Scanning Networks with Microsoft Defender External Attack Surface Management
In this blog, Thijs Lecomte dives into how to protect you public-facing infrastructure with Microsoft Defender's External Attack Surface Management tool.
In this blog, Thijs Lecomte dives into how to protect you public-facing infrastructure with Microsoft Defender's External Attack Surface Management tool.
Terminating employees is never fun, but it does happen. And when it happens, you need to know the necessary steps for removing their access. This blog serves as a checklist for removing employees with Microsoft 365 Accounts,
No one likes spending money! In this episode of Practical Protection, we dive into imposing cost on attackers, hopefully deterring them from attacking in the first place.
Dynamic watermarking is a new feature for sensitivity labels that's intended to provide a visual deterrent to screen captures of confidential documents. The feature works by using the email address of the signed-in user as a watermark. Everything works and the feature seems effective, but this isn't something to use with every sensitivity label.
This week on the Podcast we are joined by Paul Robichaux - as a guest alongside MVPs Tony Redmond and Michel de Rooij to discuss The Experts Conference (TEC) 2024 in Dallas, Texas!
In this installment of the Practical PowerShell series, we discuss some of the most common options for output and adding custom logging to your script.
This blog dives into the importance of Data Retention in your Tenant and offers a preview into Joanne Klein's upcoming session at TEC 2024.
On the show this week, Steve Goodman and Rich Dean are joined by speaker guest, TEC speaker & 20-time Microsoft MVP, Derek Melber to discuss Securing your AD, removing NTLM passwords from use in your organization, and the aftermath of Crowdstrike.
In this episode of Practical Teams, we dive into meeting templates and sensitivity labels, exploring how labels and templates can be used to adhere to requirements, policies, and if necessary, enforce some applicable settings in meetings.
Sometimes sensitivity labels defined for use within a Microsoft 365 tenant turn out to be unnecessary. The question then is what to do with these unwanted sensitivity labels. The answer is to pause for thought, gather information, and then make an informed decision, all of which we discuss here.
After identifying what networking data you should ingest into Sentinel, the next step is to start creating alerts and incidents using the data. And that is exactly what we cover in this episode of Practical Sentinel.