Webinar – How to protect, detect, and respond to identity-related attacks with Microsoft 365 Defender
As technology advances, old threats become a little less relevant and new threats emerge.
In this session, we’ll take a look at some identity-related threats inherent to the use of authentication to web applications etc. In the context of Azure AD/Office 365, we’ll walk you through a couple of scenarios and demos on how an attacker could leverage cookies and PRTs to gain access to your resources and how you, as a defender, can protect, detect, and respond to these types of events.
In every Microsoft 365/Azure environment there are multiple Service Principals. Service Principals can be used for your own custom-built apps, to deploy Azure resources through
In many regards, 2020 was a perilous year. In the wake of a global pandemic, the entire world had to change the way they live and work. This paradigm change not only presented a difficulty for people personally, also from an IT perspective – and more specifically cybersecurity – many new challenges arose from the shift to remote working.
Within our SOC, Cloud Control, we heavily rely on Azure Sentinel to monitor the environments of our customers. To easily manage multiple Azure Sentinel environments,
Tags in Microsoft Defender ATP is an extremely powerful tool to identify certain high value machines, group devices into machine groups, or for reporting through
Recently, I was asked whether a ransomware attack on Exchange Online is a real risk and, what an organization could do to protect itself against
One of our managing partners, Michael Van Horenbeeck, was recently interviewed by Nicolas Blank from the Cloud Architects podcast on the value of Microsoft Inspire.
On February 28, Microsoft announced the public preview of Azure Sentinel. Somewhat simplistically stated, you could see Sentinel as Microsoft’s version of a SIEM (in
Yesterday, Microsoft announced a new capability in Exchange Online which adds the ‘SessionID’-field to the existing audit logs in Exchange Online. Audit logs are a
Recently, I attended the Thrive Conference in Ljubljana, Slovenia. During the IT Pro “Ask the Experts”-panel, an interesting question was raised: “How do I protect
Five top experts in Microsoft solutions join forces in a new consulting consortium – The Collective – that will offer expert services and solutions to
Microsoft announced recently that they will release the ability for users to “opt-in” for new OWA, or Outlook on the Web, experiences themselves by switching a toggle that will be made available to them in the interface.
Last week, at Microsoft’s Tech Summit in Amsterdam, I gave a talk about running Exchange Hybrid connections over the long term. In that session, I talked about securing a hybrid deployment and – somewhat related – how to best and securely publish migration endpoints to the Internet.