Monthly news – August 2022

Monthly news – August 2022

This article is contributed. See the original author and article here.















Microsoft 365 Defender
Monthly news
August 2022


OFT header v4.png

This is our monthly “What’s new” blog post, summarizing product updates and various assets we have across our Defender products.  





























Legend:
Product videos.png Product videos webcast recordings.png Webcast (recordings) Docs on MS.png Docs on Microsoft Blogs on MS.png Blogs on Microsoft
GitHub.png GitHub External.png External Product improvements.png Product improvements Public Preview sign-up.png Previews / Announcements











Microsoft 365 Defender
















Public Preview sign-up.png Hunt in Microsoft 365 Defender without KQL! To reduce the learning curve for hunting and enable all analysts to hunt easily, we are excited to announce that a Guided hunting experience in Microsoft 365 Defender is now in public preview! This removes previous dependencies on KQL. Link to learn more about it on our docs: Get started with guided hunting mode.
Public Preview sign-up.png The new Microsoft 365 Defender APIs in Microsoft Graph are now available in public preview! 
Public Preview sign-up.png

(GA) Microsoft Defender Experts for Hunting is now generally available. If you’re a Microsoft 365 Defender customer with a robust security operations center but want Microsoft to help you proactively hunt for threats across endpoints, Office 365, cloud applications, and identity using Microsoft Defender data, then learn more about applying, setting up, and using the service. Defender Experts for Hunting is sold separately from other Microsoft 365 Defender products.













Microsoft Defender for Cloud Apps




























webcast recordings.png Webinar Sep 14 9AM PST: Manage your SaaS Security Posture with Microsoft. In the current evolution of SaaS apps, there are many different SaaS configurations and posture options. Misconfigurations are one of them and is a potential risk for your organization that can lead to a breach or sensitive data leakage. Learn how to easily manage your SaaS Security Posture with Microsoft and prevent this potential risk. Register here.
Public Preview sign-up.png Protecting apps that use non-standard ports with session controls. This feature allows Microsoft Defender for Cloud Apps to enforce session policies for applications that use port numbers other than 443.
Public Preview sign-up.png Feature parity between commercial and government offerings. We have expanded our support for GCC customers who can now benefit from the SecOps experience features within Defender for Cloud Apps all from the Microsoft 365 Defender portal.
Product improvements.png Azure AD “Security Reader” role alignment. As of August 28 2022, users who were assigned an Azure AD Security Reader role won’t be able to manage the Microsoft Defender for Cloud Apps alerts. To continue to manage alerts, the user’s role should be updated to an Azure AD Security Operator. Currently the Azure AD “Security Reader” role may manage Defender for Coud Apps alerts while the same role may only view alerts from all other workloads. The purpose of this change is to align the AAD “Security Reader” role assignments to provide clarity for the customers, prevent confusion of the same role use. 
Blogs on MS.png Hunt for Azure subscriptions using Defender for Cloud AppsThis blog describes how attackers can compromise Azure subscriptions and use them for malicious activities. In addition, it shows how Microsoft Defender for Cloud Apps data can help hunt for these activities and how to mitigate the risk of compromised subscriptions.
Blogs on MS.png Protect sensitive SharePoint sites with Defender for Cloud Apps. This blog walks through the configuration of Azure AD, Purview, SharePoint Online and Defender for Cloud Apps to block downloads of a file that has sensitive content. This will also provide an example of how you can configure it in your own environment.











Microsoft Defender for Endpoint




























Public Preview sign-up.png New Device Health Reporting for Microsoft Defender for Endpoint is now in Public Preview. We’ve redesigned the dashboard so that you can view sensor health and antivirus protection status across platforms and easily access detailed Microsoft Defender for Endpoint information.  
Public Preview sign-up.png Tamper protection on macOS is now generally availableWe are pleased to announce that Microsoft Defender for Endpoint’s tamper protection feature, previously available in Public Preview, is now generally available on macOS devices and will be rolling out over the next few days. 
Public Preview sign-up.png New features available for Mobile Threat Defense on Android & iOSTaking our next step on this journey, we are excited to announce a handful of new features that are generally available: Privacy Controls, Optional Permissions and Disable Web protection.
Public Preview sign-up.png Network Protection and Web Protection for macOS and Linux is now in Public Preview! Read all the details in this blog post as well as how to evaluate them in your environment. 
Blogs on MS.png Step-by-step guide on how to deploy Attack Surface Reduction rules to Azure VMs using Azure Guest Configurations. 
Docs on MS.png Check out newly refreshed public documentation page that provides a view into Defender for Endpoint capabilities per platform. 











Microsoft Defender for Identity








webcast recordings.png Webinar Sep 6 9AM PST: Microsoft Defender for Identity | Identity Targeted Attacks – A Researcher’s Point of View. Attendees will get a peek behind the curtain and see how our research teams deal with newly disclosed identity vulnerabilities, and how that information is turned into an alert in Defender for Identity. Register here.











Microsoft Defender for IoT








webcast recordings.png Webinar Sep 14 8AM PST: The Last Piece of the XDR Puzzle – Augmenting IT SecOps with IoT Security. Security teams invest heavily in bringing security-related telemetry and data into a single place, with the vision of “one XDR to rule them all”. But many overlook a huge bulk of the network that remains obscure – IoT and unmanaged devices. Join us in reviewing how Microsoft Defender for IoT integrates with M365D to complete the XDR story with IoT visibility, assessment, and security. Register here.











Microsoft Defender for Office 365




































Product improvements.png Exciting Feature Updates to Attack Simulation Training. We have been hearing from a lot of our enterprise customers that payload technique variety is key to any long-term end user behavior change program.  To help facilitate we are pleased to announce two new payload techniques.
Product improvements.png Improving the reporting experience in Microsoft Defender for Office 365. These new reporting features and improvements will help refine SecOps professional’s workflows when assessing Office 365 security effectiveness. 
Blogs on MS.png Announcing the release of step-by-step guidesThese guides are there to help you with common tasks across the product in a flash, with the minimum information & clicks needed, reducing the time needed by your admins to secure your enterprise.
Public Preview sign-up.png Introducing tenant blocks via admin submissions. You can now block suspicious entities when submitting emails, URLs, or attachments for Microsoft to review.
Blogs on MS.png Mastering Configuration in Defender for Office 365 – Part Three. This blog is the final installment of a three-part series detailing the journey we’re on to simplify configuration of threat protection capabilities in Office 365 to enable best-in class protection for our customers.
Public Preview sign-up.png Automatic Redirection to Microsoft 365 Defender is coming! All security-related functionality will be automatically redirected from the Office 365 Security & Compliance Center (https://protection.office.com) to the Microsoft 365 Defender portal. Additional details on our docs page
Product improvements.png Introducing new actions from the Email Entity pageWith these changes, you’ll no longer have to move to a different page to take response actions.
   











Microsoft Secure Score








Product improvements.png

Microsoft Secure Score is adding new improvement actions for Information Protection and anti-spam policies. 


We’re updating Microsoft Secure Score improvement actions to ensure a more accurate representation of your organization’s security posture. This update will include new recommendations as Microsoft Secure Score improvement actions for Microsoft Information Protection and for anti-spam policies in Defender for Office 365.



Apple Releases Security Updates for Multiple Products

This article is contributed. See the original author and article here.

Apple has released security updates to address a vulnerability (CVE-2022-32893) in iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad mini 2, iPad mini 3, and iPod touch (6th generation). Exploitation of this vulnerability could allow an attacker to take control of affected device.

CISA encourages users and administrators to review Apple’s advisory HT213428 and apply necessary updates.

Microsoft retires Basic Authentication in Exchange Online

Microsoft retires Basic Authentication in Exchange Online

This article is contributed. See the original author and article here.

As more sophisticated cyber criminals take aim at hybrid and remote workers, Microsoft is working to raise awareness among Exchange Online customers that one of the most important security steps they can take is to move away from outdated, less secure protocols, like Basic Authentication. As previously announced, we are turning off Basic Authentication in Exchange Online for all tenants starting October 1, 2022.

The post Microsoft retires Basic Authentication in Exchange Online appeared first on Microsoft 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Data empowers Valencia CF to create personalized fan experiences

Data empowers Valencia CF to create personalized fan experiences

This article is contributed. See the original author and article here.

We all know one, the person whose weekend is consumed by a singular passion for their favorite sports team. Their weekdays are dedicated to deconstructing the recent drama while contemplating the narrative awaiting the Saturday or Sunday afternoon ahead. The rain-soaked terraces are home to them. The booming music of the arena is their hymn book, and the legendary names hanging from the rafters are their heroes. A peek into their closet will reveal a sea of matching colors printed on scarves and t-shirts. Their social media will be awash with images of heroes present and past, opinions of games told in terms worthy of epic conquests, and, of course, the barbed insult to anyone who dares question the validity of their narrative.

Read how Microsoft helped Valencia CF unlock the value of their customer data to create super fans.

Engage super fans through actionable insights

This is the world of the sports “super fan”they are the backbone of the world’s greatest sports franchises. Along with their passion, the super fan is the mainstay of a team’s economy, accounting for a disproportionate number of ticket sales, merchandise, media impressions, and revenue. Teams all over the world love their super fans. In some countries and sports, they have seats in the boardroom and strong voices in ownership decisions. And while it is tempting to view the super fan as a dynastic, generational phenomenon passed on through time and culture, the truth is that today, the super fan is a function of data as much as history. Big, multidimensional data gleaned from the numerous touch points between fans and sports franchises is woven into insights that are specific and actionable at an individual level. Data is how casual fans ascend the ladder of engagement to become super fans and how super fans are rewarded and celebrated.

Row 15 seat 164 in Valencia’s vast Mestalla Stadium is a hallowed place. It is occupied by a statue honoring Seor Vicente Navarro Aparicio, a lifelong Valencia CF fan who sat in that seat for 25 years, never missing a game, even when his eyesight failed him in his later years. Seor Aparicio is the very definition of “super fan.” Valencia CF is more than 100 years old with a proud history of Spanish and international success, and a worldwide fan base of more than 50 million supporters. Although fan engagement has always been a top priority, the club didn’t always know its fans or what they needed in the intimate detail they do today. When Franco Segarra joined Valencia CF as Innovation Director, he immediately recognized the need for a new game plan to enhance fan engagement.

“Super fans aren’t like ordinary customers. They are passionateexperiencing euphoria and shedding tears or losing sleep with the inevitable ups and downs. The sport is steeped in tradition, where fans have special rituals, passed down from parents and grandparents. Therefore, each fan is unique. Fragmented data makes it impossible to understand, let alone deliver, deeply personal experiences that speak to each fan as an individual.”Franco Segarra, Innovation Director, Valencia CF.

A portrait of Franco Segarra in a blue shirt standing in an empty soccer stadium.
Franco Segarra, Innovation Director, Valencia CF

Innovate personalized customer experiences

As an innovative and forward-thinking organization, Valencia CF is continuously improving the global fan experience and building new connections with their fans. Using Microsoft Dynamics 365, the club gained new and actionable insights and a deeper understanding of its fans. With an integrated data architecture, Valencia can run personal campaigns with its season ticket holders. From deploying an app to speed food orders in the stadium to checking in with 1,500 season ticket holders who missed in-person games during the COVID-19 lockdowns, Valencia has used the insights from its customer data to create delightful, rewarding, and engaging fan experiences. By applying custom Al on top of the unified data, the club was able to predict which season ticket holders were most likely to attend games. For those who missed two consecutive games, Valencia CF reached out with a tailored email. And for a subsegment of the fans, football legends Ricardo Arias and Miguel Angel Bossio, who played for Valencia CF in the 80s and 90s, made personal calls.

“Imagine the older fans’ reactions when their all-time favorite idol calls to say hi and see how things are goingit’s an unforgettable experience. It also gave us the opportunity to sincerely thank our fans and hear firsthand what’s on their mind. Customer insights helped us engage at the right moment with a meaningful personal touch that deepened the relationship and strengthened loyalty.”Franco Segarra, Innovation Director, Valencia CF.

Take a look at how Valencia CF leveraged customer data and technology to create amazing fan experiences.

This embed requires accepting cookies from the embed’s site to view the embed. Activate the link to accept cookies and view the embedded content.

This site uses cookies for analytics, personalized content and ads. By continuing to browse this site, you agree to this use.

Valencia CF demonstrates that transforming a casual fan into a super fan is about delighting and engaging that fan on a one-to-one basis.

Super fans are increasingly important in the world of sports brands. Building the commitment of the super fan is not just about tradition and generational influence. It’s about data, and more specifically, drawing all the diverse data sources into one platform driving innovation. But we are only at the beginning of this data journey, and Microsoft is the partner enabling sports teams all over the world to discover the exciting possibilities when the power of integrated data is unleashed.

Next steps

The post Data empowers Valencia CF to create personalized fan experiences appeared first on Microsoft Dynamics 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

CISA releases two Industrial Control Systems Advisories

This article is contributed. See the original author and article here.

CISA has released two Industrial Control Systems (ICS) advisories on September 01, 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. 

CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations: 

Announcing General Availability (GA) of Zone Redundancy for Azure SQL Database Hyperscale tier

Announcing General Availability (GA) of Zone Redundancy for Azure SQL Database Hyperscale tier

This article is contributed. See the original author and article here.

We are excited to announce the General Availability (GA) of enabling Zone Redundancy for Azure SQL Hyperscale databases. The zone redundant configuration utilizes Azure Availability Zones to replicate databases across multiple physical locations within an Azure region. By selecting zone redundancy, you can make all layers of your Hyperscale databases resilient to a much larger set of failures, including catastrophic datacenter outages, without any changes of the application logic. For more information see Hyperscale zone redundant availability


 


Creating a zone redundant Hyperscale Database


 


A zone redundant Hyperscale database can be created with Portal, Azure CLI, PowerShell, or REST API. Zone redundancy for Hyperscale service tier can only be specified at database creation. This setting cannot be modified once the resource is provisioned. Database copy, point-in-time restore, or creating a geo-replica can be used to update the zone redundant configuration for an existing Hyperscale database.


 


Portal


The following image illustrates how to use Azure portal to configure a new Hyperscale database to be zone redundant. This can be configured in the Configure database blade when creating a new database, creating a geo replica, creating a copy database, doing a point in time restore or doing a geo restore. Zone-redundant or Geo-zone-redundant backup storage and at least 1 High-Availability Secondary Replica must be specified.


 


RajeshSetlem_0-1659597410620.png


 


CLI


The following CLI commands can be used to create a zone redundant Hyperscale database using the –zone-redundant {false, true} parameter.



The Hyperscale database must have at least 1 high availability replica and zone-redundant or geo-zone-redundant backup storage. Below is an example CLI command for creating a new zone redundant Hyperscale database.


 


 


 


 

az sql db create -g mygroup -s myserver -n mydb -e Hyperscale -f Gen5 –ha-replicas 1 –-zone-redundant -–backup-storage-redundancy Zone

 


 


PowerShell


The following PowerShell commands can be used to create a zone redundant Hyperscale database using the -ZoneRedundant parameter.



 


The Hyperscale database must have at least 1 high availability replica and zone-redundant or geo-zone-redundant backup storage must be specified. Below is an example PowerShell command for creating a new zone redundant Hyperscale database.


 


 


 

New-AzSqlDatabase -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -Edition “Hyperscale” -HighAvailabilityReplicaCount 1 -ZoneRedundant -BackupStorageRedundancy Zone

 


 


 


Current Limitations


 



  • Zone redundant configuration can only be specified during database creation. This setting cannot be modified once the resource is provisioned. Database copy, point-in-time restore, or creating a geo-replica can be used to update the zone redundant configuration for an existing Hyperscale database. When using one of these update options, if the target database is in a different region than the source or if the database backup storage redundancy from the target differs from the source database, the copy operation will be a size of data operation.

  • Named replicas are not currently supported.

  • Only Gen5 compute is supported.

  • Zone redundancy cannot currently be specified when migrating an existing database from another Azure SQL Database service tier to Hyperscale. 


Regions where this is available


All Azure regions that have Availability Zones support zone redundant Hyperscale database.


 

Public Preview: Leverage Azure Active Directory Kerberos with Azure Files for hybrid identities

Public Preview: Leverage Azure Active Directory Kerberos with Azure Files for hybrid identities

This article is contributed. See the original author and article here.

We are excited to announce Azure Files integration with Azure Active Directory (Azure AD) Kerberos for hybrid identities. With this release, identities in Azure AD can mount and access Azure file shares without the need for line-of-sight to an Active Directory domain controller.


 


Until now, Azure Files supported identity-based authentication over Server Message Block (SMB) through two types of Domain Services: on-premises Active Directory Domain Services (AD DS) and Azure Active Directory Domain Services (Azure AD DS). On-premises AD DS requires clients to have line-of-sight to the domain controller, while Azure AD DS requires deploying domain services onto Azure AD and domain joining to Azure AD DS. Azure AD Kerberos is a new addition to these identity-based authentication methods. Azure AD Kerberos allows Azure AD to issue Kerberos service tickets over HTTPS for service applications in Azure AD. This removes the need to setup and manage another domain service, while also removing the line-of-sight requirement to the domain controller when authenticating with Azure Files. For this experience, the clients connecting to Azure Files need to be Azure AD-joined clients (or hybrid Azure AD-joined), and the user identities must be hybrid identities, managed in Active Directory.


 


This experience builds on what we previously announced for FSLogix profiles support. Now, the experience is much simpler, and the use cases are no longer limited to Azure Virtual Desktop user profiles.


 


blogteaser.jpg


 


To learn more and get started, visit our documentation page.

The AI-powered contact center, part 4: Enhance contact center security with biometric authentication

The AI-powered contact center, part 4: Enhance contact center security with biometric authentication

This article is contributed. See the original author and article here.

When a customer needs support, they not only expect fast, convenient ways to get help, but also to have their personal information protected. However, when verifying that people are who they say they are, many contact centers use traditional authentication methods that are no longer fit for purpose. That’s why the biometric security on the Microsoft Digital Contact Center Platform is so essentialwith biometrics, contact centers can provide intelligent fraud prevention and fast, effortless customer authentication. 

Why contact center security must change

The classic methods for verifying customer identities and weeding out fraudsters depend on knowledge-based authentication (KBA)the PINs, passwords, and security questions we are all familiar with.

However, KBA causes problems in multiple ways:

  1. It’s very easy for fraudsters to steal, buy, or phish for customers’ information, which makes it simple for them to pass KBA checks.
  2. Lengthy authentication processes add friction to the customer journeyand often have to be performed multiple times as customers move between channels.
  3. Customers expect brands to know who they are; they don’t want to sit through an interrogation to prove their identity.
  4. Customers often lose or forget the authentication information they need, increasing the time, effort, and frustration of the interaction as they search for usernames and passwords.

That is why biometric security is so important for helping organizations protect their customers and their business.

With biometrics, organizations can leave the issues of KBA in the past by enabling fast, frictionless, and accurate authentication for genuine customers while quickly detecting fraudsters and preventing fraud in every channel.

By layering voice, behavioral, and conversational biometrics (how people sound, how they behave, and what they say) with non-biometric factors, a central AI risk engine can make intelligent assessments of authentication and fraud risk. By using biometrics, the system can identify the actual person behind the interaction, rather than just the information they have or the device they are using.

And now that Nuance Gatekeeper biometric security is closely integrated with Microsoft products on the Microsoft Digital Contact Center Platform, our combined solutions will multiply the benefits for all our customers.

Seamless authentication

The combination of Gatekeeper and Microsoft Dynamics 365 Customer Service on the Microsoft Digital Contact Center Platform will help strengthen the overall identification and verification (ID&V) process and give agents tools that help them provide seamless service across any channel. While customer relationship management (CRM) data provides the customer ID, multimodal biometrics bolsters verification to validate customer identities quickly and accurately. Meanwhile, call validation detects common fraud tactics like Automatic Number Identification (ANI) spoofing, and environment detection interrogates the trustworthiness of device and network signals.

Stronger fraud prevention

As stated earlier, biometric security has a dramatic impact on organizations’ ability to detect and prevent fraud in customer engagements across any channel. Dynamics 365 Fraud Protection is a perfect complement to biometricsproviding an adaptive AI tool that guards organizations against payment fraud, account takeovers, and many other transactional fraud threats.

With these technologies working in unison, the AI has an enriched data set to make better-informed decisions about when to use step-up authentication or flag a transaction or individual as suspicious. Gatekeeper identifies the human behind the transaction while Dynamics 365 examines the transaction itselfa powerful combination that delivers a unique offering in the fraud protection market.

Enhanced personalization

With biometric authentication, it is also much simpler to personalize customer engagements from the beginning; particularly with passive voice biometrics, where customers can be identified and their experience tailored within seconds as they explain their need to an agent or a conversational interactive voice response (IVR).

Voice biometrics solutions make it simpler to offer personalized service and specialized support to a variety of customers. For example, Telefnica, the leading Spanish telco needed a way to prioritize vulnerable customers at the start of the pandemic, when call volumes skyrocketed. It used voice biometrics to identify seniors based on numerous voice characteristics and route them directly to a priority service line, offering a more personalized experience for seniors who depend on Telefnica to keep them connected.

There is also an opportunity to create more personalized experiences for employees. Another exciting benefit of bringing Nuance and Microsoft products together on the Microsoft Digital Contact Center Platform is the integration between Gatekeeper and Azure Active Directory (Azure AD). Employees at many enterprises across the globe use Azure AD to log into their accounts every day, and that will become even simpler by using biometric authentication instead of usernames and passwords.

Create a more secure contact center

Our vision for the future of the digital contact center is one where biometric security is built into all customer engagements to streamline, personalize, and protect every interaction.

By integrating our products on a single platform, we are bringing that vision to life, empowering customer engagement teams to serve and sell more effectively and enabling fraud teams to detect and prevent more fraud.

Learn more about our contact center solution

Throughout this series, we have explored how to create engaging, personalized digital experiences, achieve superior self-service voice support, and build conversational AI applications with the protection of advanced biometric security solutions. This is the contact center of the future, made possible through the Microsoft Digital Contact Center Platform.

The post The AI-powered contact center, part 4: Enhance contact center security with biometric authentication appeared first on Microsoft Dynamics 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.