Category Archives: Uncategorized
1. Planning for Device Management With Microsoft 365, you might have the opportunity, depending on your plan, to leverage mobile device management or even Windows Intune to manage your mobile devices. We’re typically managing most of our devices on our internal network, either through Group Policy Objects or through System Center Configuration Manager. However, as […]
1. What is Content Search? In Microsoft 365, you have the ability, if need be, to set up an Ediscovery search where you can set up a case and go through and search for specific content in response to some EDiscovery requests. But there are times when you don’t need to go through all of […]
9. What is Azure Information Protection? Azure Information Protection is Microsoft’s cloud-based solution to help protect documents not only while they’re at rest or in transit but also when they’ve left the environment and gone somewhere else. With Azure Information Protection, we have the ability to apply protection to documents and emails. And one of […]
1. Planning Security and Compliance Roles Within Microsoft 365, you have a lot of opportunities to assign role-based access control (RBAC permissions to people. One of those is working within the Security and Compliance Center. in the Security and Compliance Center. If I were to go in here and click on permissions, you’re going to […]
1. In-Place Archive in Exchange Depending on the plan that you have for Microsoft 365, it may include an option for in-place archiving. If your plan does not already include place archiving, it is now available as an add-on. When you have archiving in place, you can actually turn it on for your users. No, […]
1. Microsoft Intelligent Security Graph Let’s talk for a minute about the Microsoft intelligence and security graph. Or you might hear a lot of people just refer to it as the Microsoft Graph, right? Microsoft has a large global footprint, and what that means is that they’re collecting data points from millions and billions of […]
7. Memory Acquisition (OBJ 4.4) Memory acquisition. Now, as we go through our order of volatility, one of the things we need to collect very early on is our system memory, that stuff that’s stored inside of RAM. The way we do this is through system memory and image acquisition. This is a process that […]
1. Digital Forensics (Introduction) In this section of the course, we’re going to play detective and begin our coverage of digital forensics. Now, this is an area that I really love inside the cybersecurity world, having spent several years as a digital media collector and digital forensic examiner myself. In this section of the course, […]
1. Analyzing Your SIEM (Introduction) Seam dashboards. Now, in the previous sections, I showed you a couple of different theme solutions and the related dashboards. In this section, we’re going to dive a little deeper into seams and learn how we can analyse and query logs and the seam data within them. In this particular […]
1. Email Monitoring (Introduction) In this section of the course, we’re going to discuss COVID email monitoring. Now, our focus in this section is going to continue to be in domains three and four, with objectives three one and four three. Again, objective three states that, given a scenario, you must analyses data as part […]