Onboarding Data Sources Into Azure Sentinel
Onboarding Data Sources Into Azure Sentinel Knowing what data you wish to analyze within a SIEM solution provides a tremendous advantage to deploying Azure Sentinel. However, that is not always the case during an initial deployment. You don’t know what you don’t know. Luckily, Microsoft allows free ingestion of most Azure and Office 365 activities […]
Intro to Azure Sentinel
Intro to Azure Sentinel Azure Sentinel is a cloud native Security Information Event Management (SIEM) and Security Orchestration, Automation and Response (SOAR) solution. A SIEM solution aggregates data and provides real-time analysis of security alerts generated by applications and network appliances. A SOAR solution automates the investigations and responses of security alerts. It is common for IT Professionals to mix up the capabilities of SIEM and SOAR since they tend to work together for the goal of protection. However, these […]
5 Tips for Securing Remote Workers
5 Tips for Securing Remote Workers As organizations hustle to enable employees to work from home, they’ll inherently expand their attack surface. Here are five simple steps that can mitigate the risk in the months ahead. 1.Don’t Allow OneDrive to Sync to Personal Home Computers By default, users can sync their files down to their home device. […]
Revoke All User Sessions for Microsoft Entra ID and Office 365
Revoke All User Sessions for Azure AD and Office 365 Whether due to a phishing attack that created a compromised account, or you want to have a definitive offboarding process, everyone needs to be aware of the capabilities to immediately revoke and deny access to a specific user account. Microsoft has several ways to accomplish […]
What to Use When: Microsoft Cloud File Storage Services
What to Use When: Microsoft Cloud File Storage Services With Innovation Comes Choice (and Confusion!) There are several options to migrate data from on-premises file shares and hard drives. The Modern Practices for File Management in the Cloud are as Follows: Personal files, like those stored in someone’s H: (home) or hard drive, migrate to […]
Secure & Protect Your SBC: Microsoft Teams Direct Routing
Secure & Protect Your SBC: Microsoft Teams Direct Routing Introduction I was recently deploying Microsoft Teams Direct Routing with IntelePeer SIP trunks and an AudioCodes Session Border Controller (SBC). Not long after the public interface was turned up, and before the Teams and IntelePeer configuration was completed, I could see significant amounts of SIP traffic […]
Who Should “Own” an Office 365 Tenant?
Who Should “Own” an Office 365 Tenant? We periodically get this question, especially when consulting larger organizations who have multiple administrators handling Active Directory, Exchange, and/or SharePoint. Some ask as they are just getting started, others when they experience issues operationalizing this cloud service. Defining the Solution Owner There is a growing rise of an […]
Recovering from Enterprise Phishing Attacks
Recovering from Enterprise Phishing Attacks Much has been written about what consumers should do if their home accounts get phished. But here’s a comprehensive list for recovering from enterprise phishing attacks. We include advice for all affected parties: users, IT admins, and Security leaders. For the End User: Immediately tell the IT department and share […]
Azure Bastion: Replacement for Jump Box Server
Azure Bastion: Replacement for Jump Box Server Bastion can be defined as a fortified place used to protect something of value. In technology, a Bastion host is used to securely connect to resources on your network, typically for a single purpose. This host is typically placed in outside your network or security zone to protect […]
Microsoft Exchange Hybrid Limitations and Considerations
Microsoft Exchange Hybrid Limitations and Considerations Exchange Hybrid environments have become more and more seamless as each year passes. Here are most of the primary considerations and limitations that still exist today. There are definitely bound to be unique cases with some environments that have additional issues and/or limitations; however, the following list encompasses the […]