@YusufsDSBlog: Top AzureAD policy recommendations

Some interesting comments in the the thread here; > TOP @azuread [https://twitter.com/azuread?ref_src=twsrc%5Etfw] policy recommendations: 1. Azure MFA for Admins - 2. Risk-based MFA for users - 3. Require compliant PCs - 4. Mobile app protection - 5. Require approved app - https://t.co/k5kfEmDdKy — Yusuf Dikmenoglu (@YusufsDSBlog) July 6, 2019 [https://twitter.com/YusufsDSBlog/status/1147468496034574341?ref_src=twsrc%5Etfw] MS link; Identity and device access configurations - Microsoft 3…

Read More

Windows Event forwarding

Scripts, examples, walk-through etc here; microsoft/WSLabWindows Server rapid lab deployment scripts. Contribute to microsoft/WSLab development by creating an account on GitHub.GitHubmicrosoft [https://github.com/microsoft/WSLab/blob/master/Scenarios/Windows%20Event%20Forwarding/Sysmon/readme.md]…

Read More

Blue Team guide to Azure & Office 365 monitoring

Interest stuff in this blue team guide for azure/O365; > A Blue Team guide to Azure & Office 365 monitoring - https://t.co/gLYuvX8zor — Thomas Patzke (@blubbfiction) June 21, 2019 [https://twitter.com/blubbfiction/status/1142201194137473025?ref_src=twsrc%5Etfw] A Blue Team guide to Azure & Office 365 monitoringA few weeks ago I thought that 0x00sec didn’t have enough Blue Team focused posts. Yet, detection of potential threats is incredibly important in any organization. Because Azure and Offi…

Read More

@NCSC: Small Business Guide: Response & Recovery

> Check out our easy-to-use guide that helps small businesses prepare their response to (and plan their recovery from) a cyber incident https://t.co/U1dZ7rszvF pic.twitter.com/LkRrIsBV08 [https://t.co/LkRrIsBV08] — NCSC UK (@NCSC) June 20, 2019 [https://twitter.com/NCSC/status/1141642096786456576?ref_src=twsrc%5Etfw] Small Business Guide: Response & RecoveryGuidance that helps small to medium sized organisations prepare their response to and plan their recovery from a cyber incident. [https://w…

Read More

Getting Started with Securing Microsoft Teams

Getting Started with Securing Microsoft TeamsNow that your organization has started thinking about using Microsoft Teams after reading Shelly Avery’s blog post, let’s talk about how you can secure your Teams environment. We can focus this conversation in 3 main areas; ensuring your users’ identities are secure to access Teams, protecting the T…TECHCOMMUNITY.MICROSOFT.COMCraig Eidelman [https://techcommunity.microsoft.com/t5/healthcare-and-life-sciences/getting-started-with-securing-microsoft-t…

Read More