Using Device Control in Defender for Endpoint to Block USB Drives
Copying data from Windows endpoints to USB storage devices is one of the largest sources of data leakage. In this article, we discuss two simple solutions to avoid this problem.
Copying data from Windows endpoints to USB storage devices is one of the largest sources of data leakage. In this article, we discuss two simple solutions to avoid this problem.
Over the last year, Microsoft has released several new features to make management of inactive devices easier. In this blog, we review these features and build off our original blog post on "Handling Inactive Devices in Microsoft Defender for Endpoint."
Are you looking to ingest your data into Sentinel? In this episode of Practical Sentinel, we review use cases and tips for ingesting networking data into Sentinel.
Defender for Endpoint gathers system information to support operation and detection needs. We can then leverage that data to build a custom report to show the deployment status. This blog walks through that process using KQL.
In this article, we discuss how to enhance mobile security in MAM, focusing on the Defender for Endpoint functionality and features related to mobile devices, specifically for BYOD scenarios.
Over the past few years, Microsoft has proven to have a worthy security product in Microsoft Defender for Endpoint (MDE) for Windows devices. While most talk about Windows when discussing Microsoft Defender, it also supports MacOS, Linux, Android, and iOS. The question arises whether MDE is a mature product for these platforms and if you can entrust Microsoft to protect devices running these operating systems.
This article continues the discussion of the main steps needed to mitigate a zero-day threat Using Microsoft 365 Defender and Sentinel.
Managing inactive devices is a confusing concept for an administrator just starting with Microsoft Defender for Endpoint. This article will provide key insights on how organizations can handle inactive devices within Microsoft Defender for Endpoint.
Microsoft Defender for Endpoint is not a product you roll out and forget. To get the most out of this tool on a day-to-day basis, we walk through some actions administrators should be doing to keep current with the product.