Select Page
ezgif.com-gif-maker.gif

Microsoft Defender for Endpoint – MD ATP Daily Operation – Part 2

NOTE: As of late September, the Microsoft Defender ATP product line has been renamed to Microsoft Defender for Endpoint! Dear IT Pros, I would like to continue on Part 2 of the Windows Defender ATP Operation with tasks handled by ... continue reading
MDfIst.gif

Microsoft Defender for Identity – Azure ATP Deployment and Troubleshooting

Hi IT Pros, Recently, I searched the internet and could not find the document for Microsoft Defender for Identity (Azure ATP) Setup and Troubleshooting. So, I prepared this document for our convenient reference and deployment in the future. Please check ... continue reading
MDfI3.gif

Microsoft Defender for Identity – Azure ATP Daily Operation

Hi IT Pros, I would like to continue the blog about Microsoft Defender for Identity with topic related to the daily operation of SecOp Team who traces all attacks against Identities stored in your on-prem Active Directory domain controllers. Please ... continue reading
q1.png

Microsoft Endpoint Protection (MD ATP) Commonly Used Queries and Examples

Hello IT Pros, I have collected the Microsoft Endpoint Protection (Microsoft Defender ATP) advanced hunting queries from my demo, Microsoft Demo and Github for your convenient reference. As we knew, you or your InfoSec Team may need to run a ... continue reading
Screenshot of mobile ransom note in Russian language

Sophisticated new Android malware marks the latest evolution of mobile ransomware

Attackers are persistent and motivated to continuously evolve – and no platform is immune. That is why Microsoft has been working to extend its industry-leading endpoint protection capabilities beyond Windows. The addition of mobile threat defense into these capabilities means ... continue reading
™

Why integrated phishing-attack training is reshaping cybersecurity—Microsoft Security

Phishing is still one of the most significant risk vectors facing enterprises today. Innovative email security technology like Microsoft Defender for Office 365 stops a majority of phishing attacks before they hit user inboxes, but no technology in the world ... continue reading
p1.png

The Case of a Compromised Exchange Online User

  Hi Everyone,   Zoheb here again with my colleague Simon Woolley from the beautiful city of Dubai and today we will be sharing some details on how we helped one of our SMC customer find a compromised user and ... continue reading
ezgif.com-gif-maker.gif

Microsoft Defender ATP Daily Operation – Part 2

    NOTE: As of late September, the Microsoft Defender ATP product line has been renamed to Microsoft Defender for Endpoint!      Dear IT Pros,     I would like to continue on Part 2 of the Windows Defender ATP Operation ... continue reading
An image of the workflows and visualizations to manage cases.

Microsoft Advanced Compliance Solutions in Zero Trust Architecture

Zero Trust revolves around three key principles:  verify explicitly, use least privileged access, and assume breach.  Microsoft’s Advanced Compliance Solutions are an important part of Zero Trust. This post applies a Zero Trust lens to protecting an organization’s sensitive data ... continue reading
An image of a GADOLINIUM controlled Microsoft TechNet profile established in 2016.

Microsoft Security—detecting empires in the cloud

Microsoft consistently tracks the most advanced threat actors and evolving attack techniques. We use these findings to harden our products and platform and share them with the security community to help defenders everywhere better protect the planet. Recently, the Microsoft ... continue reading