Phishing-resistant MFA basicsThis blog explains the basics of phishing-resistant MFA (Multi Factor Authentication) and the single- and/or multi-tenant support options…Jul 24Jul 24
Microsoft IT/OT convergence in Defender XDR (New) and SentinelDisclaimer there is no change for existing Microsoft Defender for IoT (Azure) deployments.Jul 16Jul 16
Defender for IoT sensor accessThe Microsoft Defender for IoT | OT Sensor is a virtual or physical appliance connected to the OT network via a SPAN port or TAP device to…May 3May 3
Microsoft Security Exposure Management #XSPMMicrosoft Security Exposure Management is a new Microsoft Security product in the Threat prevention layer of cybersecurity to provide…Mar 13Mar 13
Entra ID User Reconnaissance and how to Protect against Entra ID User ReconEntra ID (previous Azure Active Directory / Azure AD) is the Online version of Active Directory to access (authenticate and authorize)…Feb 17Feb 17
Active Directory reconnaissance and Microsoft Defender XDR detectionsUpdated blog (from 2020) which describes different Active Directory reconnaissance methods (MS-DOS, PowerShell and PowerSploit) to read the…Feb 14Feb 14
MDE | DeceptionDeception is a new feature in Microsoft Defender for Endpoint. This blog provides a high level overview of the new feature. Deception…Nov 16, 20231Nov 16, 20231
How to setup your own Microsoft Defender for IoT labThis blog is how to setup a physical lab environment for Microsoft Defender for IoT to get experience in deployment and usage of the…Nov 2, 2023Nov 2, 2023
How to use Microsoft Entra | Internet Access to prevent AiTM attack(s)While BEC (Business E-mail Compromise) attacks are prevented by Number Matching Multi Factor Authentication (enabled on global scale by…Aug 1, 2023Aug 1, 2023
How to protect against BEC & AiTM attacks via Microsoft 365 Defender | Automatic Attack DisruptionThe number of BEC (Business Email Compromise) and AiTM (Adversary in The Middle) attacks are growing significantly since 2023 (source…Jul 3, 20233Jul 3, 20233