Make Security and Compliance Your Priority

Make Security and Compliance Your Priority Do You Think About Security? You run IT for your organization. You have a small team, maybe not in management’s eyes, but certainly in yours. It’s you, an infrastructure specialist, somebody managing the network, and another body managing your Office 365 tenant. You find that you are just keeping […]

The Cloud for Non-Profits

The Cloud for Non-Profits Tech for Social Impact Microsoft Tech for Social Impact (TSI) presented its vision for the Microsoft Cloud for Non-Profits March 30, 2021. It is designed as an affordable solution for non-profits that covers a broad range of needs common to non-profits. The Cloud for Non-Profits leverages the Non-Profit Common Data Model […]

Introduction to Azure Purview – Data Governance

Introduction to Azure Purview – Data Governance The word “purview” is loosely defined as range of vision, scope, operations, and/or insight. In the vast cloud technology landscape that most organizations operate today, data governance is becoming overwhelmingly challenging to maintain.  Data sprawl and multi-tenancy make these challenges even more difficult.  It is nearly impossibly to truly know your data with absolute certainty, let alone […]

Microsoft Defender for Endpoints Threat & Vulnerability Management

Microsoft Defender for Endpoints Threat & Vulnerability Management Microsoft Defender for Endpoints Threat and Vulnerability Management (TVM) is one of my favorite MDE modules. It has constantly updated knowledge bases that are connected to Microsoft to provide insights and recommendations on the latest threats available. TVM is essentially assessing your environment at real time to […]

Microsoft Defender for Endpoints Live Response

Microsoft Defender for Endpoints Live Response Microsoft Defender for Endpoints provides many tasks that you can perform on a machine to investigate and remediate risks. Of those tasks, Live Response can be one of the most powerful tools. Live Response is a MDE EDR capability that provides a security team immediate remote console access to a device. […]

Microsoft Defender for Endpoint Service Adoption

Microsoft Defender for Endpoint Service Adoption Microsoft Defender for Endpoints (MDE) is an endpoint security platform feature designed to help customers prevent, detect, investigate, and respond to threats. Combined with Microsoft Defender on clients and a leader on Gartner Magic Quadrant, it provides a true enterprise grade solution to help proactively identify and stop threats […]

Azure Sentinel Hunting

Azure Sentinel Hunting Hunting Overview Azure Sentinel Hunting is based off queries. It allows for manual, proactive investigations into possible security threats based on the ingested data as well as retroactive pursuits of attacks and root cause analysis. Hunting consists of several capabilities: Queries: Microsoft provided several built-in queries and custom queries can also be […]

Azure Sentinel Operations

Azure Sentinel Operations Introduction Now that Azure Sentinel has started collecting data, it’s time for a deep dive into each component to discover how to utilize the data. The examples below are sample use cases of what Azure Sentinel can do. It is by no means an extensive overview of the capabilities. There is a […]

Onboarding Data Sources Into Azure Sentinel

Onboarding Data Sources Into Azure Sentinel Knowing what data you wish to analyze within a SIEM solution provides a tremendous advantage to deploying Azure Sentinel. However, that is not always the case during an initial deployment. You don’t know what you don’t know. Luckily, Microsoft allows free ingestion of most Azure and Office 365 activities […]

Intro to Azure Sentinel

Intro to Azure Sentinel Azure Sentinel is a cloud native Security Information Event Management (SIEM) and Security Orchestration, Automation and Response (SOAR) solution. A SIEM solution aggregates data and provides real-time analysis of security alerts generated by applications and network appliances. A SOAR solution automates the investigations and responses of security alerts. It is common for IT Professionals to mix up the capabilities of SIEM and SOAR since they tend to work together for the goal of protection. However, these […]