Quantcast
Channel: Azure
Browsing all 23 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Azure advanced threat protection deployment

In this blog post, I will be talking about Azure advanced threat protection deployment, and walk you through my experience doing large implementation in an environment with virtual domain controllers...

View Article



Image may be NSFW.
Clik here to view.

Azure advanced threat protection Azure ATP vs ATA

In this blog post, I will be talking about the differences between Azure ATP vs ATA. You can also read about Azure advanced threat protection deployment, Azure ATP and Windows Defender ATP integration,...

View Article

Image may be NSFW.
Clik here to view.

Azure ATP and Windows defender ATP integration

This blog post talks about Azure ATP and Windows defender ATP integration, and how powerful this can be during suspicious activity investigation. you can also read about Azure advanced threat...

View Article

Image may be NSFW.
Clik here to view.

Azure advanced threat protection lateral movement

In this blog post, I will be talking about Azure advanced threat protection lateral movement capability, and how this can extremely help you get a unique perspective on how attackers can move across...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Cloud App Security – CASB

This blog post is about Microsoft Cloud App Security CASB, and how does it fit in the overall set of Microsoft security products. Introduction There is always a trade-off between moving to the cloud...

View Article


Image may be NSFW.
Clik here to view.

Azure Active Directory Conditional Access

This blog post, I am sharing my thoughts and understanding of identity driven security and Azure Active Directory Conditional Access besides some tricks I learned when working with Azure AD. Life...

View Article

Image may be NSFW.
Clik here to view.

Secure Modern Workplace with Microsoft 365 Advanced Threat Protection

Secure Modern Workplace with Microsoft 365 Advanced Threat Protection I decided to write a blog post about Microsoft 365 Advanced Threat Protection and how to think of security when planning how to...

View Article

Image may be NSFW.
Clik here to view.

My Pluralsight Course: Microsoft Azure PIM

Microsoft Azure PIM – Course Overview Cybercriminals are relentless when it comes to finding and compromising their targets’ privileged credentials to gain unfettered access to critical assets. In this...

View Article


Image may be NSFW.
Clik here to view.

My Pluralsight Course – Managing Azure Security Alerts

Alerts proactively notify you when security incidents happen in your environment. In this course, you’ll learn how to respond to security incidents in Azure by creating and managing Azure security...

View Article


Image may be NSFW.
Clik here to view.

My Pluralsight Course – Incident Response and Remediation With Azure Security...

Incident Response and Remediation with Azure Security Center This blog post is about my Pluralsight course talking about Incident Response and Remediation with Azure Security Center. While moving to...

View Article

Image may be NSFW.
Clik here to view.

Cloud Reference Architecture CRA P1 – Foundation

Introduction In this blog post series, I will introduce you to the concept of the cloud reference architecture (CRA) as defined in ISO/IEC 17789 standard, and why you should consider having one. The...

View Article

Image may be NSFW.
Clik here to view.

CRA Cloud Financial Governance

This is part two of the Cloud Reference Architecture (CRA) blog series and here I am going to guide you on how to achieve cloud financial governance in the cloud. [Check out part 1 – Cloud Reference...

View Article

Image may be NSFW.
Clik here to view.

Cloud Reference Architecture CRA P3 – Enterprise Structure

This is part three of the Cloud Reference Architecture (CRA) blog series and here I am going to guide you on how to establish an enterprise structure in the cloud. Check out part 1 – Cloud Reference...

View Article


Image may be NSFW.
Clik here to view.

Cloud Reference Architecture – Virtual Data Center (VDC)

This is part four of the Cloud Reference Architecture (CRA) blog series and here I am going to explain to you the concept of Virtual Data Center in Azure and any other cloud. Check out part 1 – Cloud...

View Article

Image may be NSFW.
Clik here to view.

P1: Microsoft Defender for Endpoint – Architecture

This is not like any other blog you’ve read online. It is a comprehensive blog series that was written carefully with my personal analysis and trail/error kind of experience. You will get deep...

View Article


Image may be NSFW.
Clik here to view.

P2: MS Defender for Security Strategy & Role of AI

In this part of the blog series, and before we dive into the mechanics of the product, I want you to pause for a second, step back and think of the big picture. Never try to implement security...

View Article

Image may be NSFW.
Clik here to view.

P3: MS Defender for Endpoint – Threat and Vulnerability Management (TVM)

In the blog post you get introduced to the threat and vulnerability management capabilities in Microsoft Defender for Endpoint and how it helps you increase your security posture and remediate risks...

View Article


Image may be NSFW.
Clik here to view.

P4: MS Defender for Endpoint – Attack Surface Reduction ASR

Attack Surface Reduction or ASR for short is all about prevention and endpoint hardening. Two things I want you to understand first: Attack Surface Reduction or ASR is a Windows 10 feature. Microsoft...

View Article

Image may be NSFW.
Clik here to view.

P5: Microsoft Defender Antivirus Internal Mechanics

In this blog post, I am going to talk about one of the main components of the Microsoft Defender for Endpoint (Check the Intro Blog Post Here), which is the Microsoft Defender Antivirus, also known as...

View Article

Image may be NSFW.
Clik here to view.

P6: Microsoft Defender Endpoint Detection & Response (EDR)

Let’s link this blog post with the previous one (Next Generation Protection with Microsoft Defender Antivirus). There is sometimes a thin line between the two capabilities, and I want to start by...

View Article
Browsing all 23 articles
Browse latest View live




Latest Images