Learn how to enable Tamper Protection in Microsoft Defender for Endpoint and see it in action as we demonstrate how to block an administrator trying to bypass Defender Antivirus.
Learn how to enable Microsoft 365 Defender’s Safe Documents to scan files before users are allowed to “enable editing” on documents to better mitigate risk of access to malicious content.
Learn how to use Block at First Sight with Microsoft Defender for Endpoint to protect your organisation from polymorphic malware… in seconds.
Learn how to better protect your organisation from malware with Microsoft Defender for Cloud Apps.
Learn how to configure the Defender for Endpoint and Defender for Cloud Apps integration to enable easy blocking of unsanctioned apps.
Learn how to set up Attack Surface Reduction rules to block entire types of behaviour, minimising opportunities for attackers to compromise your devices.
Impersonation based email attacks are still a widely adopted tactic from bad actors. Learn how user and domain impersonation with Microsoft 365 Defender can help protect internal or third-party users and internal or third-party domains with controls on where these emails will be delivered.
Learn how to set up Web Content Filtering to better monitor and control the access users have to certain websites.
Learn how to use Defender for Endpoint’s Isolation and Live Response features to better improve your investigations by restricting the potential lateral movement of a compromised device across your network.
Learn how to employ Microsoft Defender for Identity to monitor your on-premises Active Directory and detect suspicious activities within your environment.
There are many baked in detection rules and alerts in the Microsoft 365 Defender suite, but by employing custom detection rules we can create our own. By leveraging Advanced Hunting and KQL queries we can create new queries that look for specific events and return entities that we can develop specific alerts upon.
Impersonation based email attacks are still a widely adopted tactic from bad actors. Learn how user and domain impersonation with Microsoft 365 Defender can help protect internal or third-party users and internal or third-party domains with controls on where these emails will be delivered.
IT Security teams face significant challenges in their fight to defend against increasingly sophisticated cyber threats. From alert-fatigue to a major global cyber skills shortage, which leads to under resourcing in this area, these issues only make the task at hand more difficult.
Digital Transformation means many things to many organisations. It could be moving from on-premise to cloud, automating the business and, in some cases, changing the entire customer engagement. But taking steps to further your organisation’s digital transformation journey during the COVID era of remote working threw up many challenges, not least of which, was security.
Deploying effective security solutions to an OT environment can be a significant challenge, particularly when deployed on legacy systems, as can be the case in heavy industry manufacturing and energy.
Join our mail list for Threatscape News and Event updates
© 2024 Threatscape. All rights Reserved.