Share via


Securing Office 365

Official blog of the Office 365 Security team

Defending Against Rules and Forms Injection

Over the last year, Office 365 security has been tracking an emergent attacker persistence mechanism...

Date: 02/21/2018

Problem Overview Office 365 Security has been tracking an emergent threat to customer data in the...

Date: 01/24/2018

Managing asset inventory in Office 365

In Office 365, servers are continuously provisioned and destroyed as the service is upgraded and...

Date: 12/21/2017

Using Frequency Analysis to Defend Office 365

As security threats evolve, so must defense. In Office 365, we have engineering teams dedicated to...

Date: 09/17/2017

Mitigating Client External Forwarding Rules with Secure Score

Client created rules, that Auto-Forward email from users mailboxes to an external email address, are...

Date: 07/25/2017

Hidden Treasure: Intrusion Detection with ETW (Part 2)

In our last post, we discussed how Event Tracing for Windows (ETW) provides a wealth of knowledge in...

Date: 05/09/2017

DNS Intrusion Detection using Dnsflow

In the DNS Intrusion Detection in Office 365 post we introduced strategies implemented in Office 365...

Date: 04/25/2017

DNS Intrusion Detection in Office 365

In Office 365, we are committed to protecting our customer's data. We implement and exercise...

Date: 04/18/2017

Hidden Treasure: Intrusion Detection with ETW (Part 1)

Today’s defenders face an increasing obstacle with information asymmetry. With the advent of...

Date: 04/11/2017

Defending Office 365 with Graph Analytics

In Office 365, we are continually improving the detection and response systems that safeguard your...

Date: 03/13/2017

Using the Office 365 Secure Score API

The Office 365 Security Engineering team is pleased to announce the availability of the Office 365...

Date: 02/10/2017

New Security Analytics Service: Finding and Fixing Risk in Office 365

Microsoft is pleased to announce the preview availability of a new security analytics service called...

Date: 08/03/2016

Finding Illicit Activity The Old Fashioned Way

Finding bad guys doing bad things in your cloud services is a hard thing to do under even the best...

Date: 05/26/2016

Addressing Your CxO's Top Five Cloud Security Concerns

Overview and the Kill Chain Customers frequently ask us how they can defend their Office365 tenancy....

Date: 03/15/2016

Using Office 365 activity data to improve your Cybersecurity stance and capability

Overview and Contents As an Office 365 customer and tenant administrator, you have access to a wide...

Date: 02/12/2016

How to fix a compromised (hacked) Microsoft Office 365 account

One of the most common security support requests we receive from our Office 365 customers is for...

Date: 12/16/2015