{"id":37121,"date":"2020-09-14T16:00:05","date_gmt":"2020-09-14T16:00:05","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=91853"},"modified":"2020-09-14T16:00:05","modified_gmt":"2020-09-14T16:00:05","slug":"microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\/","title":{"rendered":"Microsoft Security: Use baseline default tools to accelerate your security career"},"content":{"rendered":"<p>I wrote a series of blogs last year on how gamified learning through cyber ranges can create more realistic and impactful cybersecurity learning experiences and help attract tomorrow\u2019s security workforce. With the global talent shortage in this field, we need to work harder to bring people into the field. This blog is for new cyber professionals or perhaps younger aspirants considering getting into cyber. From an employee\u2019s perspective, it can seem daunting to know where to start, especially when you\u2019re entering an organization with established technology investments, priorities, and practices. Having come to this field later in my career than others, I say from experience that we need to do a better job collectively in providing realistic and interesting role-based learning, paths toward the right certifications and endorsements, and more definitive opportunities to advance one\u2019s career.<\/p>\n<p>I\u2019m still a big fan of gamified learning, but if gaming isn\u2019t your thing, then another way to acquire important baseline learning is to look at simpler, more proactive management tools that up-level different tasks and make your work more efficient. Microsoft has recently released two important cloud security posture management tools that can help a newer employee quickly grasp basic yet critically important security concepts AND show immediate value to your employer. They\u2019re intuitive to learn and deserve more attention. &nbsp;I\u2019m talking about <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/fundamentals\/concept-fundamentals-security-defaults\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Security Defaults<\/a> and <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/enterprise-mobility-security\/microsoft-secure-score\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Secure Score<\/a> (also including <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/09\/08\/accelerate-adoption-siem-azure-sentinel-offer-microsoft\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Secure Score<\/a>). While tools like these don\u2019t typically roll off the tongue, and your experience won\u2019t grab you like an immersive gaming UI, their purpose-built capabilities that focus on commonly-accepted cyber hygiene best practices reinforce solid foundational practices that are no less important than SecOps, incident response, or forensics and hunting. Learning how to use these tools can make you a champion and influencer, and we encourage you to learn more below. These capabilities are also built directly into our larger Azure and M365 services, so by using built-in tools, you\u2019ll help your organization maximize its investments in our technologies and help save money and reduce complexity in your environment.<\/p>\n<p><strong>Azure Security Defaults<\/strong> is named for what it does\u2014setting often overlooked defaults. With one click, you automatically enable several foundational security controls that if left unaddressed are convenient and time-tested targets for attackers to go after your organization. One question that I frequently receive is why Microsoft doesn\u2019t simply pre-configure these settings by default and force customers to turn them off. Several large, high-threat customers have asked specifically that we do that. It\u2019s tempting, but until or unless we make such a move, this is a great self-service add-on. As explained in this <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/fundamentals\/concept-fundamentals-security-defaults\" target=\"_blank\" rel=\"noopener noreferrer\">blog<\/a>, ASD does the following:<\/p>\n<ul>\n<li>Requires all users to register for Azure Multi-Factor Authentication.<\/li>\n<li>Requires admins to perform MFA.<\/li>\n<li>Blocks legacy authentication protocols.<\/li>\n<li>Requires users to perform MFA when necessary.<\/li>\n<li>Protects privileged activities to access the Azure Portal.<\/li>\n<\/ul>\n<p>A recent important addition to ASD is that Microsoft announced on August 12<sup>th<\/sup> that ASD is <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/secure-score-security-controls\" target=\"_blank\" rel=\"noopener noreferrer\">now also available<\/a> through <strong>Azure Security Center<\/strong>. This is an important and beneficial addition in that it adds another opportunity for your IT organization\u2014whether identity and access management, or security operations\u2014to implement the defaults. I\u2019ve noticed on several occasions when briefing or providing a demo on Azure Security Center to a CISO team that a challenge in effectively using this service may come down to organizational issues, specifically, Who OWNS it?&nbsp; Is ASC a CISO tool? Regardless of who may own the responsibility, we want to provide the capability upfront.<\/p>\n<p><strong>MICROSOFT SECURE SCORE<\/strong> is a relatively new feature that is designed to quantify your security posture based on how you configure your Microsoft resources. What\u2019s cool and impactful about it is that it provides in a convenient top-down meu approach the relative approach your organization has taken compared (anonymously) with your industry segment\u2019s peers (given in many cases similar reference architectures), and provides clear recommendations for what you can do to improve your score. From a Microsoft perspective, this is what we\u2019d say all carrot and no stick. Though as covered above we provide Azure Security Defaults, customers are still on point to make a proactive decision to implement controls based on your particular work culture, compliance requirements, priorities, and business needs. Take a look at how it works:<\/p>\n<p>This convenient landing page provides an all-up view into the current state of your organization\u2019s security posture, with specific recommendations to improve certain configuration settings based on an art-of-the-possible. In this demo example, if you were to turn enable every security control to its highest level, your score would be 124, as opposed to the current score of 32, for a percentage of 25.81. Looking to the right of the screen, you get a sense of comparison against peer organizations. You can further break down your score by categories such as identity, data, device, apps, and infrastructure; this in turn gives a security or compliance team the opportunity to collaborate with hands-on teams that control those specific resources and who might be operating in silos, not necessarily focused on security postures of their counterparts.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-91859\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/thumbnail_image001.jpg\" alt=\"An image of Microsoft Secure Score.\" width=\"1280\" height=\"720\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/thumbnail_image001.jpg 1280w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/thumbnail_image001-300x169.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/thumbnail_image001-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/thumbnail_image001-768x432.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/thumbnail_image001-687x385.jpg 687w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/thumbnail_image001-1083x609.jpg 1083w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/thumbnail_image001-767x431.jpg 767w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/thumbnail_image001-539x303.jpg 539w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\"><\/p>\n<p><strong>Azure Secure Score<\/strong><\/p>\n<p>You\u2019ll also find Secure Score in the Azure Security Center blade where it provides recommendations front and center, and a color-coded circular graph on important hybrid infrastructure configurations and hygiene.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-91855\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-2.jpg\" alt=\"An image of Secure Score in the Azure Security Center.\" width=\"2034\" height=\"434\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-2.jpg 2034w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-2-300x64.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-2-1024x218.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-2-768x164.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-2-1536x328.jpg 1536w\" sizes=\"auto, (max-width: 2034px) 100vw, 2034px\"><\/p>\n<p>Drilling deeper, here we see a variety of recommendations to address specific findings.&nbsp; For example, the top line item is advice to \u2018remediate vulnerabilities\u2019, indicating that 35 of 59 resources that ASC is monitoring are in some way not optimized for security. optimized for security.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-91856\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-3.jpg\" alt=\"An image of variety of recommendations to address specific findings. \" width=\"1680\" height=\"645\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-3.jpg 1680w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-3-300x115.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-3-1024x393.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-3-768x295.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-3-1536x590.jpg 1536w\" sizes=\"auto, (max-width: 1680px) 100vw, 1680px\"><\/p>\n<p>Going a level further into the \u2018secure management ports\u2019 finding, we see a sub-heading list of actions you can take specific to these resources\u2019 settings. Fortunately, in this case, the administrator has addressed previously-discovered findings, leaving just three to-do\u2019s under the third subheading. For added convenience, the red\/green color-coding on the far right draws your attention.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-91857\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-4.jpg\" alt=\"An image of the \u2018secure management ports\u2019 finding.\" width=\"1678\" height=\"155\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-4.jpg 1678w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-4-300x28.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-4-1024x95.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-4-768x71.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-4-1536x142.jpg 1536w\" sizes=\"auto, (max-width: 1678px) 100vw, 1678px\"><\/p>\n<p>Clicking on the third item above shows you a description of what ASC has found, along with remediation steps.&nbsp; You have two options to remediate:&nbsp; more broadly enable and require \u2018just in time\u2019 VM access; or, manually enable JIT for each resource. Again, Microsoft wants to incentivize and make it easier for your organization to take more holisitic and proactive steps across your resources such as enabling important settings by default; but we in no way penalize you for the security settings that you implement.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-91858 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-5.jpg\" alt=\"An image of a description of what ASC has found, along with remediation steps. \" width=\"1676\" height=\"685\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-5.jpg 1676w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-5-300x123.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-5-1024x419.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-5-768x314.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/MSFT-Secure-Score-5-1536x628.jpg 1536w\" sizes=\"auto, (max-width: 1676px) 100vw, 1676px\"><\/p>\n<p>To learn more about Microsoft Security solutions visit our&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">website.<\/a> Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/09\/14\/microsoft-security-use-baselide-default-tools-accelerate-security-career\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As you build your cybersecurity career, take advantage of important new and proactive security configuration and management capabilities that will help your organization \u2018move left\u2019 on understanding and reducing risk.<br \/>\nThe post Microsoft Security: Use baseline default tools to accelerate your security career appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":37122,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[5531,6426,7835,6577,6579,347,8037],"class_list":["post-37121","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-azure-information-protection","tag-azure-security","tag-ciso","tag-ciso-series","tag-ciso-series-page","tag-cybersecurity","tag-cybersecurity-deployment"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Security: Use baseline default tools to accelerate your security career 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Security: Use baseline default tools to accelerate your security career 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-14T16:00:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft Security: Use baseline default tools to accelerate your security career\",\"datePublished\":\"2020-09-14T16:00:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\\\/\"},\"wordCount\":1139,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career.jpg\",\"keywords\":[\"Azure Information Protection\",\"Azure Security\",\"CISO\",\"CISO series\",\"Ciso series page\",\"Cybersecurity\",\"Cybersecurity deployment\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\\\/\",\"name\":\"Microsoft Security: Use baseline default tools to accelerate your security career 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career.jpg\",\"datePublished\":\"2020-09-14T16:00:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career.jpg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Azure Information Protection\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/azure-information-protection\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft Security: Use baseline default tools to accelerate your security career\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Security: Use baseline default tools to accelerate your security career 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Security: Use baseline default tools to accelerate your security career 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-09-14T16:00:05+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft Security: Use baseline default tools to accelerate your security career","datePublished":"2020-09-14T16:00:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\/"},"wordCount":1139,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career.jpg","keywords":["Azure Information Protection","Azure Security","CISO","CISO series","Ciso series page","Cybersecurity","Cybersecurity deployment"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\/","name":"Microsoft Security: Use baseline default tools to accelerate your security career 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career.jpg","datePublished":"2020-09-14T16:00:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career.jpg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-security-use-baseline-default-tools-to-accelerate-your-security-career\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Azure Information Protection","item":"https:\/\/www.threatshub.org\/blog\/tag\/azure-information-protection\/"},{"@type":"ListItem","position":3,"name":"Microsoft Security: Use baseline default tools to accelerate your security career"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=37121"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37121\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/37122"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=37121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=37121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=37121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}