Discover and Respond
47 TopicsIntroducing the Microsoft Purview Audit Search Graph API
The new Microsoft Purview Audit Search Graph API will enable the programmatic search and retrieval of relevant audit logs with improvements in search completeness, reliability, and performance. This API serves as an improved alternative to the existing PowerShell cmdlet, Search-UnifiedAuditLog.15KViews0likes6CommentsAutomating and Streamlining Vulnerability Management for Your Clients
Learn how to enhance vulnerability management for your windows clients using Microsoft Defender for Endpoint, Intune, and Azure AD. Harness the potential of automation to simplify processes and minimize expenses. *Discover how automation transforms security by removing manual tasks, minimizing human error, and conserving time and resources. *Observe how Microsoft's tools deliver a complete vulnerability management solution for both on-site and remote devices. *Follow our detailed guide on setup, enrollment, strategic updates deployment, and monitoring progress through the Microsoft 365 Defender portal. Take charge of your vulnerability management and protect your organization. Don't miss our blog post, and keep an eye out for the upcoming entry on servers!6.5KViews1like1CommentNavigating the New Frontier: Information Security in the Era of M365 Copilot
Explore the intersection of AI and security in our latest feature, where Microsoft Purview meets M365 Copilot. Dive into the critical role of sensitivity labels, advanced data classification, and encryption in shaping a secure digital workspace. Gain expert insights from industry professionals and discover practical strategies for balancing innovative AI tools with rigorous security protocols.7KViews12likes1CommentHardening Windows Clients with Microsoft Intune and Defender for Endpoint
Explore an approach at hardening clients in your organization by using Microsoft Intune and Defender for Endpoint to apply and mitigate some of the most common security misconfigurations. This blog unveils a centralized approach to automating asset management, deploying security baselines consistently, and minimizing the impact on end users. Learn valuable insights on planning, testing, and monitoring security policies, while discovering the power of attack surface reduction rules. Dive into this comprehensive guide and elevate your organization's security posture with streamlined solutions and proactive measures. Don't miss the chance to turn a major pain point into a significant win for your team!21KViews5likes5CommentsCybersecurity 101: What are the Three Pillars of a Robust Strategy?
Cybersecurity is not just a defensive strategy; it can be a powerful driver of an organization's success. Find out how to tactically create a cybersecurity strategy that aligns with business goals, fosters trust, and enables innovation.7.7KViews3likes0Comments