The Windows Vista Team Blog has posted a handy list of all of the official Microsoft product team blogs.
Turns out I was already subscribed to seven of them but managed to pick up a couple of new ones that interest me.
You may withdraw your consent at any time. Please visit our Privacy Statement for additional information
The Windows Vista Team Blog has posted a handy list of all of the official Microsoft product team blogs.
Turns out I was already subscribed to seven of them but managed to pick up a couple of new ones that interest me.
The new Purview eDiscovery implementation supports a Graph API. Where there's a Graph API, there are PowerShell cmdlets based on the API. This article explains how to use PowerShell to automate different aspects of eDiscovery cases. PowerShell can't review the items found by searches, but it can handle most of the other processing.
In this episode of Practical Protection, we dive into the basics of Threat Hunting, tools you can use, and even some DIY hunting advice.
In this episode, Steve Goodman and Bastiaan Verdonk interview Victor King from Quest Software, on best practices for Active Directory security. They discuss identifying misconfigurations, managing privileged access, and continuous environmental monitoring.