0
Authentication and Security

Ready to modernize your MFA?

Just using MFA in it’s basic form is not enough. Today, we take a trip through modern authentication methods, modernizing, and becoming more phish-resistant. I talk top 3 challenges and how to tackle them together!

Posted on 7:10 am

Where to find Incident Investigation Artifacts in M365

A common challenge that security teams face is simply not knowing where all the artifacts can be found during an investigation. Microsoft Defender tools are capable of collecting a lot of data, and that can create questions during investigations of where is all this data and how do I find it quickly? Join me for a tour of the basics of Defender data retention periods and where to find that data.

Posted on 7:00 am

Evaluate Microsoft Defender for Endpoint – Part 3

n this third article in our mini-series on setting up a Microsoft Defender for Endpoint labs environment we will be getting things running this week by adding devices and deploying simulations into the labs environment. This will effectively be like sending viruses out to our devices inside the labs simulator! Let’s do what we always do….dive right in!

Posted on 6:59 am