- Product
Product Overview
Sophisticated security with unmatched simplicityCloud SIEM
Pre-configured detections across your environmentHoneypots
Deception technology to detect lateral movementEndpoint Visibility
Real-time monitoring with added detection & responseSecurity Reports
Data visualizations, compliance reports, and executive summariesAutomated Response
Detect, prioritize, and neutralize threats around the clockIntegrations
Cloud, on-prem, and open API connectionsXDR Platform
A complete view to identify risk, and things operational
- Pricing
- Why Blumira
Why Blumira
The Security Operations platform IT teams loveWatch A Demo
See Blumira in action and how it builds operational resilienceUse Cases
A unified security solution for every challengePricing
Unlimited data and predictable pricing structureCompany
Our human-centered approach to cybersecurityCompare Blumira
Find out how Blumira stacks up to similar security toolsIntegrations
Cloud, on-prem, and open API connectionsCustomer Stories
Learn how others like you found success with Blumira
- Solutions
- Partners
- Resources
Microsoft Security

Security How-To
6 min read
| May 11, 2023
How To Detect SYSVOL Enumeration Exploits
Read More
Security How-To
21 min read
| April 28, 2023
How to Select SIEM for Microsoft 365
Read More
Security Alerts
14 min read
| January 13, 2023
How To Navigate Microsoft 365 Audit Logs
Read More
Security How-To
18 min read
| January 4, 2023
How To Manage Windows Firewall with GPOs
Read More
Security How-To
15 min read
| November 22, 2022
Office 365 Audit Log Retention: Why It Matters and Best Practices
Read More
Product Updates
11 min read
| November 18, 2022
8 Microsoft 365 Detections You Get Free with Blumira
Read More
Security How-To
20 min read
| November 15, 2022
A Guide To Microsoft Azure Security Logging
Read More
Security How-To
17 min read
| October 26, 2022
Find a User with Their Security ID in Windows
Read More
Security How-To
16 min read
| October 18, 2022
Active Directory Password Auditing with NtdsAudit & NThashes
Read More
Security How-To
17 min read
| October 18, 2022
Event ID 4732: The Case of the Missing Username
Read More
Security How-To
11 min read
| October 13, 2022
Securing Exchange Server: 8 Best Practices
Read More
Security Alerts
16 min read
| September 30, 2022
Zero-Day Vulnerabilities Found in Microsoft Exchange (CVE-2022-41040 and CVE-2022-41082)
Read More
Security Trends and Info
3 min read
| September 22, 2022
How To Prepare For Microsoft’s Basic Auth Deadline
Read More
Security How-To
6 min read
| August 9, 2022
Detecting Microsoft Legacy Authentication with Blumira
Read More
Security How-To
3 min read
| August 3, 2022
Is This Thing On? Microsoft 365 Security
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.