Jump to content

Microsoft Support & Discussions

Microsoft Windows, Windows Server software, Microsoft 365, Microsoft Azure or any other Microsoft product discussions and help.

  1. Guest Microsoft Windows Server Team
    Started by Guest Microsoft Windows Server Team,

    This blog post was authored by Dianna Marks, Product Marketing Manager, Windows Server Marketing. Youve been hearing about all the great innovations in Windows Server 2019. Weve also been working to enhance how we manage your Windows Server environment, and well be showing you more at the upcoming Windows Server Summit 2019. Windows servers can be managed in multiple ways based on your need We know that you need to manage both individual servers and servers at scale. We also know that each customer is at a different stage in their hybrid journey, so we provide scaled management tools centered in on-premises and scaled management tools for hybrid management in…

    • 0 replies
    • 1 view
  2. Guest Microsoft Windows Server Team
    Started by Guest Microsoft Windows Server Team,

    This blog post was authored by Dianna Marks, Product Marketing Manager, Azure Marketing. Its that time of the year again! Spring is in the air and Windows Server Summit is right around the corner. On May 22nd at Windows Server Summit 2019 you can discover how Windows Server can help you deliver your hybrid cloud strategy as well as gain tips on how to modernize your evolving infrastructure. The great thing about Windows Server Summit is that you can attend from anywhere in the world since it is all virtual just kick up your feet and hit the link to join. This year expect to deep dive in to technical Windows Server content covered by leading industry experts. Som…

    • 0 replies
    • 1 view
  3. Guest MSRC Team
    Started by Guest MSRC Team,

    Today, we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates. More information about this month’s security updates can be found on the Security Update Guide. Tags Security Advisory Security Update Update Tuesday Continue reading...

    • 0 replies
    • 1 view
  4. Today, we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates. More information about this month’s security updates can be found on the Security Update Guide. Tags Security Advisory Security Update Update Tuesday

    • 0 replies
    • 12 views
  5. Guest MSRC Team

    In 2018 The Microsoft Bounty Program awarded over $2,000,000 to encourage and reward external security research in key technologies to protect our customers. Building on that success, we are excited to announce a number of improvements in our bounty programs to better serve the security research community. Faster bounty review – As of January 2019, the Cloud, Windows, and Azure DevOps programs now award bounties upon completion of reproduction and assessment of each submission, rather than waiting until the final fix has been determined. Shortening the time from submission to award determination is just one way we will get bounty rewards to researchers faster. …

    • 0 replies
    • 2 views
  6. In 2018 The Microsoft Bounty Program awarded over $2,000,000 to encourage and reward external security research in key technologies to protect our customers. Building on that success, we are excited to announce a number of improvements in our bounty programs to better serve the security research community. Faster bounty review – As of January 2019, the Cloud, Windows, and Azure DevOps programs now award bounties upon completion of reproduction and assessment of each submission, rather than waiting until the final fix has been determined.

    • 0 replies
    • 9 views
  7. The first part of this series introduced Semmle QL, and how the Microsoft Security Response Center (MSRC) are using it to investigate variants of vulnerabilities reported to us. This post discusses an example of how we’ve been using it proactively, covering a security audit of an Azure firmware component. This was part of a wider defense in depth security review of Azure services, exploring attack vectors from the point of view of a hypothetical adversary who has already penetrated at least one security boundary, and now sits in the operating environment of a service backend (marked with * on the diagram below).

    • 0 replies
    • 10 views
  8. Guest MSRC Team

    The MSRC is more than managing vulnerability reports, publishing Microsoft security updates, and defending the cloud. The MSRC is passionate about helping everyone improve internal engineering practices and supporting the defender community, and are excited to partner with Blackberry to host a Product Security Operations Forum at LocoMocoSec on April 18, 2019. Featuring exceptional speakers from across the industry, the Product Security Operations Forum will share what industry practitioners have learned about problems (and solutions!) of secure development and managing vulnerability response. We’ll have hands-on practitioners from, npm, Adobe, Microsoft, GitHub, and e…

    • 0 replies
    • 2 views
  9. The MSRC is more than managing vulnerability reports, publishing Microsoft security updates, and defending the cloud. The MSRC is passionate about helping everyone improve internal engineering practices and supporting the defender community, and are excited to partner with Blackberry to host a Product Security Operations Forum at LocoMocoSec on April 18, 2019.

    • 0 replies
    • 9 views
  10. The Microsoft Security Response Center (MSRC) investigates all reports of security vulnerabilities affecting Microsoft products and services to help make our customers and the global online community more secure. We appreciate the excellent vulnerability research reported to us regularly from the security community, and we consider it a privilege to work with these researchers.

    • 0 replies
    • 9 views
  11. Guest MSRC Team
    Started by Guest MSRC Team,

    The Microsoft Security Response Center (MSRC) recently announced our first BlueHat security conference in Shanghai which will take place on May 29-30, 2019. After 15 years of BlueHat events in Redmond, Washington and Israel, we are thrilled to expand to a new location. We work with many talented security researchers throughout the Asia Pacific region to protect our shared online ecosystem, and we can’t wait to connect with them in person at BlueHat! BlueHat Shanghai will provide a fun, accessible venue for security researchers to come together and share innovative cybersecurity research and ideas. If you are a security researcherer or a security engineer, come join us!…

    • 0 replies
    • 1 view
  12. The Microsoft Security Response Center (MSRC) recently announced our first BlueHat security conference in Shanghai which will take place on May 29-30, 2019. After 15 years of BlueHat events in Redmond, Washington and Israel, we are thrilled to expand to a new location. We work with many talented security researchers

    • 0 replies
    • 10 views
  13. Guest MSRC Team
    Started by Guest MSRC Team,

    This year at the Nullcon International Security Conference I shared practical advice for how security researchers can maximize the impact of their security vulnerability submissions and earn higher bounty awards under the Microsoft Bounty Program. For those who couldn’t be there, I had two core pieces of advice. First, focus vulnerability research on the products and services that are eligible for bounty rewards. The eligible scope is published on our website. We expand our programs throughout the year, so check back regularly for new potential areas to research and follow us on Twitter for announcements of new bounty programs. Second, when reporting security vulnera…

    • 0 replies
    • 2 views
  14. Guest MSRC Team
    Started by Guest MSRC Team,

    Today, we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates. More information about this month’s security updates can be found on the Security Update Guide. Continue reading...

    • 0 replies
    • 2 views
  15. This year at the Nullcon International Security Conference I shared practical advice for how security researchers can maximize the impact of their security vulnerability submissions and earn higher bounty awards under the Microsoft Bounty Program. For those who couldn’t be there, I had two core pieces of advice. First , focus vulnerability research on the products and services that are eligible for bounty rewards.

    • 0 replies
    • 11 views
  16. Today, we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates. More information about this month’s security updates can be found on the Security Update Guide.

    • 0 replies
    • 10 views
  17. Guest Microsoft Windows Server Team
    Started by Guest Microsoft Windows Server Team,

    This blog post was authored by Vithalprasad Gaitonde, Principal PM Manager, System Center. As customers grow their deployments in the public cloud and on-premises data centers, management tools are evolving to meet customer needs. System Center suite continues to play an important role in managing the on-premises data center and the evolving IT needs with the adoption of the public cloud. Today, I am excited to announce that Microsoft System Center 2019 will be generally available in March 2019. System Center 2019 enables deployment and management of Windows Server 2019 at a larger scale to meet your data center needs. System Center 2019 has been in private…

    • 0 replies
    • 2 views
  18. Guest Windows Defender ATP team
    Started by Guest Windows Defender ATP team,

    The keystone to good security hygiene is limiting your attack surface. Attack surface reduction is a technique to remove or constrain exploitable behaviors in your systems. In this blog, we discuss the two attack surface reduction rules introduced in the most recent release of Windows and cover suggested deployment methods and best practices. Software applications may use known, insecure methods, or methods later identified as useful for malware exploits. For example, macros are an old and powerful tool for task automation. However, macros can spawn child processes, invoke the Windows API, and perform other tasks which render them exploitable by malware. Windows…

    • 0 replies
    • 2 views
  19. Guest Mark Simos, Kristina Laidler and John Dellinger
    Started by Guest Mark Simos, Kristina Laidler and John Dellinger,

    Were frequently asked how we operate our Security Operations Center (SOC) at Microsoft (particularly as organizations are integrating cloud into their enterprise estate). This is the first in a three part blog series designed to share our approach and experience, so you can use what we learned to improve your SOC. In Part 1: Organization, we start with the critical organizational aspects (organizational purpose, culture, and metrics). In Part 2: People, we cover how we manage our most valuable resourcehuman talent. And finally Part 3: Technology, covers the technology that enables these people to accomplish their mission. Overall SOC model Microsoft has multi…

    • 0 replies
    • 0 views
  20. Guest Joram Borenstein
    Started by Guest Joram Borenstein,

    Its well known by now that pipeline attacks and attacks on utilities of all kinds have been an unfortunately well-trodden path by cyber-adversaries in numerous countries for a few years now. These types of attacks are not theoretical, and the damage done to dateas well as the potential damageis significant. With this backdrop, it was encouraging to see a few months ago that that the U.S. Government was working in a coordinated fashion to push for a more coordinated effort around pipeline security. As part of the annual Cybersecurity Awareness Month each October, the U.S. Department of Energy (DOE) and Department of Homeland Security (DHS) met with the Oil and Natural…

    • 0 replies
    • 2 views
  21. Started by peterr,

    I have watched YouTube but am not understanding how to pair and transfer from to and from these devices using Bluetooth. Could you please assist? I do see where the PC recognizes my phone and where the phone recognizes the PC. I cannot get a transfer to work. I was using a word file and "send to" then I tried a photo from the phone to the PC..

    • 19 replies
    • 2.1k views
  22. Guest Debbie Seres

    The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 5. Set up mobile device management, youll learn how to plan your Microsoft Intune deployment and set up Mobile Device Management (MDM) as part of your unified endpoint management (UEM) strategy. In Steps 1-4 of the series, we provided tips for securing identities with Azure Active Directory (Azure AD). In the next two posts (Step 5 and Step 6), we introduce you to ContosoCars to illustrate how you can deploy Microsoft Intune as part of your UEM strategy for securing company data on devices and applications. …

    • 0 replies
    • 2 views
  23. We know security experts with diverse skills and experiences are found around the world. This year, the BlueHat Security Conference is coming to Shanghai! BlueHat Shanghai 2019 will take place on May 29-30 at W Shanghai - The Bund. We want to provide a venue for security researchers to come together to learn and share information, innovations, best practices and actionable items, as well as to engage in a rich conversation about security.

    • 0 replies
    • 10 views
  24. Guest Debraj Ghosh
    Started by Guest Debraj Ghosh,

    February is an exciting month of enhancements for Microsoft Threat Protection. For those who have followed our monthly updates (November, December, and January), youre aware that Microsoft Threat Protection helps provide users optimal security from the moment they sign in, use email, work on documents, or utilize cloud applications. IT administrators benefit from minimal complexity while staying ahead of threats to their organization. Microsoft Threat Protection is one of the few available services helping provide comprehensive security across multiple attack vectors. This month, we share enhancements to identity protection, the launch of the Microsoft 365 security center…

    • 0 replies
    • 2 views
  25. Guest MSRC Team
    Started by Guest MSRC Team,

    Today, we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates. More information about this month’s security updates can be found on the Security Update Guide. Continue reading...

    • 0 replies
    • 2 views