Turn possibility into reality with simplified, end-to-end, AI driven protection enabled by the world’s most comprehensive approach to security. Ready to explore the possibilities? With comprehensive security, the future is full of possibilities. Explore how the world’s most comprehensive approach to security can help you be fearless. Microsoft Security brings together the capabilities of security, compliance, identity and management across clouds to stop data breaches and compliance violations, improving productivity. Comprehensive security is not only coverage, but also best in breed protection, built in intelligence and simplified management end-to-end.
49.4K
7.8M
1.1K
7.1K
In this video, we will walk you through the health transparency features in Microsoft Entra, especially the new alerting intelligence that we are introducing as a foundational capability of Microsoft Entra health monitoring. You will learn how to subscribe to, investigate, and remediate alerts and monitor the health of Microsoft Entra scenarios.
Learn more: https://msft.it/6058UWtT2
#Microsoft #MicrosoftSecurity
Our February mini-briefing video includes an overview of the release and then a discussion of a few items from today's release.
00:56 - Overview
05:23 - CVE-2025-21418 (https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21418)
06:11 - CVE-2025-21391 (https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21391)
07:02 - CVE-2025-21377 (https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21377)
► Subscribe to Microsoft Security on YouTube here: https://aka.ms/SubscribeMicrosoftSecurity
► Follow us on social:
LinkedIn: https://www.linkedin.com/showcase/microsoft-security/
Twitter: https://twitter.com/msftsecurity
► Join our Tech Community: https://aka.ms/SecurityTechCommunity
► For more about Microsoft Security: https://msft.it/6002T9HQY
#microsoftsecurity #microsoft
In this episode of Defender for Cloud in the Field, James Brotsos joins Yuri Diogenes to talk about the Command Line Interface (CLI) that you can use in continuous integration and continuous deployment (CI/CD) pipelines in Defender for Cloud. James explains how you can use Defender for Cloud CLI in any build process to scan images for security vulnerabilities with built-in security scanners. James also demonstrates how to configure and use this new CLI tool.
02:22 - What problems does this new CLI helps to address?
03:20 - How this new CLI compares to previous versions?
08:42 - Demonstration
Learn more: https://msft.it/6052Uj0dr
#Microsoft #MicrosoftSecurity #MDCInTheField
For the final video of the Flight School series, Ryan discusses how to extend Copilot to better meet the needs of your organization's workflows. He explains creating custom plugins and connecting your knowledgebases, so that existing data and processes are at your fingertips when using Copilot.
#Microsoft #MicrosoftSecurity
Learn more: https://msft.it/6055oXHaW
#Microsoft #MicrosoftSecurity
In this video, Ryan will show how Microsoft Copilot for Security Logic Apps connector allows you to call into Copilot from a Logic Apps workflow.
#Microsoft #MicrosoftSecurity
In the penultimate video of this series, Ryan shows how you can create your own promptbook to meet your custom workflow's needs. He discusses design principles for meeting your promptbook goal, chaining prompts together, and using the final result.
#Microsoft #MicrosoftSecurity
When it comes to writing your own prompt, Ryan has the guidance for making it effective. He covers key elements of a strong prompt - defining the goal, context, expectations, and source - to ensure responses are insightful and well-grounded.
#Microsoft #MicrosoftSecurity
Learn more: https://msft.it/6051oXH5x
#Microsoft #MicrosoftSecurity
In the sixth video of Flight School, Ryan covers the various ways to prompt with Copilot - from suggested prompts to promptbooks to writing your own prompt.
#Microsoft #MicrosoftSecurity
Get notified instantly when Microsoft Security mentions your brand, topic, or keyword in their videos.