Practical Protection: Banning Apps with Intune
In this in episode of Practical Protection, we dive into some recent IT incidents involving applications, and how Intune can be used to block them from your devices.
In this in episode of Practical Protection, we dive into some recent IT incidents involving applications, and how Intune can be used to block them from your devices.
In this episode of Practical Protection, Paul Robichaux dives into CISA's Microsoft Expanded Cloud Logs Implementation Playbook, its prerequisites, and applying this advice into your organization.
Securing applications in an Entra tenant is crucial, especially after recent attacks like Midnight Blizzard. This article reviews how to use PowerShell to help identify privileged applications, their permissions, as well as client Secrets.
In this installment of practical protection, we dive into two kinds of crimes, and how you can practically apply that knowledge to securing your network and services within your organization.
In this episode of Practical Sentinel, we dive into the MITRE ATT&CK framework and how to integrate it within your environment through Microsoft Sentinel & Defender XDR.
With 2025 in full swing, it's time to do some reflecting! In this episode of practical protection, we look back at the major Microsoft security events in 2024 and how you can prepare yourself for what's to come in 2025.
This episode of Practical Protection dives into connected experiences, what they are, and debunks some claims that were made regarding AI models using customer data via Connected Experiences.
In this episode of Practical Sentinel, we explain how to use Microsoft Sentinel’s SOAR capabilities to build automation on top of networking data through enrichments, automated actions, and threat intelligence integrations.
In this episode of Practical Protection, Paul Robichaux provides a practical approach to Conditional Access Management, combining both the Beas and Microsoft frameworks.
Many organizations still find it challenging to implement Conditional Access effectively. Luckily, there is a solution for this. In this blog, we share a new open-source framework, introducing 4 tools to help create and validate access policies and strategies, ensuring that security measures are effective and efficient.
It's that time of the year again! In this episode of Practical Protection, we review the 2024 Microsoft Digital Defense Report and offer our recommendations to protect against the emerging and current threat.
This week on Practical Protection, we are talking about Password Policies, what NIST thinks, and offer some advice on staying secure.