Announcing our Microsoft 365 Newsletter
This newsletter is a curated blog roll of the 8 most important topics published by Microsoft in the previous week.
This newsletter is a curated blog roll of the 8 most important topics published by Microsoft in the previous week.
In today's meeting, a person I met with was sent a meeting recap from "me". Otter had joined a meeting that I was invited to and then emailed them that person a recap of our meeting. I was very disturbed by this event
You will have now prevented misleadingly named apps, potentially malicious apps, apps with misleading publisher names, apps performing unusual amounts of file downloads, the addition of credentials to OAuth, and apps with a strange ISP for an OAuth.
This has led me to develop very minimal skills when it comes to making a fancy pretty Excel sheet that I wouldn't be embarrassed to show to others. So, my goal is going to be to make my Excel sheet more functional and more pretty.
For this comparison I'm going to ask each to improve an email I wrote with my own brain.
In this session, I reviewed the very most important parts to start with when setting up your XDR. That doesn't mean, skip the rest. It means start here and then go back through and configure everything.
It was my pleasure to introduce peer groups to Third Tier. In 2024, we're introducing focused learning groups for Defender, Intune, Public speaking and more
Criminals of the world would love to know that they don't have to deal with MFA if they phish you while you're in the office. Now we've taken that option away
Despite criminal masterminds and "security researchers" always coming up with the next greatest tool for causing financial damage to our businesses and economy, there are patterns.
Defense implies a reactionary approach. Prevention set the scene where ransomware can't get you in the first place.
Fortunately, Defender protects against this when configured correctly. In addition to the Defender for Endpoint sensor installation, Attack Surface Reduction rules and certain anti-virus configurations should also be deployed
Once these two items have been set the ability of PlugX to take advantage of innocent people should be thwarted.