With the end of support for Azure MFA server on-premises coming soon, it’s time to start planning the move to Azure cloud-based MFA. Let’s look at the steps to starting our migration to Azure AD MFA.
A common challenge that security teams face is simply not knowing where all the artifacts can be found during an investigation. Let’s explore the different portals where we can quickly explore our data and perform investigations…
A common challenge that security teams face is simply not knowing where all the artifacts can be found during an investigation. Microsoft Defender tools are capable of collecting a lot of data, and that can create questions during investigations of where is all this data and how do I find it quickly? Join me for a tour of the basics of Defender data retention periods and where to find that data.
When building out a SOC team, many organizations quickly realize that there are very few silos left in IT when it comes to cloud. Our SOC members need to have cloud platform skills, M365, Exchange, Active Directory, Azure Active Directory, Windows Server, REHL, and so many more skills. To say this a different way; our cloud landscape is flat, and we need members that have a wide band of skills with some specialties mixed in. This is complex to say the least, and with labour challenges in our post-covid world, we need ways to upskill our teams and build out operations manuals and tasks to support those teams.
A special out of band update edition to cover the great updates released May 27, 2022 at the conclusion of Microsoft Build. Check out all the developer centric, Azure infrastructure, and Azure service updates in this special update!
Log Analytics workspaces provide a special way to store log data from multiple sources such as Microsoft Defender for Cloud, Azure Monitor, and so much more. A workspace typically combines data from multiple services and likely has it’s own distinct configuration for retention. I get a lot of questions about what the differences between workspaces within the Log Analytics scope are and why we would use them. Let’s take a look today at some of the information around Microsoft Azure Log Analytics Workspaces.
Log4J is a widely used Java library for logging error messages in applications. It is used in enterprise software applications, both custom and packaged, and forms part of many cloud computing platforms and services. I’ve summarized the threat and mitigation suggestions as well as a number of external resources that may save you some time in putting together your security change requests.
n this third article in our mini-series on setting up a Microsoft Defender for Endpoint labs environment we will be getting things running this week by adding devices and deploying simulations into the labs environment. This will effectively be like sending viruses out to our devices inside the labs simulator! Let’s do what we always do….dive right in!
In this second article in our mini-series on setting up a Microsoft Defender for Endpoint labs environment we will be getting things running this week with some exciting features, functions, and looking at what we can accomplish all for free! Let’s dive right in and start with where we left off — creating the labs environment…
Completing a comprehensive and independent evaluation of any security product can be complicated and take more time than we really have to spare. Microsoft has provided the ability for all businesses to evaluate Defender for Endpoint on their own through labs and trail licenses! I’ll present some options….