{"id":44304,"date":"2021-12-07T17:00:52","date_gmt":"2021-12-07T17:00:52","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=102360"},"modified":"2021-12-07T17:00:52","modified_gmt":"2021-12-07T17:00:52","slug":"new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/","title":{"rendered":"New Secured-core servers are now available from the Microsoft ecosystem to help secure your infrastructure"},"content":{"rendered":"<p>In the current pandemic-driven remote work environments, security has become increasingly important. Earlier this year, Colonial Pipeline, one of the leading suppliers of fuel on the East Coast of the United States, was hit by a ransomware attack.<sup>1<\/sup> This caused a massive disruption of the fuel supply chain and a surge in gasoline prices. In another unrelated incident, Chinese start-up Socialarks suffered a massive data breach,<sup>2<\/sup> which exposed personally identifiable information (PII) of over 214 million users of some of the most popular worldwide social networks. These data breaches are extremely expensive, with the average cost of a data breach estimated at USD4.2 million dollars for every breach in 2021.<sup>3<\/sup> There has also been a surge in the number of ransomware attacks, with a ransomware attack expected every 11 seconds and the total costs of damages due to these attacks is estimated to be about USD20 billion dollars in 2021.<sup>4<\/sup><\/p>\n<p>As we discussed at <a href=\"https:\/\/myinspire.microsoft.com\/sessions\/fbee74d5-03fc-4c19-a64d-26b61ed97e2f?source=search\" target=\"_blank\" rel=\"noopener\">Microsoft Inspire<\/a> earlier this year, threats against infrastructure can come from a variety of sources\u2014attackers exploiting web shells, brute force login attacks, software vulnerabilities, and credential theft\u2014to achieve goals like deploying ransomware. With cyberattacks continuing to rise, the need for secure computing has never been more important. Customers care about the protection of their data and workloads, and platform security can be an important tool in a comprehensive defense-in-depth strategy. Applying our learnings from the&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/design\/device-experiences\/oem-highly-secure\" target=\"_blank\" rel=\"noopener\">Secured-core PC&nbsp;<\/a>initiative, Microsoft is collaborating with partners to expand Secured-core to <a href=\"https:\/\/www.windowsservercatalog.com\/results.aspx?&amp;bCatID=1333&amp;cpID=0&amp;avc=10&amp;ava=0&amp;avt=0&amp;avq=140&amp;OR=1&amp;PGS=25&amp;PG=1\" target=\"_blank\" rel=\"noopener\">Windows Server<\/a>, <a href=\"https:\/\/hcicatalog.azurewebsites.net\/#\/catalog?FeatureSupported=securedCoreServer\" target=\"_blank\" rel=\"noopener\">Microsoft Azure Stack HCI<\/a>, and <a href=\"https:\/\/devicecatalog.azure.com\/devices?certificationBadgeTypes=IoTDevice\" target=\"_blank\" rel=\"noopener\">Azure-certified IoT devices<\/a>.<\/p>\n<h2>REvil ransomware use case<\/h2>\n<p>Let\u2019s dive into the typical kill chain of a human-operated ransomware campaign undertaken by <a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Ransom:Win32\/Revil.A&amp;ThreatID=2147780003\" target=\"_blank\" rel=\"noopener\">REvil (or Sodinokibi)<\/a>, which very recently impacted over thousands of businesses worldwide including the recent attack on Kaseya.<sup>5<\/sup> The attackers used a variety of different techniques, such as compromised <a href=\"https:\/\/docs.microsoft.com\/en-us\/troubleshoot\/windows-server\/remote\/understanding-remote-desktop-protocol\" target=\"_blank\" rel=\"noopener\">Remote Desktop Protocol<\/a> (RDP) credentials and vulnerabilities in the operating system and applications to gain an initial foothold in the organizations. Documents from the United States Department of Justice\u2019s investigation<sup>6<\/sup> delve into how REvil carried out the ransomware attack on Kaseya by using the following attack pattern:<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-102369 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/REvil-kill-chain.jpg\" alt=\"Stages of attack with tools and techniques used in the REvil ransomware attack on Kaseya\" width=\"781\" height=\"873\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/REvil-kill-chain.jpg 781w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/REvil-kill-chain-268x300.jpg 268w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/REvil-kill-chain-768x858.jpg 768w\" sizes=\"auto, (max-width: 781px) 100vw, 781px\"><\/p>\n<p><em>Figure 1. Kill chain of REvil ransomware.<\/em><\/p>\n<p>The ransomware operators can gain administrative privileges on the compromised devices, steal passwords from the memory using credential dumping tools, <a href=\"https:\/\/www.varonis.com\/blog\/what-is-mimikatz\/\" target=\"_blank\" rel=\"noopener\">such as Mimikatz<\/a>, and use <a href=\"https:\/\/www.cobaltstrike.com\/\" target=\"_blank\" rel=\"noopener\">Cobalt Strike<\/a> <a href=\"https:\/\/www.metasploit.com\/\" target=\"_blank\" rel=\"noopener\">and Metasploit<\/a> to hop laterally and establish persistence on the victim\u2019s networks. After obtaining the necessary privileges and access across the infrastructure, the ransomware activates, initiating the encryption of all the files and leaving an electronic note to the user indicating the amount that they need to pay to decrypt their files.<\/p>\n<p>Ransomware attacks like these result in an enormous loss of time and money for enterprises. Continuing to raise the security bar for critical infrastructure against attackers makes it easier for organizations to meet that higher bar, which is an important priority for both customers and Microsoft. Successfully protecting systems requires a holistic approach that builds security from the chip to the cloud across hardware, firmware, and the operating system.<\/p>\n<h2>Secured-core servers leverage your infrastructure to help protect you from security threats<\/h2>\n<p>Secured-core servers take a defense-in-depth approach to basic system security. Secured-core servers are built around three distinct security pillars:<\/p>\n<ol>\n<li>To protect the server infrastructure with a hardware-based root of trust.<\/li>\n<li>To defend sensitive workloads against firmware-level attacks.<\/li>\n<li>To prevent access and the execution of unverified code on the systems.<\/li>\n<\/ol>\n<p>Partnering with leading original equipment manufacturers (OEMs) and silicon vendors, Secured-core servers use industry-standard hardware-based root of trust coupled with security capabilities built into today\u2019s modern central processing units (CPUs). Secured-core servers use the <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/information-protection\/tpm\/trusted-platform-module-top-node\" target=\"_blank\" rel=\"noopener\">Trusted Platform Module<\/a> 2.0 and <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/design\/device-experiences\/oem-secure-boot\" target=\"_blank\" rel=\"noopener\">Secure boot<\/a> to ensure that only trusted components load in the boot path.<\/p>\n<blockquote>\n<p>\u201cTo help our customers remain secure and accelerate their business outcomes, Hewlett Packard Enterprise (HPE) is excited to release the new Gen 10 Plus (v2) products for Azure Stack HCI 21H2 and Windows Server 2022 which can be delivered with the HPE GreenLake edge-to-cloud platform,\u201d said Keith White, Senior Vice President and General Manager, GreenLake Cloud Services Commercial Business. \u201cThese offer unprecedented host protection by combining HPE\u2019s security technologies with Secured-core server functionalities for a secure, hybrid implementation.\u201d<\/p>\n<\/blockquote>\n<p>Additional details will be made available soon as part of the Azure Stack HCI: Secured-core Server Solution Brief. Configuration details can be found in the section \u201cConfiguring and validating Secured-core\u201d of the <a href=\"https:\/\/www.hpe.com\/us\/en\/collaterals\/collateral.a50003760enw.html\" target=\"_blank\" rel=\"noopener\">Implementing Microsoft Windows Server 2022 Using HPE Proliant Servers, Storage, and Networking Options<\/a> white paper.<\/p>\n<p>Secured-core servers use hardware-rooted security in the modern CPU with <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-system-guard\/how-hardware-based-root-of-trust-helps-protect-windows#secure-launchthe-dynamic-root-of-trust-for-measurement-drtm\" target=\"_blank\" rel=\"noopener\">Dynamic Root of Trust Measurement<\/a> (DRTM) to launch the system into a trusted state, mitigating attacks from advanced malware that attempts to tamper with the system.<\/p>\n<p>Enabled with <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/windows-insider-program\/virtualization-based-security-vbs-and-hypervisor-enforced-code\/m-p\/240571\" target=\"_blank\" rel=\"noopener\">Hypervisor-Protected Code Integrity<\/a> (HVCI), a Secured-core server only starts executables signed by known and approved authorities. This ensures that code running within the trusted computing base runs with integrity and is not subject to exploits or attacks. The hypervisor sets and enforces permissions to prevent malware from attempting to modify the memory and executing.<\/p>\n<p>In the REvil ransomware example that was described earlier, Secured-core servers would have made it much harder for the attackers to effectively deploy and activate their payload. HVCI comes enabled with a code integrity security policy that blocks drivers that tamper with the kernel, such as Mimikatz. Additionally, since <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/windows-insider-program\/virtualization-based-security-vbs-and-hypervisor-enforced-code\/m-p\/240571\" target=\"_blank\" rel=\"noopener\">Virtualization-based security<\/a> (VBS) is enabled out of the box, IT administrators can easily enable features, such as <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/windows-it-pro-blog\/comprehensive-protection-for-your-credentials-with-credential\/ba-p\/765314\" target=\"_blank\" rel=\"noopener\">Credential Guard<\/a>, which safeguard the credentials in an isolated environment that is invisible to attackers. By preventing credential theft (stage two of the kill chain, represented in <em>Figure 1<\/em>), Secured-core servers can help make it extremely hard for attackers to hop laterally in the network, thereby, stopping the attack.<\/p>\n<h2>Look for Secured-core server solutions in the HCI and Windows Server catalogs<\/h2>\n<p>You can now find a breadth of servers certified for Secured-core server AQ in the <a href=\"https:\/\/hcicatalog.azurewebsites.net\/#\/catalog?FeatureSupported=securedCoreServer\" target=\"_blank\" rel=\"noopener\">Azure Stack HCI catalog<\/a>. Enhancements made to the catalog allow you to easily identify Azure Stack HCI solutions that support Secured-core server functionality with the new Secured-core server badge.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-102375 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/Secured-core-server-certified.jpg\" alt=\"Azure stack HCI catalog screenshot showing four Secured-core server solutions from H P E.\" width=\"1356\" height=\"884\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/Secured-core-server-certified.jpg 1356w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/Secured-core-server-certified-300x196.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/Secured-core-server-certified-1024x668.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/Secured-core-server-certified-768x501.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/Secured-core-server-certified-200x130.jpg 200w\" sizes=\"auto, (max-width: 1356px) 100vw, 1356px\"><\/p>\n<p><em>Figure 2. Azure Stack HCI Catalog Secured-core servers.<\/em><\/p>\n<p>Secured-core servers support all the protections offered in the trusted enterprise virtualization use case, plus additional features to protect hosts from firmware-level attacks. In addition to the Azure Stack HCI catalog, the <a href=\"https:\/\/www.windowsservercatalog.com\/results.aspx?&amp;bCatID=1333&amp;cpID=0&amp;avc=10&amp;ava=0&amp;avt=0&amp;avq=140&amp;OR=1&amp;PGS=25&amp;PG=1\" target=\"_blank\" rel=\"noopener\">Windows Server Catalog<\/a> lists dozens of hardware platforms from our various ecosystem partners that meet the Secured-core server AQ. Learn more about how the Secured-core servers provide exceptional host security in our <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/02\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/\" target=\"_blank\" rel=\"noopener\">blog post<\/a>.<\/p>\n<h2>Manage your Secured-core server easily with the Microsoft Windows Admin Center<\/h2>\n<p>Windows Admin Center is your user interface (UI) for managing the status and configuration of your Secured-core server. Windows Admin Center is a locally deployed, browser-based application for managing Windows servers, clusters, hyper-converged infrastructure, as well as Windows clients, and is ready to use in production.<\/p>\n<p>New functionality in Windows Admin Center makes it extremely easy for customers to configure the Secured-core features for Windows Server and Azure Stack HCI systems. The new Windows Admin Center security functionality, now included with the product, enables advanced security with a&nbsp;click of the button&nbsp;from a web browser anywhere in the world. For Windows Server and validated Azure Stack HCI solutions, customers can look for Secured-core certified systems to simplify acquiring secure hardware platforms.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-102378 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/Secured-core-server-image-3.jpg\" alt=\"Windows Admin Center screenshot showing six Secured-core features status each on a two-node demo cluster.\" width=\"1440\" height=\"836\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/Secured-core-server-image-3.jpg 1440w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/Secured-core-server-image-3-300x174.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/Secured-core-server-image-3-1024x594.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/Secured-core-server-image-3-768x446.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\"><\/p>\n<p><em>Figure 3. Windows Admin Center Secured-core server cluster management.<\/em><\/p>\n<p>The Windows Admin Center UI allows you to easily configure the six features that encompass Secured-core server: Hypervisor Enforced Code Integrity, Boot Direct Memory Access (DMA) Protection, System Guard, Secure Boot, Virtualization-based security, and Trusted Platform Module 2.0. Download the latest version of <a href=\"http:\/\/aka.ms\/downloadWAC\" target=\"_blank\" rel=\"noopener\">Windows Admin Center<\/a> today.<\/p>\n<h2>Begin your Secured-core journey<\/h2>\n<p>Secured-core servers, which are now available in the <a href=\"https:\/\/hcicatalog.azurewebsites.net\/#\/catalog?FeatureSupported=securedCoreServer\" target=\"_blank\" rel=\"noopener\">Azure Stack HCI<\/a> and <a href=\"https:\/\/www.windowsservercatalog.com\/results.aspx?&amp;bCatID=1333&amp;cpID=0&amp;avc=10&amp;ava=0&amp;avt=0&amp;avq=140&amp;OR=1&amp;PGS=25&amp;PG=1\" target=\"_blank\" rel=\"noopener\">Windows Server<\/a> catalogs, come fully equipped with industry-leading security mitigations built into the hardware, firmware, and the operating system to help thwart some of the most advanced attack vectors. Coupled with <a href=\"http:\/\/aka.ms\/downloadWAC\" target=\"_blank\" rel=\"noopener\">Windows Admin Center,<\/a> managing and monitoring the security state of your mission-critical infrastructure has never been easier.<\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<hr>\n<p><sup>1<\/sup><a href=\"https:\/\/www.bbc.com\/news\/business-57050690\" target=\"_blank\" rel=\"noopener\">US fuel pipeline hackers \u2018didn\u2019t mean to create problems,\u2019<\/a> Mary-Ann Russon, BBC News. 10 May 2021.<\/p>\n<p><sup>2<\/sup><a href=\"https:\/\/www.securitymagazine.com\/articles\/94327-million-facebook-instagram-and-linkedin-users-scraped-data-exposed\" target=\"_blank\" rel=\"noopener\">200 million Facebook, Instagram, and LinkedIn users\u2019 scraped data exposed<\/a>, Security Magazine. 12 January 2021.<\/p>\n<p><sup>3<\/sup><a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noopener\">How much does a data breach cost?<\/a> Cost of a Data Breach Report 2021, IBM.<\/p>\n<p><sup>4<\/sup><a href=\"https:\/\/cybersecurityventures.com\/global-ransomware-damage-costs-predicted-to-reach-20-billion-usd-by-2021\/\" target=\"_blank\" rel=\"noopener\">Global Ransomware Damage Costs Predicted To Reach $20 Billion (USD) By 2021,<\/a> Steve Morgan, Cybercrime Magazine. 21 October 2019.<\/p>\n<p><sup>5<\/sup><a href=\"https:\/\/www.justice.gov\/opa\/pr\/ukrainian-arrested-and-charged-ransomware-attack-kaseya\" target=\"_blank\" rel=\"noopener\">Ukrainian Arrested and Charged with Ransomware Attack on Kaseya<\/a>, The United States Department of Justice. 8 November 2021.<\/p>\n<p><sup>6<\/sup><a href=\"https:\/\/www.justice.gov\/opa\/press-release\/file\/1447121\/download\" target=\"_blank\" rel=\"noopener\">United States of America V. Yevgeniy Igorevich Polyanin<\/a>, United States District Court for the Norther District of Texas Dallas Division. 24 August 2021.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/12\/07\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With cyberattacks continuing to rise, the need for secure computing has never been more important. Customers care about the protection of their data and workloads, and platform security can be an important tool in a comprehensive defense-in-depth strategy.<br \/>\nThe post New Secured-core servers are now available from the Microsoft ecosystem to help secure your infrastructure appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":44305,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[408,6859,347],"class_list":["post-44304","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-ai","tag-ai-and-machine-learning","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New Secured-core servers are now available from the Microsoft ecosystem to help secure your infrastructure 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Secured-core servers are now available from the Microsoft ecosystem to help secure your infrastructure 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-07T17:00:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/REvil-kill-chain.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"New Secured-core servers are now available from the Microsoft ecosystem to help secure your infrastructure\",\"datePublished\":\"2021-12-07T17:00:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\\\/\"},\"wordCount\":1481,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure.jpg\",\"keywords\":[\"AI\",\"AI and machine learning\",\"Cybersecurity\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\\\/\",\"name\":\"New Secured-core servers are now available from the Microsoft ecosystem to help secure your infrastructure 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure.jpg\",\"datePublished\":\"2021-12-07T17:00:52+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure.jpg\",\"width\":781,\"height\":873},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/ai\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"New Secured-core servers are now available from the Microsoft ecosystem to help secure your infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Secured-core servers are now available from the Microsoft ecosystem to help secure your infrastructure 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"New Secured-core servers are now available from the Microsoft ecosystem to help secure your infrastructure 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-07T17:00:52+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/12\/REvil-kill-chain.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"New Secured-core servers are now available from the Microsoft ecosystem to help secure your infrastructure","datePublished":"2021-12-07T17:00:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/"},"wordCount":1481,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure.jpg","keywords":["AI","AI and machine learning","Cybersecurity"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/","url":"https:\/\/www.threatshub.org\/blog\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/","name":"New Secured-core servers are now available from the Microsoft ecosystem to help secure your infrastructure 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure.jpg","datePublished":"2021-12-07T17:00:52+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure.jpg","width":781,"height":873},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"AI","item":"https:\/\/www.threatshub.org\/blog\/tag\/ai\/"},{"@type":"ListItem","position":3,"name":"New Secured-core servers are now available from the Microsoft ecosystem to help secure your infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44304"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44304\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/44305"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}