Derk van der WoudePhishing-resistant MFA basicsThis blog explains the basics of phishing-resistant MFA (Multi Factor Authentication) and the single- and/or multi-tenant support options…Jul 24Jul 24
Derk van der WoudeMicrosoft IT/OT convergence in Defender XDR (New) and SentinelDisclaimer there is no change for existing Microsoft Defender for IoT (Azure) deployments.Jul 16Jul 16
Derk van der WoudeDefender for IoT sensor accessThe Microsoft Defender for IoT | OT Sensor is a virtual or physical appliance connected to the OT network via a SPAN port or TAP device to…May 3May 3
Derk van der WoudeMicrosoft Security Exposure Management #XSPMMicrosoft Security Exposure Management is a new Microsoft Security product in the Threat prevention layer of cybersecurity to provide…Mar 13Mar 13
Derk van der WoudeEntra ID User Reconnaissance and how to Protect against Entra ID User ReconEntra ID (previous Azure Active Directory / Azure AD) is the Online version of Active Directory to access (authenticate and authorize)…Feb 17Feb 17
Derk van der WoudeActive Directory reconnaissance and Microsoft Defender XDR detectionsUpdated blog (from 2020) which describes different Active Directory reconnaissance methods (MS-DOS, PowerShell and PowerSploit) to read the…Feb 14Feb 14
Derk van der WoudeMDE | DeceptionDeception is a new feature in Microsoft Defender for Endpoint. This blog provides a high level overview of the new feature. Deception…Nov 16, 20231Nov 16, 20231
Derk van der WoudeHow to setup your own Microsoft Defender for IoT labThis blog is how to setup a physical lab environment for Microsoft Defender for IoT to get experience in deployment and usage of the…Nov 2, 2023Nov 2, 2023
Derk van der WoudeHow to use Microsoft Entra | Internet Access to prevent AiTM attack(s)While BEC (Business E-mail Compromise) attacks are prevented by Number Matching Multi Factor Authentication (enabled on global scale by…Aug 1, 2023Aug 1, 2023
Derk van der WoudeHow to protect against BEC & AiTM attacks via Microsoft 365 Defender | Automatic Attack DisruptionThe number of BEC (Business Email Compromise) and AiTM (Adversary in The Middle) attacks are growing significantly since 2023 (source…Jul 3, 20233Jul 3, 20233