{"id":27394,"date":"2019-06-20T16:10:35","date_gmt":"2019-06-20T16:10:35","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=89549"},"modified":"2019-06-20T16:10:35","modified_gmt":"2019-06-20T16:10:35","slug":"the-evolution-of-microsoft-threat-protection-june-update","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-evolution-of-microsoft-threat-protection-june-update\/","title":{"rendered":"The evolution of Microsoft Threat Protection, June update"},"content":{"rendered":"<p>Since <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Security-Privacy-and-Compliance\/Announcing-Microsoft-Threat-Protection\/ba-p\/262783\" target=\"_blank\" rel=\"noopener noreferrer\">our announcement of Microsoft Threat Protection<\/a> at Microsoft Ignite, our goal has been to execute and deliver on our promise of helping organizations protect themselves from today\u2019s sophisticated and complex threat landscape. As we close out our fiscal year, we\u2019ve continued progress on developing Microsoft Threat Protection, launching new capabilities and services. Hopefully, you\u2019ve had a chance to follow our <a href=\"https:\/\/www.microsoft.com\/security\/blog\/the-evolution-of-microsoft-threat-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\">monthly updates<\/a>.<\/p>\n<p>As we <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/05\/14\/executing-vision-microsoft-threat-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\">previously<\/a> shared, Microsoft Threat Protection enables your organization to:<\/p>\n<p>This month, we want to share new capabilities that are starting public previews.<\/p>\n<h3>Efficient remediation and response for identity threats<\/h3>\n<p>Presently, efficient and effective response to identity threats is crucial, and Microsoft Threat Protection is built on the industry\u2019s <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/04\/25\/microsoft-threat-protection-april-update\/\" target=\"_blank\" rel=\"noopener noreferrer\">most widely used and comprehensive identity security service<\/a>. As more organizations adopt hybrid environments, data is spread across multiple applications, is on-premises and in the cloud, and is accessed by multiple devices (often personal devices) and users. Most organizations no longer have a <em>defined<\/em> network perimeter, making traditional security tools obsolete. Identity is the control plane that is consistent across all elements of the modern organization.<\/p>\n<p>At RSA, <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/03\/14\/evolution-microsoft-threat-protection-rsa-edition-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">we announced<\/a> a new unified Identity Threat Investigation experience between Azure Active Directory (Azure AD) Identity Protection, Azure Advanced Threat Protection (ATP), and <a href=\"https:\/\/www.microsoft.com\/en-us\/enterprise-mobility-security\/cloud-app-security\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Cloud App Security<\/a>. This experience will go into public preview this month.<\/p>\n<p>Part of the new experience is enabled through Azure AD\u2019s new integration with <a href=\"https:\/\/azure.microsoft.com\/en-us\/features\/azure-advanced-threat-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure ATP<\/a>. Also, integration between Azure AD and Microsoft Cloud App Security enables continuous monitoring of user behavior from sign-in through the entire session. Microsoft Threat Protection\u2019s identity services leverage user behavior analytics to create a dynamic <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Enterprise-Mobility-Security\/Introducing-Investigation-Priority-built-on-User-and-Entity\/ba-p\/360853\" target=\"_blank\" rel=\"noopener noreferrer\">investigation priority score<\/a> (Figure 1) based off signal from Azure AD, Microsoft Cloud App Security, and Azure ATP. The investigation priority is calculated by assessing security alerts, abnormal activities, and potential business and asset impact related to each user. This score can help Security Operations (SecOps) teams focus and respond to the top user threats in the organization.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/06\/Microsoft-Threat-Protection-June-update-1b.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-89551 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/06\/Microsoft-Threat-Protection-June-update-1b.png\" alt width=\"1433\" height=\"780\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/06\/Microsoft-Threat-Protection-June-update-1b.png 1433w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/06\/Microsoft-Threat-Protection-June-update-1b-300x163.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/06\/Microsoft-Threat-Protection-June-update-1b-768x418.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/06\/Microsoft-Threat-Protection-June-update-1b-1024x557.png 1024w\" sizes=\"auto, (max-width: 1433px) 100vw, 1433px\"><\/a><\/p>\n<p><em>Figure 1. The investigation priority view.<\/em><\/p>\n<p>To learn more, read <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/06\/20\/investigating-identity-threats-hybrid-cloud-environments\/\" target=\"_blank\" rel=\"noopener noreferrer\">Investigating identity threats in hybrid cloud environments<\/a>.<\/p>\n<h3>Game-changing capabilities for endpoint security<\/h3>\n<p>Every month, Microsoft Threat Protection detects over 5 billion endpoint threats through its Microsoft Defender ATP service. Customers have long asked us to extend our industry-leading endpoint security beyond the Windows OS. This was a major driving force for us to deliver endpoint security natively for macOS in limited preview earlier this year. We\u2019re excited <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-Defender-ATP\/Microsoft-Defender-ATP-for-Mac-now-in-open-public-preview\/ba-p\/634603\" target=\"_blank\" rel=\"noopener noreferrer\">to announce<\/a> that Microsoft Defender ATP for macOS is in public preview.<\/p>\n<p>Microsoft Threat Protection&nbsp;customers who have turned on the <a href=\"https:\/\/docs.microsoft.com\/windows\/security\/threat-protection\/microsoft-defender-atp\/preview\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Defender ATP preview features<\/a>&nbsp;can access Microsoft Defender ATP for Mac via the&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/microsoft-defender-atp\/onboard-configure\" target=\"_blank\" rel=\"noopener noreferrer\">onboarding section<\/a>&nbsp;in the Microsoft Defender Security Center. For more information and resources, including system requirements, prerequisites, and a list of improvements and new features, check out the&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-antivirus\/microsoft-defender-atp-mac\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Defender ATP for Mac documentation<\/a>.<\/p>\n<p>To further enhance your endpoint security, \u201clive response,\u201d our new incident response action for SecOps teams, is currently in <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-Defender-ATP\/Incident-response-at-your-fingertips-with-Microsoft-Defender-ATP\/ba-p\/614894\" target=\"_blank\" rel=\"noopener noreferrer\">public preview.<\/a> Today, your&nbsp;employees often&nbsp;work beyond the corporate network boundary, whether from home or while traveling. The risk for compromise&nbsp;is potentially&nbsp;higher when a user is remote. Imagine the executive who&nbsp;connects their laptop to hotel Wi-Fi&nbsp;and&nbsp;is compromised. With current endpoint security services, SecOps would&nbsp;need to wait until the&nbsp;executive got&nbsp;back to the office, leaving a high-value laptop exposed.&nbsp;With our new live response, SecOps teams gain instant access to a compromised machine regardless of location,&nbsp;as well as the ability to gather any required forensic information.<\/p>\n<p>This powerful&nbsp;feature allows you to:<\/p>\n<ul>\n<li>Gather&nbsp;a snapshot&nbsp;of connections,&nbsp;drivers,&nbsp;scheduled tasks,&nbsp;and&nbsp;services,&nbsp;as&nbsp;well&nbsp;as&nbsp;search for&nbsp;specific files or&nbsp;request&nbsp;file analysis&nbsp;to reach a&nbsp;verdict&nbsp;(clean,&nbsp;malicious, or&nbsp;suspicious).<\/li>\n<li>Download malware files for reverse-engineering.<\/li>\n<li>Create a tenant-level library of&nbsp;forensic tools&nbsp;like&nbsp;PowerShell scripts and&nbsp;third-party&nbsp;binaries that allows&nbsp;SecOps to&nbsp;gather forensic&nbsp;information&nbsp;like the&nbsp;MFT table, firewall logs, event logs,&nbsp;process memory dumps, and more.<\/li>\n<li>Run remediation&nbsp;activities&nbsp;such as quarantine file,&nbsp;stop&nbsp;process, remove registry, remove scheduled task,&nbsp;and more.<\/li>\n<\/ul>\n<p>To learn&nbsp;more,&nbsp;try&nbsp;the&nbsp;live response&nbsp;<a href=\"https:\/\/securitycenter.windows.com\/tutorials\" target=\"_blank\" rel=\"noopener noreferrer\">DIY<\/a>&nbsp;or read <a href=\"https:\/\/docs.microsoft.com\/windows\/security\/threat-protection\/microsoft-defender-atp\/live-response\" target=\"_blank\" rel=\"noopener noreferrer\">Investigate entities on machines using live response<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/06\/Microsoft-Threat-Protection-June-update-2.gif\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-89552 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/06\/Microsoft-Threat-Protection-June-update-2.gif\" alt width=\"999\" height=\"430\"><\/a><\/p>\n<p><em>Figure 2. Run remediation commands.<\/em><\/p>\n<h3>Experience the evolution of Microsoft Threat Protection<\/h3>\n<p>Take a moment to&nbsp;<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Security-Privacy-and-Compliance\/Announcing-Microsoft-Threat-Protection\/ba-p\/262783\" target=\"_blank\" rel=\"noopener noreferrer\">learn more about Microsoft Threat Protection<\/a>, read our previous&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/the-evolution-of-microsoft-threat-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\">monthly updates<\/a>, and visit&nbsp;the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/technology\/threat-protection\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Threat Protection webpage<\/a>.&nbsp;Organizations, like <a href=\"https:\/\/customers.microsoft.com\/en-us\/story\/telit-professional-services-microsoft-365\" target=\"_blank\" rel=\"noopener noreferrer\">Telit<\/a>, have already transitioned to Microsoft Threat Protection and our <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/What-s-New\/SecOps-is-more-effective-thanks-to-Microsoft-Windows-Defender\/m-p\/272925#M145\" target=\"_blank\" rel=\"noopener noreferrer\">partners<\/a> are also leveraging its powerful capabilities.<\/p>\n<p>Begin a trial of Microsoft Threat Protection services, which also includes our newly launched SIEM, Azure Sentinel, to experience the benefits of the most comprehensive, integrated, and secure threat protection solution for the modern workplace.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/06\/20\/evolution-of-microsoft-threat-protection-june-update\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about new Microsoft Threat Protection capabilities now in public preview.<br \/>\nThe post The evolution of Microsoft Threat Protection, June update appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":27395,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[6419,6598,6599,4620],"class_list":["post-27394","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-endpoint-security","tag-evolution-of-microsoft-threat-protection","tag-evolution-of-microsoft-threat-protection-page","tag-microsoft-cloud-app-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The evolution of Microsoft Threat Protection, June update 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-evolution-of-microsoft-threat-protection-june-update\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The evolution of Microsoft Threat Protection, June update 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-evolution-of-microsoft-threat-protection-june-update\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-20T16:10:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/the-evolution-of-microsoft-threat-protection-june-update.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1433\" \/>\n\t<meta property=\"og:image:height\" content=\"780\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-evolution-of-microsoft-threat-protection-june-update\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-evolution-of-microsoft-threat-protection-june-update\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The evolution of Microsoft Threat Protection, June update\",\"datePublished\":\"2019-06-20T16:10:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-evolution-of-microsoft-threat-protection-june-update\\\/\"},\"wordCount\":854,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-evolution-of-microsoft-threat-protection-june-update\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/the-evolution-of-microsoft-threat-protection-june-update.png\",\"keywords\":[\"Endpoint security\",\"Evolution of Microsoft Threat Protection\",\"Evolution of Microsoft Threat Protection page\",\"Microsoft Cloud App Security\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-evolution-of-microsoft-threat-protection-june-update\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-evolution-of-microsoft-threat-protection-june-update\\\/\",\"name\":\"The evolution of Microsoft Threat Protection, June update 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-evolution-of-microsoft-threat-protection-june-update\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-evolution-of-microsoft-threat-protection-june-update\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/the-evolution-of-microsoft-threat-protection-june-update.png\",\"datePublished\":\"2019-06-20T16:10:35+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-evolution-of-microsoft-threat-protection-june-update\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-evolution-of-microsoft-threat-protection-june-update\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-evolution-of-microsoft-threat-protection-june-update\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/the-evolution-of-microsoft-threat-protection-june-update.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/the-evolution-of-microsoft-threat-protection-june-update.png\",\"width\":1433,\"height\":780},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-evolution-of-microsoft-threat-protection-june-update\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Endpoint security\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/endpoint-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The evolution of Microsoft Threat Protection, June update\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The evolution of Microsoft Threat Protection, June update 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-evolution-of-microsoft-threat-protection-june-update\/","og_locale":"en_US","og_type":"article","og_title":"The evolution of Microsoft Threat Protection, June update 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-evolution-of-microsoft-threat-protection-june-update\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-06-20T16:10:35+00:00","og_image":[{"width":1433,"height":780,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/the-evolution-of-microsoft-threat-protection-june-update.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-evolution-of-microsoft-threat-protection-june-update\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-evolution-of-microsoft-threat-protection-june-update\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The evolution of Microsoft Threat Protection, June update","datePublished":"2019-06-20T16:10:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-evolution-of-microsoft-threat-protection-june-update\/"},"wordCount":854,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-evolution-of-microsoft-threat-protection-june-update\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/the-evolution-of-microsoft-threat-protection-june-update.png","keywords":["Endpoint security","Evolution of Microsoft Threat Protection","Evolution of Microsoft Threat Protection page","Microsoft Cloud App Security"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-evolution-of-microsoft-threat-protection-june-update\/","url":"https:\/\/www.threatshub.org\/blog\/the-evolution-of-microsoft-threat-protection-june-update\/","name":"The evolution of Microsoft Threat Protection, June update 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-evolution-of-microsoft-threat-protection-june-update\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-evolution-of-microsoft-threat-protection-june-update\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/the-evolution-of-microsoft-threat-protection-june-update.png","datePublished":"2019-06-20T16:10:35+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-evolution-of-microsoft-threat-protection-june-update\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-evolution-of-microsoft-threat-protection-june-update\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-evolution-of-microsoft-threat-protection-june-update\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/the-evolution-of-microsoft-threat-protection-june-update.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/the-evolution-of-microsoft-threat-protection-june-update.png","width":1433,"height":780},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-evolution-of-microsoft-threat-protection-june-update\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Endpoint security","item":"https:\/\/www.threatshub.org\/blog\/tag\/endpoint-security\/"},{"@type":"ListItem","position":3,"name":"The evolution of Microsoft Threat Protection, June update"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27394"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27394\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/27395"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}