PROGRAM DESCRIPTION | www.microsoft.com
Understand what Windows 365 is and how it revolutionizes hybrid work. This subscription-based solution delivers a full Cloud PC experience to any device.| www.microsoft.com
New Surface Pro 11th Edition, a Copilot+ PC is designed to pack ultra-powerful AI-acceleration into an ultra-portable laptop. Get to know the most powerful 2-in-1 laptop.| www.microsoft.com
Not just faster, smarter. Available in 13.8 inch or 15 inch", Surface Laptop 7th Edition, a Copilot+ PC puts advanced AI-accelerated performance at your fingertips so you can work, play and create without limits.| www.microsoft.com
Discover the Surface Pro, built for business and powered by the Intel® Core™ Ultra processor to boost AI experiences. This Copilot+ PC delivers Microsoft security and powerful NPU performance in a sleek form factor.| Surface for Business
Find the right Microsoft 365 Family or Personal plan for all your devices. Includes AI-powered Office apps, 1 TB of cloud storage and premium mobile features.| www.microsoft.com
No results| www.microsoft.com
Build supply chain resiliency with real-time visibility and AI-driven insights to mitigate supply chain issues with Dynamics 365 Supply Chain Management.| www.microsoft.com
We are committed to reduce Microsoft's carbon emissions, support the market development of low carbon products, and partner to scale supply chain decarbonization.| Microsoft CSR
Experience the power, speed, and battery life of Surface touchscreen computers and tablets. From sleek designs to supercharged AI, do more with Surface 2-in-1, laptop, tablet, and all-in-one computers.| www.microsoft.com
Microsoft discloses the number of legal demands for customer data that we receive from government law enforcement agencies around the world.| Microsoft
Read the latest news and insights about Midnight Blizzard (NOBELIUM) from Microsoft's team of experts at Microsoft Security Blog.| Microsoft Security Blog
Guidance for identifying and reporting Microsoft security vulnerabilities| www.microsoft.com
Submit your finding to Microsoft using our MSRC Researcher Portal, including instructions to reproduce the vulnerability, using the bug submission guidelines found here. | www.microsoft.com
Microsoft Cloud Strength Drives First Quarter Results| www.microsoft.com
OAuth, or Open Authorization, is an authorization framework that allows an application to be authorized to access a resource.| www.microsoft.com
Use las herramientas de Power Automate para automatizar procesos en sistemas, aplicaciones de escritorio y sitios web casi ilimitados, mediante la automatización de procesos robóticos, digitales y de inteligencia artificial.| www.microsoft.com
Learn about nonprofits grants and credits eligibility for Microsoft industry-leading solutions. Find out if your nonprofit is eligible today.| Microsoft
Protect your personal and business data from outside breaches by securely logging into your organization's applications with Microsoft's mobile authenticator app.| www.microsoft.com
Data loss prevention (DLP) is a security solution that identifies and helps prevent unsafe or inappropriate sharing, transfer, or use of sensitive data.| www.microsoft.com
Help protect your computing environment by keeping up to date on Microsoft technical security notifications.| www.microsoft.com
Be the first to see what's next for Windows in the Windows Insider Program. Join the community, provide feedback to help make Windows even better.| www.microsoft.com
Aumente las ventas con Dynamics 365 Sales. Use la inteligencia artificial y la automatización para cerrar acuerdos con la inteligencia de conversación, la puntuación de oportunidades y las herramientas de colaboración.| www.microsoft.com
To get started you first need a licence to install Windows 11 or have a Windows 10 device that qualifies for an upgrade to Windows 11.| www.microsoft.com
QR codes are everywhere, but that doesn’t mean they’re safe to scan. Learn more about QR code scams and how you can avoid becoming the victim of a scam.| Microsoft 365
Protect your privacy and secure your personal data by using a VPN. Understand what a VPN is and how it works with this helpful primer from Microsoft 365.| Microsoft 365
The dynamic nature of containers can make it challenging for security teams to detect runtime anomalies or pinpoint the source of a security incident, presenting an opportunity for attackers to stay undetected. Microsoft Threat Intelligence has observed threat actors taking advantage of unsecured workload identities to gain access to resources, including containerized environments. Microsoft data […]| Microsoft Security Blog
Updated April 22, 2025: The post contains 261 new customer stories, which appear at the beginning of each section of customer lists. The post will be updated regularly with new stories. One of the highlights of my career has always been connecting with customers and partners across industries to learn how they are using technology... The post Explore AI-powered success stories of customer transformation and innovation appeared first on The Official Microsoft Blog.| The Official Microsoft Blog
Enhance your organization’s profitability with Microsoft Dynamics 365 Finance by leveraging financial reporting, embedded analytics, and AI-powered insights.| www.microsoft.com
Microsoft has detected destructive operations enabled by MERCURY and Storm-1084 that attacked both on-premises and cloud environments.| Microsoft Security Blog
Microsoft security researchers have discovered a post-compromise capability we’re calling MagicWeb, which is used by a threat actor we track as NOBELIUM to maintain persistent access to compromised environments.| Microsoft Security Blog
Create custom AI assistants and virtual agents with Microsoft Copilot Studio. Enhance workflows using our AI bots and Microsoft 365 Copilot integrations.| www.microsoft.com
Learn about the different types of AI agents and how they help people and organizations automate tasks and enhance productivity.| www.microsoft.com
Learn more about Windows 365, a service that securely streams your personalized Windows experience from the Microsoft cloud to any device.| www.microsoft.com
Microsoft Threat Intelligence has uncovered a cyberespionage campaign by the Russian state actor we track as Secret Blizzard that has been ongoing since at least 2024, targeting embassies in Moscow using an adversary-in-the-middle (AiTM) position to deploy their custom ApolloShadow malware.| Microsoft Security Blog
Microsoft has observed two named Chinese nation-state actors, Linen Typhoon and Violet Typhoon, exploiting vulnerabilities targeting internet-facing SharePoint servers. In addition, we have observed another China-based threat actor, tracked as Storm-2603, exploiting these vulnerabilities. Microsoft has released new comprehensive security updates for all supported versions of SharePoint Server (Subscription Edition, 2019, and 2016) that protect customers against these new vulnerabilities. Cust...| Microsoft Security Blog
Hvis du bruger M365 Public Roadmap JSON API, har den en ny URL-adresse fra 15. marts 2025. Derefter vil den gamle URL-adresse ikke længere virke. | www.microsoft.com
Learn what passkeys are, why they’re preferable to traditional passwords, and how they’re transforming cybersecurity.| www.microsoft.com
Microsoft Entra is unifying identity and network access with a new Security Service Edge solution and more identity innovations.| Microsoft Security Blog
Beginning today, break free from your password and go passwordless with your Microsoft account.| Microsoft Security Blog
The Secure Future Initiative (SFI) prioritizes safety above all else. Learn how Microsoft SFI ensures its products are secure by design and secure by default.| www.microsoft.com
The Microsoft EU Data Boundary is a commitment to go beyond existing data residency commitments and enable customers to process and store all data in the EU.| www.microsoft.com
The Microsoft 365 admin center allows IT teams to manage apps (like Outlook and Teams), data, devices, and users across your Microsoft 365 subscription.| www.microsoft.com
Enter the era of AI-powered business with Dynamics 365—CRM and ERP business applications that connect your teams, processes, and data.| www.microsoft.com
Discover Microsoft FastTrack recognized systems integrators for Power Platform, architects delivering expert integration for enterprise cloud solutions.| www.microsoft.com
Today, in New York City, we announced Microsoft Teams—the new chat-based workspace in Office 365. Microsoft Teams is an entirely new experience that brings together people, conversations and content, along with the tools that teams need, so they can easily collaborate to achieve more. It’s naturally integrated with the familiar Office applications and is built from the ground up on the Office 365 global, secure cloud service.| Microsoft 365 Blog
Download the latest version of Microsoft Office for Windows PCs. Microsoft Office provides the best experience for work, creation, and collaboration.| www.microsoft.com
User and entity behavior analytics (UEBA) uses machine learning and behavioral analytics to quickly detect anomalies, cyberattacks, and compromised entities.| www.microsoft.com
Threat protection that changes our approach to attacks requires built-in intelligence that can understand how an attack got in, prevent its spread across domains, and automatically heal compromised assets.| Microsoft Security Blog
Azure Sentinel Fusion technology uses powerful machine learning methods to enable your SecOps team to focus on the threats that matter.| Microsoft Security Blog
Transform your business processes with new sales agents in Microsoft 365 Copilot. Learn more.| Microsoft 365 Blog
Microsoft collects data from you, through our interactions with you and through our products for a variety of purposes described below, including to operate effectively and provide you with the best experiences with our products. You provide some of this data directly, such as when you create a Microsoft account, administer your organization’s licensing account, submit a search query to Bing, register for a Microsoft event, upload a document to OneDrive, sign up for Microsoft 365, or contac...| www.microsoft.com
Announcing the expansion of Microsoft Viva, an integrated employee experience platform for the hybrid work era. Learn more.| Microsoft 365 Blog
Microsoft Threat Intelligence Center (MSTIC) and Microsoft Security Response Center (MSRC) have discovered post-compromise exploitation of a newly discovered zero-day vulnerability in the Windows Common Log File System (CLFS) against a small number of targets. Microsoft released security updates to address the vulnerability, tracked as CVE 2025-29824, on April 8, 2025.| Microsoft Security Blog
We’re excited to announce the general availability of Researcher and Analyst, two first-of-their-kind reasoning agents designed for work. Learn more.| Microsoft 365 Blog
Explore help and learning resources for Microsoft 365 personal and family plans.| www.microsoft.com
In this blog, we highlight four tools representing a unique infection chain utilized by NOBELIUM: EnvyScout, BoomBox, NativeZone, and VaporRage. These tools have been observed being used in the wild as early as February 2021 attempting to gain a foothold on a variety of sensitive diplomatic and government entities.| Microsoft Security Blog
Microsoft Threat Intelligence Center (MSTIC) has uncovered a wide-scale malicious email campaign operated by NOBELIUM, the threat actor behind the attacks against SolarWinds, the SUNBURST backdoor, TEARDROP malware, GoldMax malware, and other related components. The campaign, initially observed and tracked by Microsoft since January 2021, evolved over a series of waves demonstrating significant experimentation.| Microsoft Security Blog
Learn about Trusted Platform Module (TPM) and how it boosts Windows 11 security, protects sensitive data, and ensures trusted software runs on your device.| Windows
A security vulnerability exists in Microsoft SharePoint Server 2019 Core that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability.| Microsoft Store - Download Center
A security vulnerability exists in Microsoft SharePoint Server Subscription Edition that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability.| Microsoft Store - Download Center
Create engaging experiences by uniting customer data with real-time journeys and Copilot in Microsoft Dynamics 365 Customer Insights.| www.microsoft.com
Protect against modern threats with a Zero Trust security model powered by AI. Discover Zero Trust architecture and strategy today with Microsoft Security.| www.microsoft.com
Microsoft detected a large-scale malvertising campaign in early December 2024 that impacted nearly one million devices globally. The attack originated from illegal streaming websites embedded with malvertising redirectors and ultimately redirected users to GitHub to deliver initial access payloads as the start of a modular and multi-stage attack chain.| Microsoft Security Blog
Buy Office Home 2024 for Windows or Mac. A one-time purchase gets you apps like Word, Excel, and PowerPoint, featuring security updates.| Microsoft Store
Find the right Microsoft 365 Family or Personal plan for all your devices. Includes AI-powered Office apps, 1 TB of cloud storage, and premium mobile features.| www.microsoft.com
Streamlining sales operations to focus on high-value activities| www.microsoft.com
Customer background| www.microsoft.com
Create, share, and collaborate from anywhere on any device with Office 365, a cloud-based suite of productivity apps such as Outlook, Word, and Excel.| www.microsoft.com
Explore AI subscription plans for Microsoft 365 Copilot—AI designed to enhance productivity. Discover Copilot pricing options tailored to your business needs.| www.microsoft.com
Set yourself up for success by managing, prioritizing, and completing your goals and tasks with Microsoft To Do.| www.microsoft.com
Learn more about the next evolution of Security Copilot with AI agents designed to autonomously assist with phishing, data security, and identity management.| Microsoft Security Blog
Make a smooth transition to Windows 11 from your unsupported operating system with help from Microsoft. Enjoy the benefits of upgrading to a Windows 11 PC.| Windows
Get your digital notebook needs covered with tools in OneNote that strengthen organization and simplify collaboration.| www.microsoft.com
A summary of product, community, and learning updates from throughout the month so you can access it in one easy place. This month we're excited to share Copilot updates, GA of some key features for our makers and a huge set of Learning and Documentation updates.| Microsoft Power Platform Blog
Sign in to your Outlook.com, Hotmail.com, MSN.com or Live.com account. Download the free desktop and mobile app to connect all your email accounts, including Gmail, Yahoo, and iCloud, in one place.| www.microsoft.com
Exchange business-class email helps increase user productivity while protecting your data. Get it as a hosted service or run it on your servers.| www.microsoft.com
Learn about the safety of using a digital wallet and follow these tips to protect your privacy. See how a digital wallet compares to other forms of payment.| Microsoft 365
Hear from Microsoft's Yina Arenas on the shifting AI landscape, why businesses get stuck on “proof of concept," and how Azure AI Foundry can help. Learn more.| The Microsoft Cloud Blog
Licensing Use Rights| www.microsoft.com
Zunächst benötigen Sie eine Lizenz für die Installation von Windows 11 oder ein Gerät mit Windows 10, das zu einem Upgrade auf Windows 11 berechtigt ist.| www.microsoft.com
Überprüfen Sie nach dem Abschluss der Schritte für die Installation von Windows 10, ob alle notwendigen Gerätetreiber installiert sind. Wenn Sie jetzt nach Updates suchen möchten, wählen Sie „Start“ aus und rufen dann „Einstellungen > Update & Sicherheit > Windows Update“ aus. Wählen Sie anschließend „Nach Updates suchen“ aus. Sie sollten auch auf der Support-Website des Geräteherstellers nach weiteren Treibern suchen, die möglicherweise erforderlich sind.| www.microsoft.com
Implement Zero Trust access controls with Microsoft Entra ID (formerly Azure Active Directory), a cloud identity and access management (IAM) solution.| www.microsoft.com
Find legal resources and solutions from Microsoft Legal. Discover Microsoft Legal resources, including terms of use, compliance and ethics, policies, and more.| Microsoft Legal
Help protect, monitor, and audit access to vital assets with Microsoft Entra Identity Governance. Explore Microsoft identity governance solutions today.| www.microsoft.com
Windows 11 is designed for hybrid work, offering features and enhancements focused on productivity, collaboration and security.| www.microsoft.com
As containers become a major part of many organizations’ IT workloads, it becomes crucial to consider the unique security threats that target such environments when building security solutions. The first step in this process is understanding the relevant attack landscape.| Microsoft Security Blog
If you use the M365 Public Roadmap JSON API, it will have a new URL from March 15, 2025. Thereafter, the old URL will no longer work. | www.microsoft.com
The pace of work is outpacing our ability to keep up. AI promises to create a whole new way of working. Read the 2023 Work Trend Index for more on AI at work.| www.microsoft.com
To unlock AI’s full potential, we need to clear one key barrier. A follow-up to the 2025 Work Trend Index.| www.microsoft.com
Read the annual sustainability report from Microsoft. Explore our progress to become a carbon negative, water positive and zero waste company.| Corporate Responsibility
With our recovery partners and suppliers, we're advancing the sustainability of our cloud supply chain and driving toward our zero-waste target. Learn more.| The Microsoft Cloud Blog
Microsoft is working to advance the sustainability of the datacenter infrastructure that delivers cloud and AI innovations. Learn more.| The Microsoft Cloud Blog
Explore examples of how Microsoft is bringing promising efficiency research out of the lab and into commercial operations.| The Microsoft Cloud Blog
Microsoft is committed to being water positive by 2030. Get info about our water replenishment program and projects aligned to our water stewardship strategy.| Microsoft
Explore Microsoft cloud solutions for your unique business challenges. Find the cloud solutions your business needs to adapt, innovate, and deliver results.| www.microsoft.com
Optimize financial and operating models, predict and avoid business disruptions, and quickly respond with Microsoft Dynamics 365.| www.microsoft.com
Silk Typhoon is a Chinese state actor focused on espionage campaigns targeting a wide range of industries in the US and throughout the world. In recent months, Silk Typhoon has shifted to performing IT supply chain attacks to gain access to targets. In this blog, we provide an overview of the threat actor along with insight into their recent activity as well as their longstanding tactics, techniques, and procedures (TTPs), including a persistent interest in the exploitation of zero-day vulner...| Microsoft Security Blog
Learn tips for protecting laptop from overheating. Discover proactive approaches to temperature management.| Surface
Secure and govern AI with Microsoft—advanced technology designed to safeguard sensitive data and AI.| www.microsoft.com