Graph Security API

Total Page:16

File Type:pdf, Size:1020Kb

Graph Security API ways to better connect 7 your security operations Table of contents Introduction ................................................................. 1 7 scenarios that use the ......................... 9 How to use this guide.......................................................2 Microsoft Graph Security API 1. Streamline alert life-cycle management .........9 Microsoft Graph ........................................................ 3 2. Automate creation of security incidents ........9 Microsoft Graph Security API ......................... 4 3. Automate security response workflows .......10 Authentication .....................................................................5 4. Unlock additional security insights to inform threat response .......................................11 Connect to the API .............................................................8 5. Use custom threat intelligence in Microsoft security solutions ..............................13 6. Proactively manage security risks ...................14 7. Understand security threats targeting the organization and view trends ...................14 1 Introduction To combat the increasing number of cyberthreats, most Multiple schemas. Disparate schemas organizations rely on a diverse portfolio of security for alerts and other entities make solutions: endpoint protection, network firewalls, correlation of security data difficult. Core capabilities identity and access controls, cloud security, and so on. of the Microsoft Graph Security API This defense-in-depth strategy offers many security Inaccessible context. Critical information advantages, but gaps may still exist between solutions, about users or devices often lives outside Connect your and these gaps can hinder the organization’s ability the organization’s security tools. security solutions. to effectively manage vulnerabilities and respond to threats. By sharing security insights and enabling The Microsoft Graph Security API greatly simplifies Build intelligent orchestration across security solutions, organizations integration with Microsoft and third-party security security apps. can gain an advantage over today’s adversaries. solutions. Using one endpoint, one software development Unify security kit (SDK), one schema, and one authentication mechanism, management and Despite the benefits of connecting multiple security customers and partners can easily build integrated incident response. tools and workflows, integration challenges such security applications, workflows, and analytics. as the following can add cost and complexity: Automate security workflows. Multiple application programming interfaces Simplify reporting (APIs). Different endpoints, authentication and analytics. models, and data sets make integration time- consuming to set up and difficult to maintain. INTRODUCTION 2 How to use this guide This guide provides a comprehensive overview the insights from other security providers, of the Microsoft Graph Security API, including aggregating alerts into their own dashboards, common scenarios, and code samples for and enriching them with contextual information each. The primary audience for this guide is from related entities such as users and hosts. architects, developers, and scripters/tool smiths This guide helps you: from the following types of organizations: IT services and system integrators (SIs). SIs help customers integrate their security Understand Microsoft Graph and the Microsoft Independent software vendors (ISVs). ISVs can tools and workflows, implementing security Graph Security API. integrate their commercial security products and operations programs and processes. services with the Microsoft Graph Security API to Get familiar with use gain visibility into security alerts, secure score, and Enterprises. Enterprises build custom security apps, cases and scenarios that use the Microsoft contextual data from Microsoft Graph providers integrate security tools and workflows, and develop Graph Security API. and shared threat intelligence. Optionally, ISVs tools and analytics for hunting and detection. can also become providers to the Microsoft Graph Connect with additional Security API as peers to Microsoft providers. Partners can integrate their applications with Microsoft documentation, Graph Security API to build connected security solutions. resources, and sample applications and code Managed security service providers (MSSPs) or They can also surface their data through the Microsoft to get started quickly. managed service providers (MSPs). MSSPs and MSPs Graph Security API to become a security provider. develop applications to support security management Contact the Microsoft Graph Security team by email at and monitoring services. They can immediately benefit [email protected] if you’re interested from the Microsoft Graph Security API, integrating in onboarding as a Microsoft Graph Security provider. various security solutions, taking advantage of MICROSOFT GRAPH 3 Microsoft Graph Microsoft Graph (graph.microsoft.com) is a collection of the information you need. For example, to get the APIs that together provide a standard unified interface list of important messages for a user, you send a GET and schema for accessing information from Microsoft request of https://graph.microsoft.com/v1.0/ Documentation online services (for example, Azure Active Directory me/messages?$filter=importance eq 'high'. [Azure AD], Office 365, OneDrive, OneNote, Microsoft These APIs are easy to implement; share a common For more information SharePoint, Microsoft Planner, Microsoft Intune, etc.) authentication framework based on OpenID Connect, about Microsoft and third-party vendors (in applicable APIs). This single OAuth 2.0, and a Web Representational State Transfer Graph, see Use the connection point (graph.microsoft.com) is the root for (REST) API with standard JavaScript Object Notation Microsoft Graph API. the other namespaces assigned to the services accessible (JSON) response formats; and support a variety of through the Microsoft Graph API. You can simply add platforms, with easy-to-use SDKs and code samples. additional namespaces and filtering elements to get MICROSOFT GRAPH SECURITY API 4 Microsoft Graph Security API Part of Microsoft Graph, the Microsoft Graph Security and identity, through Secure Score Control Profiles. API integrates with security solutions from Microsoft Scores and profiles are available from each security Frequently asked and partners in a federated model; it can also be used provider that offers them—valuable information that in conjunction with other Microsoft Graph entities to can help guide vulnerability remediation actions The Microsoft Graph gain additional context (for example, Office 365 and based on the suggested actions available in each Security API is not Azure AD). The API has multiple entities, including: profile. By default, 90 days of data is retained. about security for Microsoft Graph. This API provides security Alerts from multiple security solutions, each Example Query data across different representing that potentially malicious activity security products running GET https://graph.microsoft.com/v1.0/ in your organization. has been detected within the organization. security/secureScores?$top=1 Example Query No extra cost GET https://graph.microsoft.com/v1.0/ Threat intelligence indicators refer to information security/alerts?$filter=severity eq 'high' about known threats, such as malicious IP addresses, An Azure subscription domains, or URLs. Organizations can send their threat is all you need to use intelligence to targeted Microsoft services to enable the Microsoft Graph Secure Score provides information about an custom detections. An action can be specified for each Security API. There is no organization’s security posture, including a numeric indicator (either block, alert, or allow) signaling to the additional cost. Access rating based on elements like the enabled security target solution what action to take on that indicator. to data from third-party service providers may features in your environment and outstanding security require corresponding risks. This score is available at the tenant level as subscriptions with well as at a specific control area, such as device, app, those vendors. MICROSOFT GRAPH SECURITY API 5 Example Query Example Query POST https://graph.microsoft.com/ POST https://graph.microsoft.com/ beta/security/tiIndicators/ beta/security/securityActions Content-type: application/json Content-type: application/json Accessing the API { { "action": "alert", "name": "BlockIp", Access the Microsoft "confidence": 0, "actionReason": "Test", Graph Security API by "description": "MD5 hash on watch while "parameters": [ using the following URL: system vulnerabilities being addressed", { https://graph.microsoft. "expirationDateTime": "2019-03- "name": "IP", 01T21:43:37.5031462+00:00", com/VERSION/security/ "value": "1.2.3.4" ENTITY?$filter=FILTER "externalId": "Test-- } 8586509942679764298MS501", ], VERSION is the API "fileHashType": "MD5", "vendorInformation": { version (e.g., v1.0, beta) "fileHashValue": "provider": "Windows Defender ATP", "fe8a8226a4cfd0deffe209069a7e64d908b74de8", ENTITY is the specific "severity": 0, "vendor": "Microsoft" entity (e.g., alerts) "targetProduct": "Azure Sentinel", } "threatType": "WatchList", } FILTER limits the results (e.g., severity eq 'high') "tlpLevel": "green"} The following is a Authentication complete example: Security actions provide the ability to perform tasks pertaining to specific
Recommended publications
  • Paid Search and Microsoft Audience Ads BETTER TOGETHER
    Paid search and Microsoft Audience Ads BETTER TOGETHER Hand in hand, they deliver more eyeballs and clicks Whether it’s cookies with milk or cake and ice cream, some things are simply better together. The same rings true for combining search advertising’s finest with the best of native advertising. When used together, they can help marketers reach customers across multiple touch points of the user journey, and get high-quality clicks and conversions at scale. While native ads is a well-recognized ad format, we call them Microsoft Audience Ads. After all, it’s more about reaching the right audience and less about the ad type, right? Ad spend is growing for native and search In fact, it’s growing by double digits for both. 25% 11% Expected annual growth in Expected annual growth in native ad spending in the paid search ad spending U.S. through 20191 in the U.S. through 20202 2018 2019 2018 2019 2020 Looking to increase impressions and capture more purchase intent? Using native and paid search ads together can help you get results at scale. MORE HIGHER HIGHER HIGHER FREQUENTLY PURCHASE BRAND PURCHASE 53% VIEWED 32% INTENT 24% RECALL 18% INTENT DISPLAY VS. NATIVE NO BRAND AD VS. BRAND AD NO BRAND AD VS. BRAND AD BANNER VS. NATIVE Consumers viewed Searchers on Bing Searchers on Bing who Native ads registered native ads 53% more who saw a brand’s ad saw a brand’s ad were an 18% higher lift in frequently than they showed 32% higher 24% more likely to purchase intent than viewed display ads.3 purchase intent even recall the brand than banner ads.3 if they didn’t click on a those who didn’t see brand’s ad.4 the ad.4 Two powerful ways to run Microsoft Audience Ads Along with your search campaigns, add Microsoft Audience Ads to get more high-quality volume outside of search.
    [Show full text]
  • Team Microsoft Bryce Hrusovsky Reid Wildenhause Jingwei Wan Sam Batali Department of Computer Science and Engineering Michigan State University Fall 2019
    Project Plan ITPro Company Portal The Capstone Experience Team Microsoft Bryce Hrusovsky Reid Wildenhause Jingwei Wan Sam Batali Department of Computer Science and Engineering Michigan State University Fall 2019 From Students… …to Professionals Functional Specifications • Problem: The number of devices being deployed by corporate entities is growing, increasing the workload for IT specialists. ▪ Specialists need the ability to manage corporate devices while they are in the field. ▪ Microsoft Intune solves this problem, but requires a desktop or laptop computer to use. • Solution: Create a mobile application that allows IT specialists to easily monitor, manage and maintain corporate devices with Microsoft Intune directly from a mobile device. The Capstone Experience Team Microsoft Project Plan Presentation 2 Design Specifications • Cross Platform: The application is created to run in both iOS, Android, and UWP using Xamarin platform. 3 different platforms, different UI designs, same codebase for models and controls • Login Page: The first window a user interact with after the launch page. The user must enter correct login credentials (Email/Phone and Passwords) before being redirected to the main page • Main Page: The main window for the application. Contains multiple tabs, sidebar, and summary page, user information, and status • Navigation: The application contains various tabs, links in the sidebar which links users to other pages such as device(s) page, manage page, settings page, terms and services, and Help and support page The Capstone
    [Show full text]
  • Microsoft Graph Mark Stafford, Graph PM • Microsoft Graph, What and Why
    Microsoft Graph Mark Stafford, Graph PM • Microsoft Graph, what and why • 5 steps to your first Graph app • App patterns • 5 tips and tricks to become a Graph coder • What’s new and roadmap Office 365 Your tailored Windows 10 experiences or customizations Enterprise Mobility + Security 1 billion 1 million 100 billion users across work, monthly active apps Microsoft Graph life and edu using Microsoft Identity requests per month Your tailored experiences or customizations 18 trillion 90% 180 million Microsoft Graph nodes Fortune 500 monthly active users of Office 365 commercial Extend Microsoft 365 experiences Build your experience Web Bots & Device Daemon Workflow Documents Conversations Portals Timeline Search Analytics apps agents & native apps automation apps Microsoft Graph REST APIs and webhooks Your local data Microsoft Graph Azure AI platform Microsoft Graph Connectors Office 365 Windows 10 Enterprise Mobility + Security data connect Microsoft Identity Apps Web Native Bots Flows Automation Analytics Auth UX Libraries Capabilities Microsoft Graph Microsoft Graph Connectors Interfaces REST APIs and Webhooks Data Connect Data Microsoft 365 Your domain Apps Web Native Bots Flows Automation Analytics Auth UX Libraries Capabilities Microsoft Graph Microsoft Graph Connectors Interfaces REST APIs and Webhooks Data Connect Data Microsoft 365 Your domain Apps Web Native Bots Flows Automation Analytics Auth UX Libraries Capabilities Microsoft Graph Microsoft Graph Connectors Interfaces REST APIs and Webhooks Data Connect Data Microsoft 365
    [Show full text]
  • Douchebag Jar the Instant Karma App
    Douchebag Jar The Instant Karma App A full­stack mobile application development project Douchebag Jar The Instant Karma App Ett full­stack utvecklingsprojekt för mobilapplikationer Frida Nilsson Dan Gryttman The Faculty of Health, Science and Technology Computer Science Bachelor Thesis 15hp Supervisor: Katarina Asplund Examiner: Jonathan Vestin Date: 2021­05­31 Preface We want to thank our supervisors at Ubitech AB, Martin and Viktor, for your guidance, your patience and for your dedication. We would also like to thank our supervisor Katarina for helping us with the thesis, and reminding us that a thesis is also part of a project. Finally, we want to thank Elin, as she is the reason why we needed an app like this. i ii PREFACE Abstract Mobile applications are everywhere in today’s society, they come in many flavours and are an integral part of many peoples daily lives. The limits to development of mobile applications are expanding with each new idea of how the technology could be potentially used, and it is a field that is most likely going to continue to influence the world we live in. In this thesis, the objective was to develop a proof of concept for a mobile application for social interaction which is tightly anchored to the real world. The idea of the "Douchebag Jar" application was intended as a way for friends and coworkers to stay connected and keep having fun at each other’s expense by introducing a karma-based punishment/redemption system. The goal was to learn about mobile application devel- opment and the technologies behind it, get first hand experience with app development and become familiarised with tools used by professional app developers.
    [Show full text]
  • Breaching the Cloud Perimeter
    Breaching the Cloud Perimeter Brought to you by… © Offensive Tradecraft by BHIS @BHInfoSecurity https://www.blackhillsinfosec.com Roadmap • Breaching the Cloud Perimeter • Cloud Pentest Authorization • Cloud Authentication Methods • Reconnaissance • Exploiting Misconfigured Cloud Assets • Gaining a Foothold • Post-Compromise Recon • Pillaging Cloud Assets • Cloud Infrastructure Attacks • Weaponizing the Cloud for Red Team Operations © Offensive Tradecraft by BHIS @BHInfoSecurity https://www.blackhillsinfosec.com Cloud vs. On-Prem • What is different about penetration testing "the cloud"? • Traditional attacks, different angle • Post-compromise results in new challenges • More room for misconfiguration • Higher risk to orgs as services used by employees are now public facing © Offensive Tradecraft by BHIS @BHInfoSecurity https://www.blackhillsinfosec.com Author/Instructor • Beau Bullock (@dafthack) • Pentester / Red Team at Black Hills Information Security • Certs: OSCP, OSWP, GXPN, GPEN, GWAPT, GCIH, GCIA, GCFA, GSEC • Speaker: WWHF, DerbyCon, Black Hat Arsenal, BSides, Hack Miami, RVASec • Tool Developer: MailSniper, PowerMeta, DomainPasswordSpray, MSOLSpray, HostRecon Check-LocalAdminHash © Offensive Tradecraft by BHIS @BHInfoSecurity https://www.blackhillsinfosec.com Sources & Thanks! • Huge thanks to all the cloud pentesting blog/book authors & open source developers! • Sean Metcalf (@PyroTek3) & Trimarc - https://adsecurity.org/ • Karl Fosaaen (@kfosaaen) & NETSPI - https://blog.netspi.com/ • Ryan Hausknecht (@haus3c) & SpectorOps
    [Show full text]
  • Build Intelligent Mail, Contacts and Calendar Apps Using the Outlook REST Apis
    Build Intelligent mail, contacts and calendar apps using the Outlook REST APIs Andrew Davidoff Senior Software Engineer Agenda • General Overview • Microsoft Graph & Outlook API endpoints • Usage details • What’s new with the APIs • Key takeaways • Powerful: APIs to create powerful applications & services to drive productivity. • Secure: Industry standard OAuth flow that respects your authentication policies. • Easy to Use: REST APIs that are easy to use on any platform you choose. • Strategic: THE APIs to use across Office 365, Hybrid Exchange 2016 & Outlook.com. • Production Ready: Available now to build production apps & services at scale Overview Why do the REST APIs matter? • 100’s of millions of users • Office 365 & Outlook.com for production apps & services • Hybrid Exchange deployment support in preview • On-premises Exchange on our roadmap • Many of these are highly engaged Outlook users • Powerful, intuitive way to build apps & services • Granular, tightly scoped permissions to access data • Based on open standards – OAuth 2.0, JSON & OData 4.0 API Landscape • Modern APIs • Microsoft Graph • The API to use to build apps & services integrating w/ Office services for cloud & hybrid users • Outlook REST API • Outlook/Exchange specific API endpoint to use if Microsoft Graph doesn’t have the APIs yet. • Older APIs • Exchange Web Services (EWS) SOAP APIs • Available since Exchange 2007 SP1 for integration with Exchange. No granular access. • Exchange Active Sync (EAS) • Used by mobile device manufacturers for built-in messaging client. Requires licensing. • Not intended for any other integrations including line of business apps & services Modern API Basics – API Endpoints • Microsoft Graph: • Worldwide except China: https://graph.microsoft.com • China: https://microsoftgraph.chinacloudapi.cn • Outlook REST API: • Office 365 Multi-Tenant: https://outlook.office.com/api • China: https://partner.outlook.cn/api • Office 365 Dedicated: Per-customer URL.
    [Show full text]
  • CSP Technical Overview for Partners a General and Introductory Technical Overview of CSP's Architecture, Entities, Workflows and Tools
    Guidance Document CSP Technical Overview for Partners A general and introductory technical overview of CSP's architecture, entities, workflows and tools. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of the publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT©2017 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft Corporation may have patents or pending patent applications, trademarks, copyrights or other intellectual property rights covering subject matter in this document. The furnishing of this document does not provide the reader any license to the patents, trademarks, copyright or other intellectual property rights except as expressly provided in any written license agreement from Microsoft Corporation. Microsoft, Active Directory, ActiveSync, Outlook, SharePoint, SQL Server, Windows, Windows Live, Windows Mobile, Windows Server, and Windows Vista are trademarks of the Microsoft group of companies. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
    [Show full text]
  • Leveraging Microsoft Graph Presented by Jeff Greene Microsoft Graph “Microsoft Graph Is the Gateway to Data and Intelligence in Microsoft 365
    Leveraging Microsoft Graph Presented by Jeff Greene Microsoft Graph “Microsoft Graph is the gateway to data and intelligence in Microsoft 365. Microsoft Graph provides a unified programmability model that you can use to take advantage of the tremendous amount of data in Office 365, Enterprise Mobility + Security, and Windows 10.” Activity Feed “Microsoft helps drive user productivity with your apps through experiences like Windows Timeline, Windows Sets, Cortana Pick up Where I left off and Microsoft Launcher, which are all powered by the activity feed.” Activity Feed Use Activity Feed for This • Record a single activity for a group of related user actions. If your application is used for a sequence of related content, it probably makes sense to record a single activity for the entire engagement session. • If the same item is changed multiple times, include multiple history items to represent the repeated user engagement. • Store user data to the cloud. If you want to support cross-device activities, you need to make sure the content required to re-engage the activity is stored to a cloud location. For example, if you publish an activity each time a user edits a document, the document should be stored in the cloud as opposed to locally on the user’s device in order to enable cross-device re-engagement. Don’t Use Activity Feed Like This • Create a user activity for actions that users do not need to resume in the future. If your application is used to complete simple, one-time operations that do not persist status for you to track in the future, you probably do not need to write a user activity.
    [Show full text]
  • Microsoft Graph an Overview Johnathan Lightfoot Owner, Techforce, LLC How to Join Poll Everywhere Questions Web
    Microsoft Graph an Overview Johnathan Lightfoot Owner, TechForce, LLC How To Join Poll Everywhere Questions Web Go to PollEv.com Enter Jlightfoot158 Respond to Activity Thank You Thank You Introduction • In IT over 20 years • Worked with Microsoft Products since childhood • Co-Authored three books on SharePoint • A Microsoft Certified Trainer with various certifications • Born in Miami, Florida • Enjoys….Ooh look a squirrel! Microsoft Graph Overview • Microsoft Graph, what and why • 5 steps to your first Graph app • App patterns • 5 tips and tricks to become a Graph coder Office 365 Your tailored Windows 10 experiences or customizations Enterprise Mobility + Security 1 billion 1 million 100 billion users across work, monthly active apps using Microsoft Graph life and edu Microsoft Identity requests per month Your tailored experiences or customizations 18 trillion 90% 180 million Microsoft Graph nodes Fortune 500 monthly active users of Office 365 commercial Microsoft 365 Platform Extend Microsoft 365 experiences Build your experience Web Bots & Device Daemon Workflow Documents Conversations Portals Timeline Search Analytics apps agents & native apps automation apps Microsoft Graph REST APIs and webhooks Your local data Microsoft Graph Azure AI platform Microsoft Graph Office 365 Windows 10 Enterprise Mobility + Security Connectors data connect Microsoft Identity Microsoft Graph “a la carte” data and services Apps Web Native Bots Flows Automation Analytics Auth UX Libraries Capabilities Microsoft Graph Microsoft Graph Connectors Interfaces
    [Show full text]
  • SAS and Microsoft Office 365: a Programming Approach to Integration
    Paper SAS4439-2020 SAS® and Microsoft Office 365: A Programming Approach to Integration Chris Hemedinger, SAS Institute Inc., Cary, NC ABSTRACT Many of us are now using cloud-based productivity tools like Microsoft Office 365. And some of us are using SAS® software in the cloud, too. For those of us who use SAS to read and create Microsoft Excel documents, cloud-based files can add an extra wrinkle when we automate the process. It also adds some exciting possibilities! The Microsoft Office 365 suite offers APIs to discover, fetch, and update our documents using code. In this paper, I show you how to use SAS programs to reach into your Microsoft OneDrive and SharePoint cloud to read and update your files. And I show you how to leverage the collaborative features of Microsoft Teams to publish useful updates to your colleagues and yourself. The approach relies on the REST APIs in Microsoft Office 365 and on the HTTP procedure in SAS. The paper covers each step, including: • registering a new application in your Microsoft Office 365 account • authentication and access using OAuth2 • using SAS to explore your document folders in OneDrive and SharePoint and import into SAS data sets • using SAS to create new documents in OneDrive and SharePoint • sending rich messages to your teammates in Microsoft Teams In addition to the detailed steps, this paper references a GitHub repository with code that you can adapt for your own use. INTRODUCTION If your work environment is like ours here at SAS, you are seeing more of your data and applications move to the cloud.
    [Show full text]
  • Your Guide to Integrating with Microsoft Exchange
    2019 Your Guide to Integrating With Microsoft Exchange EAS, EWS, and Graph About Nylas Nylas is a developer platform that powers applications with email, calendar, and contacts integrations through a REST API. The Nylas API handles more than 100 million API requests per day and has synced more than 15 billion emails. 24,000 developers are signed up to use the API. We’re excited to share some of our learnings here. Overview While Exchange is billed as “email for enterprise”, it does, in fact, drive most business motions: internal and external email communications, calendar invites for meetings and interviews, and contacts databases. It makes sense then that many software applications are building two-way sync between their apps and user’s Exchange accounts. In Exchange’s 20+ year history, Microsoft has created numerous APIs — but with each new API comes a surge in ongoing maintenance and support as developers are forced to rip out the old protocols and implement the new ones. In this guide, we’ll dive into the three most commonly used protocols for integrating with Exchange: 1 EAS (ActiveSync) 2 EWS (Web Services) 3 Microsoft Graph 4 A better way to integrate with Exchange 2 EAS/ActiveSync EWS/Web Services Microsoft Graph How it’s used Mobile API for MS Exchange API for Office 365 synchronization intended for desktop/ protocol for mail, server applications calendar, contacts, & tasks Released 2002 2007 2015 SDK Support Precursors MAPI MAPI, WebDAV, EWS and other ActiveSync individual Office APIs On-prem Experimental support support for hybrid deployments Message format Binary-encoded XML XML SOAP JSON REST over HTTP Data Mail/calendar/ All of the Above All of the above contacts/tasks/notes + metadata and configuration (e.g.
    [Show full text]
  • 05102017 Build Harry Shum
    Build 2017 Harry Shum, Executive Vice President, Microsoft AI and Research Group May 10, 2017 HARRY SHUM: Good morning. It's great to be here. Thank you for listening to Satya, Scott and now me. Let me begin my talk by taking you back to the start of the day. Satya talked about this new app pattern, this new world view of the intelligent edge and the intelligent cloud. Central to this is artificial intelligence. And this is what I'm going to talk to you about now. I have been in the field of AI for a long time. It's amazing to see AI now becoming more a reality. I hope many of you by now know Microsoft Cognitive Services, but I'm not sure if any of you were in that small breakout room two years ago when we launched Cognitive Services with only four APIs. Maybe some of you were in that big breakout room last year when we launched it with 22 APIs. And this year apparently I have been promoted by Satya to the main stage. Seriously, the time for AI is now. At Microsoft, we believe AI is about amplifying human ingenuity. This is our vision for AI at Microsoft. You may ask why now? Well, there are three big forces converging that are making AI possible. The first, big compute, especially how you can take advantage of huge computing power in the cloud. Second, powerful algorithms with amazing progress in deep learning and deep reinforcement learning. Number three, massive amount of data that infuse powerful AI applications.
    [Show full text]