Azure advanced threat protection deployment
In this blog post, I will be talking about Azure advanced threat protection deployment, and walk you through my experience doing large implementation in an environment with virtual domain controllers...
View ArticleAzure advanced threat protection Azure ATP vs ATA
In this blog post, I will be talking about the differences between Azure ATP vs ATA. You can also read about Azure advanced threat protection deployment, Azure ATP and Windows Defender ATP integration,...
View ArticleAzure ATP and Windows defender ATP integration
This blog post talks about Azure ATP and Windows defender ATP integration, and how powerful this can be during suspicious activity investigation. you can also read about Azure advanced threat...
View ArticleAzure advanced threat protection lateral movement
In this blog post, I will be talking about Azure advanced threat protection lateral movement capability, and how this can extremely help you get a unique perspective on how attackers can move across...
View ArticleMicrosoft Cloud App Security – CASB
This blog post is about Microsoft Cloud App Security CASB, and how does it fit in the overall set of Microsoft security products. Introduction There is always a trade-off between moving to the cloud...
View ArticleAzure Active Directory Conditional Access
This blog post, I am sharing my thoughts and understanding of identity driven security and Azure Active Directory Conditional Access besides some tricks I learned when working with Azure AD. Life...
View ArticleSecure Modern Workplace with Microsoft 365 Advanced Threat Protection
Secure Modern Workplace with Microsoft 365 Advanced Threat Protection I decided to write a blog post about Microsoft 365 Advanced Threat Protection and how to think of security when planning how to...
View ArticleMy Pluralsight Course: Microsoft Azure PIM
Microsoft Azure PIM – Course Overview Cybercriminals are relentless when it comes to finding and compromising their targets’ privileged credentials to gain unfettered access to critical assets. In this...
View ArticleMy Pluralsight Course – Managing Azure Security Alerts
Alerts proactively notify you when security incidents happen in your environment. In this course, you’ll learn how to respond to security incidents in Azure by creating and managing Azure security...
View ArticleMy Pluralsight Course – Incident Response and Remediation With Azure Security...
Incident Response and Remediation with Azure Security Center This blog post is about my Pluralsight course talking about Incident Response and Remediation with Azure Security Center. While moving to...
View ArticleCloud Reference Architecture CRA P1 – Foundation
Introduction In this blog post series, I will introduce you to the concept of the cloud reference architecture (CRA) as defined in ISO/IEC 17789 standard, and why you should consider having one. The...
View ArticleCRA Cloud Financial Governance
This is part two of the Cloud Reference Architecture (CRA) blog series and here I am going to guide you on how to achieve cloud financial governance in the cloud. [Check out part 1 – Cloud Reference...
View ArticleCloud Reference Architecture CRA P3 – Enterprise Structure
This is part three of the Cloud Reference Architecture (CRA) blog series and here I am going to guide you on how to establish an enterprise structure in the cloud. Check out part 1 – Cloud Reference...
View ArticleCloud Reference Architecture – Virtual Data Center (VDC)
This is part four of the Cloud Reference Architecture (CRA) blog series and here I am going to explain to you the concept of Virtual Data Center in Azure and any other cloud. Check out part 1 – Cloud...
View ArticleP1: Microsoft Defender for Endpoint – Architecture
This is not like any other blog you’ve read online. It is a comprehensive blog series that was written carefully with my personal analysis and trail/error kind of experience. You will get deep...
View ArticleP2: MS Defender for Security Strategy & Role of AI
In this part of the blog series, and before we dive into the mechanics of the product, I want you to pause for a second, step back and think of the big picture. Never try to implement security...
View ArticleP3: MS Defender for Endpoint – Threat and Vulnerability Management (TVM)
In the blog post you get introduced to the threat and vulnerability management capabilities in Microsoft Defender for Endpoint and how it helps you increase your security posture and remediate risks...
View ArticleP4: MS Defender for Endpoint – Attack Surface Reduction ASR
Attack Surface Reduction or ASR for short is all about prevention and endpoint hardening. Two things I want you to understand first: Attack Surface Reduction or ASR is a Windows 10 feature. Microsoft...
View ArticleP5: Microsoft Defender Antivirus Internal Mechanics
In this blog post, I am going to talk about one of the main components of the Microsoft Defender for Endpoint (Check the Intro Blog Post Here), which is the Microsoft Defender Antivirus, also known as...
View ArticleP6: Microsoft Defender Endpoint Detection & Response (EDR)
Let’s link this blog post with the previous one (Next Generation Protection with Microsoft Defender Antivirus). There is sometimes a thin line between the two capabilities, and I want to start by...
View Article
More Pages to Explore .....