Microsoft's security systems on Windows 10 are getting a tidy little upgrade
More threat remediation options are coming to Windows 10
Microsoft Defender for Office 365 is getting some serious upgrades after the company revealed a number of remediation enhancements to its Microsoft 365 roadmap. The releases, which are currently in development, will help security teams to mitigate threats and address suspicious emails.
The first update is termed, “additional remediation actions,” and will contain further actions for businesses to counter security threats. Initially, this will only involve new actions applicable to malicious emails, but eventually will be expanded to other entities.
The second release concerns “remediation enhancements” and will similarly provide security benefits, giving IT teams more options to search for, review and deal with potential threats before they cause serious damage to an organization’s IT infrastructure.
- We’ve also compiled a list of the best antivirus products
- And here's our roundup of the best Windows 10 antivirus solutions
- Check out our roundup of the best endpoint protection solutions
Threat mitigation
”We are retiring the ability to delete attachments as a response action,” the Microsoft 365 roadmap explains. “We're also increasing the export limit of records from mail submissions or action log in the action center to 100,000. We're adding two new columns to the action log details view within the action center. The first is a column for network message ID, allowing security teams to review based on network message ID. The second is a column for ‘Already in Destination’. Previously, all records submitted for remediation were remediated based on their original delivery location.”
Microsoft also provided further information regarding how the company is already helping businesses to remediate malicious emails delivered in Office 365. For example, administrators that have had a “search and purge” role assigned to them are able to take action against suspicious emails manually by searching in Threat Explorer.
Conversely, organizations can decide to automated remediation by recommending certain actions once particular security triggers have been activated.
- Also, see our list of the best malware removal software available
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Barclay has been writing about technology for a decade, starting out as a freelancer with ITProPortal covering everything from London’s start-up scene to comparisons of the best cloud storage services. After that, he spent some time as the managing editor of an online outlet focusing on cloud computing, furthering his interest in virtualization, Big Data, and the Internet of Things.