Defender for Endpoint on Linux onboarding and behavior monitoring detection
Microsoft Defender for Endpoint supports more platforms. Since 2020 Defender for Endpoint is available for Linux systems. Recently Microsoft announced the behavior monitoring preview feature for Linux. This blog is about all the parts of Defender for Endpoint on Linux systems, focussed on…
Azure AD Identity Protection: User Risk and Sign-in Risk protection with automation
Azure AD Identity Protection is one of the security tools available in the Microsoft E5 license. With Azure AD Identity Protection it is possible to protect users based on the Microsoft signals. Azure AD Identity protection is all about risk, detection, and remediation…
Block Legacy Authentication now, and don’t wait for Microsoft
Legacy authentication is the most compromising sign-in. Microsoft is going to disable basic/ legacy authentication. It is recommended to implement Legacy Authentication as soon as possible and switch users to the latest modern authentication protocol. In this blog post, we take a look…
Detect critical 0-day exploits with Defender for Endpoint
Microsoft has detected multiple 0-days exploits being used to attack on-premises versions of Microsoft Exchange Servers. Microsoft releases today multiple patches. It is highly recommended to patch direct. Microsoft shared all the information about the HAFNIUM group and detected 0-day exploits. If you…
Go fully passwordless with the new Azure AD Temporary Access Pass feature
The new Azure AD Temporary Access Pass preview feature is available in the tenant. With the new preview feature, it is possible to configure a temporary Access Password. The main goal to go to full passwordless without any configured password in the tenant. …
Enable automatic Access Reviews for Guest users in Teams and Microsoft 365 Groups
Azure AD access reviews feature is now in public preview for the Teams and Microsoft 365 Groups. In this blog post an overview of the new public preview feature. With the Access Reviews for guest functionality, it is possible to check-up automatic guest…
Use Microsoft technology for the detection and prevention of the SolarWinds chain attack
SolarWinds has revealed how monitoring products it released earlier this year may have been tampered with in a supply chain attack. In this blog post an overview of detection methods and IOC available for the detection and prevention of the SolarWinds attack. In…
Deploy and configure Microsoft Defender for Endpoint on iOS devices
Microsoft Defender for Endpoint is now generally available for iOS devices. Microsoft Defender now works on multiple platforms; macOS, Linux, Android, and now iOS. With the Defender for Endpoint enrollment for iOS devices you will get multiple security features; like anti-phishing, custom indicators…
Endpoint Data Loss Prevention (DLP): Protect cloud uploads and printing
Managing the risks around data has become increasingly complex for organizations. At the current stage more and more employees are working from home. With the latest Microsoft feature named Data Loss Prevention (DLP) it is possible to prevent data loss across Microsoft 365…
Fast response with Azure AD Continuous Access Evaluation (CAE) and Conditional Access
Continuous Access Evaluation (CAE) for AzureAD is one of the latest functions and available in public preview. With this new technique, it is possible to respond much faster in comparison with the default token refresh. In the old situation a user accesses an…