Home Internet How to defend Microsoft networks from adversary-in-the-middle attacks