Select Page
™

Improve your threat detection and response with Microsoft and Wortell

This blog post is part of the Microsoft Intelligent Security Association (MISA) guest blog series. Learn more about MISA. The way of working is changing rapidly. Many workloads are moving to the cloud and the pandemic accelerated organizations to provide infrastructure to aid ... continue reading
Video Tutorial: Endpoint Protection Part 5 – Windows Defender Advanced Threat Protection Policies

Video Tutorial: Endpoint Protection Part 5 – Windows Defender Advanced Threat Protection Policies

Hello everyone, here is part 5 of a series focusing on Endpoint Protection integration with Configuration Manager. This series is recorded by Steve Rachui, a Microsoft principal premier field engineer. This tutorial focuses on how Configuration Manager can be used ... continue reading
Video Tutorial: Endpoint Protection Part 4 – Firewall Policies

Video Tutorial: Endpoint Protection Part 4 – Firewall Policies

Hello everyone, here is part 4 of a series focusing on Endpoint Protection integration with Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. This tutorial focuses on how Configuration Manager can be used ... continue reading
World map showing global distribution of Phorpiex botnet ativity

Phorpiex morphs: How a longstanding botnet persists and thrives in the current threat environment

Phorpiex, an enduring botnet known for extortion campaigns and for using old-fashioned worms that spread via removable USB drives and instant messaging apps, began diversifying its infrastructure in recent years to become more resilient and to deliver more dangerous payloads ... continue reading

Mitigate OT security threats with these best practices

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with Chris Sistrunk, Technical ... continue reading
Video Tutorial: Endpoint Protection Part 2 – Antimalware Policies

Video Tutorial: Endpoint Protection Part 2 – Antimalware Policies

Hello everyone, here is part 2 of a series focusing on Endpoint Protection integrations with Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. This session focuses on how Configuration Manager can be used ... continue reading
Video Tutorial: Endpoint Protection Part 1 - Introduction

Video Tutorial: Endpoint Protection Part 1 – Introduction

Hello everyone, we are starting a new video tutorial series focusing on Endpoint Protection integration with Configuration Manager. This series is recorded by @Steve Rachui, a Microsoft principal premier field engineer. The first session is an introduction and previews what ... continue reading
Business email compromise campaign targets wide range of orgs with gift card scam

Business email compromise campaign targets wide range of orgs with gift card scam

Cybercriminals continue to target businesses to trick recipients into approving payments, transferring funds, or, in this case, purchasing gift cards. This kind of email attack is called business email compromise (BEC)—a damaging form of phishing designed to gain access to ... continue reading
WDCFA.gif

Windows 10 Controlled Folder Access Event Search

Dear IT Pros, Ransomware acts with accessing to the files, folders and encrypting them, to respond against it, we need to enable the Windows Defender feature named “Controlled Folder Access” – WDCFA and monitor the Windows Defender Guard Events in ... continue reading
The shared responsibility model for cloud security. As cloud service provider takes responsibility for controls, the cloud customer can use their resources to focus on the controls for which they remain responsible.

Meet critical infrastructure security compliance requirements with Microsoft 365

Critical infrastructure operators face a hostile cyber threat environment and a complex compliance landscape. Every operator of an industrial control system also operates an IT network to service its productivity needs. A supervisory control and data acquisition (SCADA) system operator ... continue reading