Recent Posts
Automatic attack disruption in Microsoft Defender XDR and containing users during Human-operated Attacks
February 20, 2024
16 min
read
Pivot via OAuth applications across tenants and how to protect/detect with Microsoft technology? (Midnight blizzard)
January 31, 2024
12 min
read
Protect against QR Code phishing with Microsoft Defender products
January 25, 2024
7 min
read
How to use deception in Microsoft Defender for Endpoint/ Defender XDR
January 16, 2024
8 min
read
How to protect Microsoft Teams with Microsoft 365 Defender
January 10, 2024
7 min
read
Common mistakes during Microsoft Defender for Endpoint deployments
September 14, 2023
24 min
read
How to use Automatic Attack Disruption in Microsoft 365 Defender (BEC, AiTM & HumOR)
August 29, 2023
13 min
read
Home
Security
Products
Azure AD
Azure Arc
Azure AD Identity Protection
Azure Defender
Defender for Endpoint
Defender for Endpoint – Linux
Defender for Endpoint – iOS
Defender for Cloud
Defender for Cloud Apps
Defender EASM
Defender for Identity
Defender for IoT
Defender for Office
Defender TI
Microsoft 365 Compliance
Microsoft 365 Defender
Microsoft Sentinel
Intune
Blog Series
MDE series
Contact
Content Request
Donate
Donate
Page could not be found. Try the search bar
Home
>
Error 404
404
Page not found
OOPS! Page you're looking for doesn't exist. Please use search for help, or go to home page
Post Slider
Automatic attack disruption in Microsoft Defender XDR and containing users during Human-operated Attacks
0
Pivot via OAuth applications across tenants and how to protect/detect with Microsoft technology? (Midnight blizzard)
0
Protect against QR Code phishing with Microsoft Defender products
1
How to use deception in Microsoft Defender for Endpoint/ Defender XDR
4
How to protect Microsoft Teams with Microsoft 365 Defender
0
Common mistakes during Microsoft Defender for Endpoint deployments
2
Login
Register
Username or Email Address
Password
Forgot Password
Remember Me
Registration is closed.