand-cramping manual task,…