Taxonomy of fileless threats and How Microsoft Defender ATP stops it!

I am sure most of you might have heard about Fileless threat? What exactly are fileless threats? The term “fileless” suggests that a threat does not come in a file, such as a backdoor that lives only in the memory of a machine. However, there’s no generally accepted definition for fileless malware. The term isContinueContinue reading “Taxonomy of fileless threats and How Microsoft Defender ATP stops it!”

Microsoft 365 E5 Security can replace up to 26 other security vendors

Did you know that M365 E5 can replace up to 26 other security solutions? Using Microsoft Security categories like: Identity and Access Management Threat Protection Information Protection UEM CASB Here we have expanded out the view of the different security solution areas that were represented at a higher category level above. From there, we wantedContinueContinue reading “Microsoft 365 E5 Security can replace up to 26 other security vendors”

Microsoft 365 for Enterprise Foundation Infrastructure

If you’re doing the end-to-end deployment of Microsoft 365 for enterprise yourself, you should first build a firm foundation upon which applications and services can unlock creativity and teamwork in a secure environment. This foundation is sometimes referred to as a core deployment. For a defined end-to-end path for deployment, you can use these phases toContinueContinue reading “Microsoft 365 for Enterprise Foundation Infrastructure”

Configure Threat Protection capabilities across Microsoft 365

Have you ever been wondered how to deploy step by step for Microsoft 365 Threat Protection suite? Microsoft 365 E5 enables you to protect your organization with adaptive, built-in intelligence. With the threat protection features in Microsoft 365 E5, you can detect and investigate advanced threats, compromised identities, and malicious actions across your on-premises andContinueContinue reading “Configure Threat Protection capabilities across Microsoft 365”

Office 365 Cloud Policy Service and Security Policy Advisor (Security Baseline Policies)

Did you know about Office Cloud Policy Service and Security Policy Advisors? The Office cloud policy service: lets you enforce policy settings for Microsoft 365 Apps for enterprise (previously named Office 365 ProPlus) on a user’s device, even if the device isn’t domain joined or otherwise managed. When a user signs into Microsoft 365 AppsContinueContinue reading “Office 365 Cloud Policy Service and Security Policy Advisor (Security Baseline Policies)”

The CIS Microsoft 365 Foundations Benchmark and Best Practices

Center for Internet Security’s (CIS) Microsoft 365 Foundations Benchmark—developed by CIS in partnership with Microsoft—to provide prescriptive guidance for establishing a secure baseline configuration for Microsoft 365. CIS is a nonprofit entity focused on developing global standards and recognized best practices for securing IT systems and data against the most pervasive attacks. The CIS MicrosoftContinueContinue reading “The CIS Microsoft 365 Foundations Benchmark and Best Practices”