There's a new dashboard in town for Azure Security Center. This particular dashboard (workbook) contains the following: Overview - a summary of all monitored network-related security components.Public IPs & Exposed Ports - Public IP and Asset Types and Ports Exposed to the InternetNetwork Security Services- DDoS Protection Plans, Azure Firewalls and Firewall Policies, Azure WAF … Continue reading How to Get the Network Security Dashboard for Security Center
The Azure Sentinel newsletter "experiment" I started a few months ago is a confirmed success. Its become a wildly popular weekly Inbox insert for many and the subscriber growth is still steadily increasing. And, for those that don't care for yet another newsletter, there's also a huge following for direct access through the social media … Continue reading The Azure Security Center Wrap Newsletter
The Microsoft Security Center team has now released an integrated report that gives customers the ability to track compliance status over time. This is a valuable report to enable managers and workers to view continuing progress toward a compliant environment. The Compliance Over Time workbook requires continuous export to export data to a Log Analytics … Continue reading Security Center Compliance Over Time Report Now in Public Preview
This is the Microsoft Senior Project Managers journey to the Project Management Institute Agile Certified Practitioner (PMI-ACP) Exam
A couple weeks back during the Microsoft Security Insights Podcast, the topic of Azure Arc came up in reference to the new AMA client that uses DCRs to help filter the Windows events collected from on-prem servers and sent to the Log Analytics workspace for Azure Sentinel. At the time, I suggested Thomas Maurer would … Continue reading July 14: Thomas Maurer on Azure Arc for the Microsoft Security Insights Podcast and Twitch Stream
Microsoft Defender for Identity (MDI) can be easily integrated with your Syslog server. You can be notified of new suspicious activities by sending security and health alerts to your Syslog server.
I have just posted my video that discusses Endpoint Analytics and how to configure it via Intune and ConfigMgr and also explores the kind of data that is at your fingertips after a very easy enablement process. here is a link to the video, Enjoy!
I have just posted my video series focusing on integration between ConfigMgr and Endpoint Protection. The link to the full playlist is here and a description of each video in the series is below. Enjoy! Microsoft Endpoint Manager - Configuration Manager - Endpoint Protection - Part I - IntroductionThe session is part I of a series … Continue reading Microsoft Endpoint Manager – ConfigMgr – Endpoint Protection
Overview: ABAC - Attribute-based access control is an authorization system which defines access based on attributes associated with security principals, resources, and environment. ABAC builds on Azure RBAC by adding role assignment conditions based on attributes in the context of specific actions. How does it differentiate from Azure RBAC: Role-based access control - RBAC is … Continue reading Azure ABAC and it’s features
I have just posted my video series focusing on integration between Intune and Endpoint Protection. The link to the full playlist is here and a description of each video in the series is below. Enjoy!Microsoft Endpoint Manager - Intune - Endpoint Protection - Part I - IntroductionThe session is part I of a series focused on Endpoint … Continue reading Microsoft Endpoint Manager – Intune – Endpoint Protection