If a piece of software is End of Life (EoL), should you upgrade immediately? Is it an instant Cyber Security or a Business issue? To understand the challenges/issue, conduct a…
Microsoft SC-200 Security Operations Analyst – Study Notes
Defender for Identity entity tags in Microsoft 365 Defender https://docs.microsoft.com/en-us/defender-for-identity/manage-sensitive-honeytoken-accounts Using role-based access control (RBAC) https://docs.microsoft.com/en-us/learn/modules/deploy-microsoft-defender-for-endpoints-environment/4-manage-access Manage portal access using role-based access control https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/rbac?view=o365-worldwide Safe Attachments policies in Microsoft Defender…
Import Reg Key To Remote Computer
Challenge : Import reg key settings to a remote compute Requires WinRM to be running Execute as Administrator **This script worked when tested on a Window 2021 server to a…