Category: Defender
- Exploring Microsoft Azure’s Security Technical Capabilities (02/04/2025)
- Multi-tenant management in Microsoft Defender (03/05/2024)
- Defender for Office 365 and QR-code phishing (10/04/2024)
- Unify SIEM and XDR for Enhanced Threat Detection (04/04/2024)
- In-browser protection with Microsoft Edge for Business (Preview) (22/03/2024)
- Section 6 - Implement DLP - Implement and monitor Endpoint DLP (19/11/2023)
- Section 5 - Implement DLP - Create and configure DLP policies (29/10/2023)
- Section 13 - Mitigate threats using Microsoft Sentinel - Configure Security Orchestration, Automation, and Response (SOAR) (11/06/2023)
- Section 10 - Mitigate threats using Microsoft Sentinel - Plan and implement the use of data connectors for ingestion of data sources (07/05/2023)
- Section 9 - Mitigate threats using Microsoft Sentinel - Design and configure a Microsoft Sentinel workspace (30/04/2023)
- Section 8.2 - Mitigate threats using Microsoft Defender for Cloud - Configure and respond to alerts and incidents in Microsoft Defender for Cloud (23/04/2023)
- Section 8.1 - Mitigate threats using Microsoft Defender for Cloud - Configure and respond to alerts and incidents in Microsoft Defender for Cloud (16/04/2023)
- Section 7 - Mitigate threats using Microsoft Defender for Cloud - Plan and implement the use of data connectors for ingestion of data sources in Microsoft Defender for Cloud (09/04/2023)
- Azure (AD) recommendations with some explanations (08/04/2023)
- Azure Arc with Defender for cloud (07/04/2023)
- Section 6 - Mitigate threats using Microsoft Defender for Cloud - Implement and maintain cloud security posture management and workload protection (02/04/2023)
- Section 5 - Mitigate threats using Microsoft 365 Defender - Manage extended detection and response (XDR) in Microsoft 365 Defender (26/03/2023)
- Section 4 - Mitigate identity threats part 2 of 2 (05/03/2023)
- Section 3 - Mitigate endpoint threats by using Microsoft Defender for Endpoint (19/02/2023)
- Section 1 - Mitigate threats using Microsoft 365 Defender - Mitigate threats to the productivity environment by using Microsoft 365 Defender (05/02/2023)
- Microsoft 365 Defender role-based access control (29/01/2023)
- Azure AD Access reviews and the power of Machine learning (11/12/2022)
- SQL Server 2022 and Azure ARC with Azure subscription model (28/11/2022)
- Do's and don'ts concerning security for Identity part 7 (20/11/2022)
- Microsoft Defender for Office 365 Detection Details Report (14/11/2022)
- Do's and don'ts concerning security for Identity part 2 (15/10/2022)
- Defender for Cloud security alerts (30/09/2022)
- Microsoft Defender SmartScreen in Windows 11 22H2 (27/09/2022)
- Microsoft Defender External Attack Surface Management (Defender EASM) (12/09/2022)
- Section 6 - Design security for infrastructure - Design a strategy for securing SaaS, PaaS, and IaaS services (31/08/2022)
- Microsoft Defender for Cloud Apps in Microsoft 365 Defender (Preview) (08/08/2022)
- Section 14 - Secure data and applications - Configure security for databases (22/05/2022)
- Section 13 - Secure data and applications - Configure security for storage (15/05/2022)
- Section 10 - Manage security operations - Configure and manage threat protection (04/05/2022)
- 2022 H1 Cumulative Updates for Exchange Server (21/04/2022)
- Azure storage accounts and how to secure them? (10/01/2022)
- Insider risk management, what, why and how (13/12/2021)
- Defender for Identity deep dive part 1 of 3 (29/09/2021)
- Azure MFA Extensions and Network Policy Server (27/09/2021)
- Autodiscover redirect leakage (23/09/2021)
- How integrate Azure defender with Azure ARC to multiple environments (23/09/2021)
- Office 365 ORCA and Configuration analyzer (20/09/2021)
- Identity protection in the cloud and of the cloud part2 (13/09/2021)
- ChaosDB vulnerability and Azure Blob storage. (29/08/2021)