Manage apps with Defender for Endpoint and Microsoft Cloud App Security
It’s easy to manage apps when you have a clear perimeter. There is only one option to access the internet and that’s through the company firewall. Now, with people working from home and bring your own...
View ArticleWeb content filtering with Defender for Endpoint
Content filters are used almost in every organization. The function of a content filter is to block websites or files. These sites or files may be malicious or it’s in the company policy to restrict...
View ArticleEnable Tamper Protection with Defender for Endpoint
Tamper protection protects you from unwanted changes to Microsoft Defender Antivirus. Bad actors normally want to disable the firewall or antivirus in order to install additional malware. Disabling...
View ArticleFirst contact safety tip in Defender for Office 365
Microsoft added the first contact safety tip in Defender for Office 365. This safety tip is shown when recipients first receive an email from a sender or do not often receive email from a sender....
View ArticlePrivileged access groups in Azure Privileged Identity Management
It was already possible to use Privileged Identity Management (PIM) to manage, control and monitor administrator roles in your organization. PIM provides time-based and approval-based role activation....
View ArticleBuilding simple parent/child relationship grid in Azure Sentinel Workbook
There are many different visualizations in Azure Workbooks. A grid can be just a plain grid, or a grid with a parent/child relationship, or grouped by values in columns. This post will show you how to...
View ArticleProvision a Team in Microsoft Teams using Power Apps and Power Automate
It’s best practice from a security point of view to disable users from creating security groups or Microsoft 365 groups. Users can create security groups in Azure portals, API or PowerShell by default....
View ArticleExport & Import Office 365 and Azure configuration
In two weeks I’ll be starting at a new company as an Information Security specialist. In order to prepare for this new endeavor I’ll be updating my developer tenant for testing purposes. All best...
View ArticleExport & Import Conditional Access policies and configuration using Graph API
Conditional access is the tool to enforce organizational policies. Access to resource is granted using if-then statements. You can for example enforce multi-factor authentication from untrusted...
View ArticleExport & Import Intune policies and configuration using Graph API
Intune or Microsoft Endpoint Manager is to tool for Mobile Device Management (MDM) or Mobile Application Management (MAM). Device management was mostly focussed on devices like iOS and Android where...
View Article