In an era dominated by technological advancements, the rise of cyber threats poses a substantial risk to businesses and individuals alike. One such threat is EvilGinx, a sophisticated man-in-the-middle software…
Mastering Microsoft’s SC-400 Exam: Your Ultimate Guide
If you're looking to prove your expertise in securing and protecting Microsoft 365 workloads, passing the SC-400 exam is your key to success. Microsoft's SC-400, “Administering Information Protection and Compliance…
Purview – eDiscovery, and Investigations – How to guide
Create a Case - eDiscovery (Standard) - Microsoft Purview You will require the role eDiscovery Manager or eDiscovery Administrator Assign eDiscovery permissions in the Microsoft Purview compliance portal - Microsoft…
Microsoft SC-200 Security Operations Analyst – Study Notes
Defender for Identity entity tags in Microsoft 365 Defender https://docs.microsoft.com/en-us/defender-for-identity/manage-sensitive-honeytoken-accounts Using role-based access control (RBAC) https://docs.microsoft.com/en-us/learn/modules/deploy-microsoft-defender-for-endpoints-environment/4-manage-access Manage portal access using role-based access control https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/rbac?view=o365-worldwide Safe Attachments policies in Microsoft Defender…
Block Downloads In MS TEAMS Thick Client For Non Managed Computers
How to remove the download, save as or print option from the MS Teams thick client application on unmanaged device, logged into your corporate tenancy via a conditional access policy.…
Block Access From Unmanaged Devices To SharePoint or Specific Sites
Get started with the SharePoint Online Management Shell | Microsoft Docs Learn about sensitivity labels - Microsoft 365 Compliance | Microsoft Docs Control access from unmanaged devices - SharePoint in…
How to Enable “Security Defaults” in Azure and Office 365
Security Defaults in Azure Portal. IMPORTANT, SECURITY DEFAULTS IS NOT ALWAYS ENABLED BY DEFAULT. YOU MUST CHECK YOUR SETTINGS What does Security Defaults give you? Security Defaults when enabled provide…
MS365 – Azure AD – Dynamic Groups and Expiration Settings
Maintain groups in Azure AD with dynamic groups and set expiration settings. Example scenario : Controlling remote access to sub contractors working on a short term project. The project owner…
Office 365 Security and Compliance – Alert When A Specific File Is Accessed
When a very important file stored in OneDrive needs to be monitored. This is how to create an alert on file activity. We specifically want to monitor and alert on…
Content Search – Security And Compliance – Search A Mailbox For Specific Content And Then Export Results
If you’re doing some compliance investigation work, you may need to search a user’s mailbox for specific words. This is how To Search Email Content in Office 365 Security &…