Featured Content
Main Content
Latest Blog Articles
Discover best practices for investigating phishing incidents with Microsoft Defender for Office 365. Learn how to use the Incidents tab, analyze threats, and accelerate response with Security Copilot...
Jun 20, 20251.5KViews
1like
0Comments
New to the series? Be sure to check out the previous posts!
Introduction to Network Trace Analysis Part 0: Laying the Groundwork
Introduction to Network Trace Analysis Part 1: Asking Que...
Jun 16, 20251.3KViews
2likes
1Comment
9 MIN READ
Hi everyone! Tyson Paul here with this month’s “Check This Out!” (CTO!) guide.
Our goal with these posts is to guide you toward content that piques your interest, whether it's for learning, trouble...
Jun 10, 2025221Views
1like
0Comments
Step-by-step implementation guide
Requirements for Implementing Device Control:
Defender for Endpoint or Defender for Business licenses (can be a trial subscription)
Minimum OS version: macOS...
Jun 09, 2025546Views
4likes
2Comments
5 MIN READ
In case you have not yet protected Tier 0, consider reviewing our article about protecting Tier 0 the modern way.
Tier 1 is more difficult to outline as there are typically different security ...
May 29, 20252.6KViews
1like
2Comments
In this article, we break down the math behind anomaly detection, explain it in simple terms, and walk through practical use cases using sample data such as user login attempts and firewall logs.
U...
May 27, 20251.1KViews
2likes
0Comments
4 MIN READ
Combining threat intelligence feeds is important for detecting threats and identifying Indicators of Compromise (IOCs) in various scenarios. Here are some key situations where this approach is advant...
May 19, 2025831Views
1like
0Comments
Hi, I'm Herbert Fuchs, a Cloud Solution Architect. In this blog, I’ll guide you through migrating existing BitLocker recovery keys from Configuration Manager to Intune—especially for scenarios involv...
May 18, 20252.2KViews
3likes
0Comments
Overview
This notebook, titled “Guided Hunting - Domain Generation Algorithm (DGA) Detection”, provides a framework for investigating anomalous network activity by identifying domains generated by ...
May 12, 2025853Views
2likes
0Comments
12 MIN READ
Hi everyone! Tyson Paul here with this month’s “Check This Out!” (CTO!) guide.
Our goal with these posts is to guide you toward content that piques your interest, whether it's for learning, trouble...
May 09, 2025322Views
0likes
1Comment
Resources
Tags
- ChrisWeaver224 Topics
- SteveRachui208 Topics
- RonGrzywacz157 Topics
- AnthonyMarsiglia79 Topics
- Michael Hildebrand65 Topics
- MarkMorow59 Topics
- BrandonWilson52 Topics
- CarstenKinder50 Topics
- JenniferRoss41 Topics
- Noteworthy News40 Topics