Most think that the safe senders list does not override the anti-spam policies configured in Exchange Online, but the opposite is true. In this blog, we discuss how this happens and how to fix it with PowerShell.
In this article, Thijs Lecomte discusses how to identify malicious emails using Microsoft Defender for Office 365.
Over the past few years, Microsoft has proven to have a worthy security product in Microsoft Defender for Endpoint (MDE) for Windows devices. While most talk about Windows when discussing Microsoft Defender, it also supports MacOS, Linux, Android, and iOS. The question arises whether MDE is a mature product for these platforms and if you can entrust Microsoft to protect devices running these operating systems.
Microsoft recently announced two new products to the Entra family, Entra Private Access and Entra Internet Access. In this blog, we break down each product and help you decide if they are worth the hype.
While some methods for MFA responses have security issues, people often overlook their practical advantages. Not everyone is ready to dump a valid authentication method. In this article, we take the journey to removing phone-based responses from your tenant while considering some practical implications.
At the end of March 2023, CISA released a new tool called ‘Untitled Goose.’ It is a post-incident hunting tool to help security practitioners sift through security logs in the Microsoft Cloud. In this blog, we discuss the tool, its uses, and our opinion on it.
Are you looking to add some extra security to your small organization? Microsoft Defender for Business may be the right fit. Learn more about the capabilities of Microsoft Defender for Business and how it compares to other Microsoft Defender Plans.
As organizations move to the cloud, on-premises environments (and their security) are put in the background as the focus shifts to the cloud. Nevertheless, most organizations I know are in a hybrid scenario where the on-premises environment holds the master data and synchronizes everything into Azure Active Directory. This blog explores how an on-premises environment is connected to the cloud and how an attacker might move from on-premises to the cloud laterally.