0
Belgian Malinois IT Security Dog

Microsoft Sentinel Governance Deep-Dive Part 2

This week continues our look at an ongoing set of Governance tasks that we can do to keep our Sentinel instances working smoothly and helping our SOC team stay focused on handling Incidents and threat hunting. Today we continue our detailed look at not only what to review, but walking through the steps together. In today’s article we will review even more deep-dive details on how to optimize and maintain your Sentinel instances in a meaningful and optimized fashion. This week, we talk data management, automations, and RBAC.

Posted on 7:10 am
0
Malinois IT Security Ninja

Microsoft Sentinel Governance Deep-Dive

This week we continue our mini-series looking at Sentinel Governance tasks that we can do to keep our favourite SIEM/SOAR solution working smoothly to detect attacks and providing visibility into threats to our environments. Sentinel is like having a superhero team that protects your enterprise from cyber threats! 🦸‍♂️🦸‍♀️

Posted on 6:55 am
0
Malinois IT Security Ninja

Microsoft Sentinel Governance Overview

This week I take a brief look at some ongoing Governance tasks that we can do to keep our Sentinel instances working smoothly and helping our SOC team have a better day. Making a living finding needles in a haystack can be hard, let’s look at some best practices for governance to help our SOC team focus on finding those little clues!

Posted on 7:33 am
0

Fortifying Your Cyber Defenses: Preventing Unmanaged Device Compromises

In the evolving landscape of cyber threats, ransomware operators are increasingly targeting unmanaged devices. These devices, including personal devices used for work-related tasks, often lack the robust security measures found in managed systems. Understanding these evolving threats and taking proactive steps to protect your organization is paramount. Today, our article delves into the challenges posed by unmanaged device compromises and offers comprehensive, actionable measures to bolster your defenses.

Posted on 7:23 am
0
Malinois IT Security Ninja

Strengthening Cyber Defenses Against Modern Threats

In today’s digital age, cyber threats have evolved into sophisticated attacks that exploit vulnerabilities on an unprecedented scale. It’s crucial to understand these threats and take proactive steps to protect your organization. In this article, we explore the evolving landscape of cybercrime and provide actionable measures to safeguard your digital assets. Today, we continue our journey through Microsoft’s Digital Defense Report 2023 and look at some actionable steps that can be taken to improve your organization’s security posture.

Posted on 8:18 am
0

Strengthening Cybersecurity: The Power of Collective Defense

Cybersecurity stands as one of the paramount challenges facing organizations worldwide. The relentless evolution of cyber threats demands constant vigilance and adaptation. Microsoft, with its unique vantage point in the field, offers valuable insights into this ever-changing landscape to us through their Digital Defense Report. Today, I walk through some top highlights from that report and some of the hidden gems focusing a bit on collective defense as our theme.

Posted on 7:16 am
0
AzureTracks - Architecture example with Visio Icon pack.

Azure and Microsoft 365 Visio Icons

A challenge that many organizations have is documentation – accurate and professional looking diagrams. Today, let’s take a very quick look at where to get Microsoft Azure and M365 icon packs to help the journey along.

Posted on 7:30 am