Use Microsoft 365 Defender and Sentinel to Defend Against New Zero-Day Threats: Part II
This article continues the discussion of the main steps needed to mitigate a zero-day threat Using Microsoft 365 Defender and Sentinel.
This article continues the discussion of the main steps needed to mitigate a zero-day threat Using Microsoft 365 Defender and Sentinel.
A thorough understanding of what Defender for Office 365 can do is important as you consider how best to protect your tenant. In this edition of Practical Protection, Paul deep dives into the umbrella brand of Microsoft Defender and its individual products.
Microsoft plans to launch a Pay As You Go backup and restore service for Exchange Online and SharePoint Online as part of its Syntex content management suite. This is new ground for Microsoft as they've never offered a backup service for Microsoft 365 before. How will Syntex compare to ISV backup services? Time will tell!
Learn some of the main group policy attack pathways, why they are easily exploited, and how to mitigate them in this article by Darryl Baker.
With the move to the cloud, many organizations synchronize identities to Azure Active Directory. This makes an attacker’s job easier as they have a single point where they can attempt to compromise accounts. In this article, Thijs Lecomte walks through the protection and detection mechanisms available to repel password spray attacks.
In this article, Steve Goodman shows how to use Microsoft Teams to stream live events and recording videos for post-production.
This week on the show, Steve and Paul are joined by Sigi Jagott, long-time MVP and Exchange Server expert, to discuss best practice when upgrading on-premises servers to Exchange 2019, Native Cross-Tenant Migrations, Azure AD resiliency, and more!
Although we live and work in a cloud-first world, on-premises Active Directory (AD) remains a vital component of many companies' IT infrastructure. This article goes over five ways to keep Active Directory secure.
Microsoft 365 tenants can assign colors to the sensitivity labels used to mark files and messages. However, the set of colors chosen by Microsoft is frankly a bit weird. You can use PowerShell to assign different colors to labels and in this article, we show you how to use a traffic light color scheme.
This article discusses the four main steps to mitigate a zero-day threat Using Microsoft 365 Defender and Sentinel.
This week on Practical Protection, Paul discusses the history of passwords and the many problems they pose in the modern cloud-based world.