Introduction With Microsoft Intune you can manage most of your endpoints like Windows 10/11, Android, iOS, macOS and the newest operating systems: Chrome and Linux…
All about M365, Azure and Security
Introduction With Microsoft Intune you can manage most of your endpoints like Windows 10/11, Android, iOS, macOS and the newest operating systems: Chrome and Linux…
I already made some posts how to implement and connect data sources to Microsoft Sentinel. The other side is that you have to pay per…
Microsoft released a new agent named Azure Monitoring Agent (AMA) to forward logs to Log Analytic workspace and is about to send the old Microsoft…
At the beginning of M365 there was no problem creating a tenant and leave it at default. But this was years ago. Now a lot…
This post depends on our previous posts. You should read them first to work with the same environment: To understand what we configure, we have…
In my post about “First steps setting up Microsoft Sentinel” we prepared our Microsoft Sentinel environment to use it for different connectors. Now we want…
In this post we go through the basic setup of Microsoft Sentinel. The minimum requirement needed is to create a Log Analytic Workspace and connect…
Okay when you first research how you can secure your servers with Defender product you will find different solutions.At first this was very confusing for…
Okay in the first part we configured PIM so that your test user can ask for Global Admin permission. The configuration was configured so, that…
One of the best and easiest security possibilities is the deployment of PIM (Privileged Identity Management) and I want you to show how I use…