Defender XDR + Intune Continuing Education
Experience continuous learning with our monthly newsletter and teaching webinar on Defender XDR + Intune. Enhance your knowledge and stay up-to-date!
Experience continuous learning with our monthly newsletter and teaching webinar on Defender XDR + Intune. Enhance your knowledge and stay up-to-date!
Recently a new trend has emerged where criminals are attempting to hide their activity behind a barrage of spam email to the compromised mailbox or to any popular mailbox in the domain.
Attack Surface Reduction (ASR) rules have expanded to include a full range of zero-day protections. If you aren't using them today or haven't tried to use them recently, then it's time to look again. If you aren't locking down Windows natively then you're missing out on critical security features.
The real purpose of Troubleshooting Mode, then is for you to document changes that you need to make to the organizational policy for Defender for the affect machines.
Students in the Defender XDR course were advised not to alter threat actions in their anti-virus policy, leaving them as Not configured. This allows Defender to use its default behaviors, local device settings, signature-defined actions, and automatic remediation. Relying on Microsoft's security expertise ensures optimal threat management.
Defender for Office has a new way of making it easy for you to deploy policies. Instead of […]
Even though quarantine management has been assigned outside of IT you should still monitor when an email has been released from quarantine because phishing is the #1 method that criminals use to gain a foothold in your network.
It is determined that a user outside of normal IT operations should be given the ability to manage the email quarantine for the company.
Oh, my AI, what can be done? There’s lot of FUD (fear, uncertainty, and doubt) being spewed from […]
This is as much for me as it is for you, because I’m constantly forgetting where this is […]
This newsletter is a curated blog roll of the 8 most important topics published by Microsoft in the previous week.
You will have now prevented misleadingly named apps, potentially malicious apps, apps with misleading publisher names, apps performing unusual amounts of file downloads, the addition of credentials to OAuth, and apps with a strange ISP for an OAuth.