Select Page
q1.png

Microsoft Defender for Endpoint Commonly Used Queries and Examples

Hello IT Pros, I have collected the Microsoft Defender for Endpoint (Microsoft Defender ATP) advanced hunting queries from my demo, Microsoft Demo and Github for your convenient reference. As we knew, you or your InfoSec Team may need to run ... continue reading
Setting up Microsoft Defender for Endpoint in MEM

Microsoft Endpoint Manager: Enable Endpoint Protection

Introduction This is John Barbare and I am a Sr. Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In this tutorial I will walk you through the steps of configuring and enabling Microsoft Defender for Endpoint ... continue reading
tantran55_1-1596459568602.png

Microsoft Defender for Endpoint – MD ATP Daily Operation – Part 1

Hi IT Pros, I have combined the information for Security Team who monitors, responds and manages the ATP Portal on a daily basis. Please check it out and give your feedback. For Alert Notification and Live Response with remediation and ... continue reading
ezgif.com-gif-maker.gif

Microsoft Defender for Endpoint – MD ATP Daily Operation – Part 2

NOTE: As of late September, the Microsoft Defender ATP product line has been renamed to Microsoft Defender for Endpoint! Dear IT Pros, I would like to continue on Part 2 of the Windows Defender ATP Operation with tasks handled by ... continue reading
MDfIst.gif

Microsoft Defender for Identity – Azure ATP Deployment and Troubleshooting

Hi IT Pros, Recently, I searched the internet and could not find the document for Microsoft Defender for Identity (Azure ATP) Setup and Troubleshooting. So, I prepared this document for our convenient reference and deployment in the future. Please check ... continue reading
MDfI3.gif

Microsoft Defender for Identity – Azure ATP Daily Operation

Hi IT Pros, I would like to continue the blog about Microsoft Defender for Identity with topic related to the daily operation of SecOp Team who traces all attacks against Identities stored in your on-prem Active Directory domain controllers. Please ... continue reading
q1.png

Microsoft Endpoint Protection (MD ATP) Commonly Used Queries and Examples

Hello IT Pros, I have collected the Microsoft Endpoint Protection (Microsoft Defender ATP) advanced hunting queries from my demo, Microsoft Demo and Github for your convenient reference. As we knew, you or your InfoSec Team may need to run a ... continue reading
Screenshot of mobile ransom note in Russian language

Sophisticated new Android malware marks the latest evolution of mobile ransomware

Attackers are persistent and motivated to continuously evolve – and no platform is immune. That is why Microsoft has been working to extend its industry-leading endpoint protection capabilities beyond Windows. The addition of mobile threat defense into these capabilities means ... continue reading
™

Why integrated phishing-attack training is reshaping cybersecurity—Microsoft Security

Phishing is still one of the most significant risk vectors facing enterprises today. Innovative email security technology like Microsoft Defender for Office 365 stops a majority of phishing attacks before they hit user inboxes, but no technology in the world ... continue reading
p1.png

The Case of a Compromised Exchange Online User

  Hi Everyone,   Zoheb here again with my colleague Simon Woolley from the beautiful city of Dubai and today we will be sharing some details on how we helped one of our SMC customer find a compromised user and ... continue reading