Practical Protection: Incident Response
Incident Response is all about people, process, and technique. In this episode of Practical Protection, we review different issues that can arise during incident response.
Incident Response is all about people, process, and technique. In this episode of Practical Protection, we review different issues that can arise during incident response.
Over the last year, Microsoft has released several new features to make management of inactive devices easier. In this blog, we review these features and build off our original blog post on "Handling Inactive Devices in Microsoft Defender for Endpoint."
Don't miss your chance to meet and learn from your favorite Practical 365 Authors at TEC 2024. As a proud sponsor of TEC, we are offering BOGO discounts on exclusive pre-con workshops with authors Michel De Rooij, Jaap Wesselius, and more!
In the wake of the recent CrowdStrike outage, Paul Robichaux dives into what you and your organization should do to prepare for the next unforeseen Microsoft outage.
This article explains how to use PowerShell to create a report listing the files from a OneDrive for Business account. Because so many Microsoft 365 apps store their files in OneDrive (and other apps too), OneDrive can become a form of dumping ground for data. Seeing file information in the report allows account owners to clean up their digital debris.
In this blog, Brandon Colley reviews how to use PIM approvals to create a workflow that could stop attackers in their tracks, even if they have already compromised credentials.
In this blog, Sean Mcavinue reviews an update to his original Tenant-to-Tenant Migration Assessment, which is designed to gather key data to consider during the migration planning process.
Welcome to Practical Sentinel! In the introductory blog of this series, we review how Microsoft positions Sentinel, what capabilities the product includes, and what it does well.
Microsoft introduces Microsoft Security Exposure Management (MSEM)! In this blog, Paul discusses MSEM and offers some advice for things you can do before the tool is pushed to GA.
Active Directory is now 25 years old! In this blog, we embark on a journey through the history and enduring significance of Active Directory over its lifespan, including what's to come in the future.
In this blog, Thijs Lecomte reviews Exclusion for Microsoft Security Solutions, why they are important, and how to manage them.
In this edition of Practical Protection, we are talking about the new Microsoft Cloud PKI, reviewing the steps for deployment, and helping you decide if it is worthwhile for your organization.