Under SFI, Microsoft is not only changing its own environment but also delivering practical capabilities and patterns that customers can adopt.
Key product and platform improvements
- Microsoft Azure
- Mandatory MFA for all Azure service users, reducing password-related attack risk.
- Azure Bastion Developer provides secure-by-default VM connectivity in 35 regions, shrinking the exposed attack surface.
- Azure Local increased security default settings by 25% (400 additional settings), simplifying compliance and protection against threats like fileless malware.
- Microsoft 365 and AI
- New AI Administrator role to enforce least-privilege for Copilot and other AI capabilities.
- Centralized controls for agent lifecycle governance to approve, restrict, and audit AI agents.
- Windows and Surface
- Quick Machine Recovery to automatically detect and remediate boot failures via a secure, cloud-connected environment.
- Expanded passwordless sign-in with more Windows Hello and passkey support.
- Surface firmware and drivers increasingly written in memory-safe languages (including Rust) to reduce entire classes of vulnerabilities.
- Security and compliance tools
- Microsoft Purview DSPM for AI to centrally manage and monitor AI data security across Copilots, agents, and third-party LLM-based apps, including prompt-level auditing of web search behavior.
- Microsoft Sentinel evolved into an AI-ready SIEM platform with data lake, graph, and MCP capabilities to correlate signals across domains and power AI agents.
- Security Copilot agents to automate high-volume security and IT tasks, integrated across Microsoft Security and partner solutions.
Actionable patterns and practices for customers
Microsoft has distilled its internal experience into SFI patterns and practices—repeatable approaches you can apply in your own environment. Examples include:
- Phishing-resistant MFA – Adopt cryptographic, phishing-resistant methods such as passkeys, FIDO2 security keys, and certificate-based authentication across users and tenants to reduce credential-based attacks.
- Eliminate identity lateral movement – Segment access, enforce Conditional Access policies, and restrict risky guest authentication so attackers cannot easily pivot across tenants or roles.
- Secure all tenants and resources – Identify and remove shadow tenants, and apply baseline policies (like MFA and Conditional Access) consistently to every tenant.
On the vulnerability side, Microsoft is using AI-based triage to improve remediation speed, achieving a 72% success rate in addressing vulnerabilities within its reduced time-to-mitigate targets. In the last reporting period, Microsoft:
- Published 1,096 CVEs, including 53 no-action cloud CVEs.
- Paid out USD 17 million in security bounties to encourage responsible vulnerability disclosure.
Customers can use these data points and patterns as a roadmap: prioritize phishing-resistant MFA, tenant hygiene, least-privilege access, secure defaults, and AI-assisted detection and response as foundational steps in their own security programs.