{"id":16096,"date":"2026-04-24T10:00:54","date_gmt":"2026-04-24T01:00:54","guid":{"rendered":"https:\/\/m365jp.net\/?p=16096"},"modified":"2026-04-24T10:01:21","modified_gmt":"2026-04-24T01:01:21","slug":"mc1288236-microsoft-security-exposure-management-secure-now","status":"publish","type":"post","link":"https:\/\/m365jp.net\/index.php\/2026-04-24-mc1288236-microsoft-security-exposure-management-secure-now","title":{"rendered":"MC1288236 | Microsoft Security Exposure Management Secure Now"},"content":{"rendered":"<div class=\"postie-post\">\n<div>\n<hr>\n<table id=\"section\">\n<tbody>\n<tr>\n<th width=\"95%\">MC1288236 | Microsoft Security Exposure Management Secure Now<\/th>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr>\n<table id=\"data\">\n<tbody>\n<tr>\n<th>Classification<\/th>\n<td>planForChange<\/td>\n<\/tr>\n<tr>\n<th>Last Updated<\/th>\n<td>04\/24\/2026 00:21:41<\/td>\n<\/tr>\n<tr>\n<th>Start Time<\/th>\n<td>04\/22\/2026 15:49:36<\/td>\n<\/tr>\n<tr>\n<th>End Time<\/th>\n<td>06\/29\/2026 07:00:00<\/td>\n<\/tr>\n<tr>\n<th>Message Content<\/th>\n<td>\n<p>[Introduction]<\/p>\n<\/p>\n<p>Microsoft is taking steps to help keep customers safe as AI models become more advanced&nbsp;including&nbsp;plans&nbsp;to incorporate advanced AI models directly into&nbsp;our&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/sdl\/\" style=\"font-family: sans-serif;font-weight: 400\">Security   Development Lifecycle (SDL)<\/a>&nbsp;to&nbsp;identify&nbsp;vulnerabilities and develop mitigations and updates. We are also sharing guidance&nbsp;through Microsoft Security Exposure Management&nbsp;on&nbsp;how customers can&nbsp;reduce their exposure&nbsp;as well as capabilities they can use to&nbsp;take   action.&nbsp;You can learn more in our blog here:&nbsp;<a href=\"https:\/\/aka.ms\/prioritizingdefense\" style=\"font-family: sans-serif;font-weight: 400\">https:\/\/aka.ms\/prioritizingdefense<\/a>&nbsp;<\/p>\n<p>[When this will happen:]<\/p>\n<p>General Availability (Worldwide): We will begin rolling out on late April 2026 and expect to complete by late April 2026.<\/p>\n<p>[How this will affect your organization:]<\/p>\n<\/p>\n<p>Customers should review the guidance and&nbsp;take action to reduce&nbsp;their exposure to&nbsp;the five dimensions where autonomous&nbsp;AI\u2011driven&nbsp;attacks gain disproportionate advantage &#8211; patching, open-source software, customer source code, internet-facing assets, and baseline   security hygiene.&nbsp;&nbsp;<\/p>\n<p>[What you need to do to prepare:]<\/p>\n<\/p>\n<p>Customers can review the guidance&nbsp;in&nbsp;Microsoft Security Exposure Management at&nbsp;<a href=\"https:\/\/security.microsoft.com\/securenow\">https:\/\/security.microsoft.com\/securenow<\/a>&nbsp;and use the capabilities provided to take action.&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<th>Machine Translation<\/th>\n<td>\n<p>[\u306f\u3058\u3081\u306b]<\/p>\n<\/p>\n<p>\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u306f\u3001AI\u30e2\u30c7\u30eb\u304c\u3088\u308a\u9ad8\u5ea6\u5316&nbsp;\u3059\u308b\u4e2d\u3067\u3001\u30e6\u30fc\u30b6\u30fc\u306e\u5b89\u5168\u3092\u5b88\u308b\u305f\u3081\u306e\u63aa\u7f6e\u3092\u8b1b\u3058\u3066\u304a\u308a\u3001&nbsp;\u9ad8\u5ea6\u306aAI\u30e2\u30c7\u30eb\u3092<a href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/sdl\/\" style=\"font-family: sans-serif;font-weight: 400\">\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u958b\u767a\u30e9\u30a4\u30d5\u30b5\u30a4\u30af\u30eb(SDL<\/a>&nbsp;)\u306b\u76f4\u63a5&nbsp;&nbsp;\u7d44\u307f\u8fbc\u307f\u3001\u8106\u5f31\u6027\u3092\u7279\u5b9a\u3057\u3001\u7de9\u548c\u7b56\u3084\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3092\u958b\u767a\u3059\u308b&nbsp;&nbsp;\u8a08\u753b&nbsp;\u3082\u542b\u307e\u308c\u3066\u3044\u307e\u3059\u3002\u307e\u305f\u3001Microsoft   Security Exposure Management&nbsp;\u3092\u901a\u3058\u3066\u3001\u9867\u5ba2&nbsp;\u304c\u30ea\u30b9\u30af&nbsp;\u3092\u6e1b\u3089\u3059\u65b9\u6cd5\u3084\u5bfe\u5fdc\u53ef\u80fd\u306a\u6a5f\u80fd&nbsp;\u306b\u3064\u3044\u3066&nbsp;\u306e\u30ac\u30a4\u30c0\u30f3&nbsp;\u30b9\u3082\u5171\u6709\u3057\u3066\u3044\u307e\u3059\u3002&nbsp;\u8a73\u7d30\u306f\u3053\u3061\u3089\u306e\u30d6\u30ed\u30b0\u3092\u3054\u89a7\u304f\u3060\u3055\u3044:&nbsp;<a href=\"https:\/\/aka.ms\/prioritizingdefense\" style=\"font-family: sans-serif;font-weight: 400\">https:\/\/aka.ms\/prioritizingdefense<\/a>&nbsp;<\/p>\n<p>[\u3044\u3064\u8d77\u3053\u308b\u304b:]<\/p>\n<p>\u4e00\u822c\u516c\u958b(\u4e16\u754c\u5c55\u958b):2026\u5e744\u6708\u4e0b\u65ec\u304b\u3089\u5c55\u958b\u3092\u958b\u59cb\u3057\u30014\u6708\u4e0b\u65ec\u307e\u3067\u306b\u5b8c\u4e86\u3059\u308b\u4e88\u5b9a\u3067\u3059\u3002<\/p>\n<p>[\u3053\u308c\u304c\u3042\u306a\u305f\u306e\u7d44\u7e54\u306b\u3069\u306e\u3088\u3046\u306a\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u304b:]<\/p>\n<\/p>\n<p>\u9867\u5ba2\u306f\u30ac\u30a4\u30c0\u30f3\u30b9\u3092\u78ba\u8a8d\u3057\u3001&nbsp;\u81ea\u5f8b&nbsp;\u578bAI\u653b\u6483&nbsp;\u304c\u904e\u5270\u306a\u512a\u4f4d\u6027\u3092\u5f97\u3066\u3044\u308b5\u3064\u306e\u5074\u9762(\u30d1\u30c3\u30c1\u9069\u7528\u3001\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3001\u9867\u5ba2\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u3001\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u5bfe\u5fdc\u8cc7\u7523\u3001\u57fa\u672c\u7684\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u885b\u751f)\u3078\u306e&nbsp;\u66dd\u9732\u3092\u6e1b\u3089\u3059&nbsp;\u305f\u3081\u306e\u884c\u52d5\u3092\u53d6\u308b\u3079\u304d\u3067\u3059\u3002&nbsp;&nbsp;<\/p>\n<p>[\u6e96\u5099\u306e\u305f\u3081\u306b\u3084\u308b\u3079\u304d\u3053\u3068:]<\/p>\n<\/p>\n<p>\u9867\u5ba2\u306f <a href=\"https:\/\/security.microsoft.com\/securenow\">https:\/\/security.microsoft.com\/securenow<\/a>&nbsp;\u6642\u306b&nbsp;Microsoft Security Exposure Management\u306e&nbsp;\u30ac\u30a4\u30c0\u30f3&nbsp;\u30b9\u3092\u78ba\u8a8d\u3057\u3001\u63d0\u4f9b\u3055\u308c\u305f\u6a5f\u80fd\u3092\u4f7f\u3063\u3066\u5bfe\u5fdc\u3092\u8d77\u3053\u3059\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002&nbsp;<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>MC1288236 | Microsoft Security Exposure Management Secure Now Classification planForChange Last Updated 04\/24\/ [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-16096","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts\/16096","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/comments?post=16096"}],"version-history":[{"count":0,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts\/16096\/revisions"}],"wp:attachment":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/media?parent=16096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/categories?post=16096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/tags?post=16096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}