Category Blog

Your blog category

App Protection Policy

Intune App Protection policy protect corporate data on end users device without enforcing heavy-duty device controls. The protection settings are applied to Apps without affecting device-level settings. For example, define security PIN for Apps when user opens the Microsoft Outlook  mobile…

Honeytoken -MDI

Honeytoken accounts are accounts that are used to mislead bad actors. They exist to make an attacker believe the account is real and can be exploited, whereas it’s nothing more than a stale account, waiting for someone to try and…

Microsoft Defender for Identity Configuration

Microsoft Defender for Identity (MDI) is the successor of the on-premises Advanced Threat Analytics (ATA) product. It is cloud based security solution for on-premises Active Directory and ADFS services. Microsoft Defender for Identity helps detect attacks like Pass The Hash,…

Entra

Azure AD is now Microsoft Entra. There is no action required from the tenant admin.  Azure AD Identity can be managed from the Entra Admin console.  

DFS with Windows Storage Replication

Storage Replica is a new Windows Server technology that allows you to replicate the content of your volumes between servers or clusters for disaster recovery. It was introduced on Windows Server 2016. This is a data replication technology that copies…

Tenant Level Block\Allow sender List

The Tenant Allow/Block List in the Microsoft 365 Defender portal gives you a way to manually override the Defender for Office 365 or EOP filtering verdicts. The list is used during mail flow for incoming messages from external senders. The…