home.social

#cswrld โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #cswrld, aggregated by home.social.

  1. ๐‡๐จ๐ฐ ๐ญ๐จ ๐œ๐ซ๐ž๐š๐ญ๐ž ๐š ๐–๐๐€3 ๐–๐ข-๐…๐ข ๐ฉ๐ซ๐จ๐Ÿ๐ข๐ฅ๐ž ๐Ÿ๐จ๐ซ ๐–๐ข๐ง๐๐จ๐ฐ๐ฌ ๐ข๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ˆ๐ง๐ญ๐ฎ๐ง๐ž

    Microsoft Intune still cannot natively create a Wi-Fi profile with WPA3-Personal security at this time. Within the configuration templates, there is only Wi-Fi with WPA/WPA2 security, but WPA3 is missing.

    If you have a Wi-Fi where WPA3 is enforced without hybrid mode with WPA2, then if you create a profile as WPA2, the device will not connect to it. So, if you have WPA3 enforced, you need to configure Wi-Fi using a custom profile and OMA-URI.

    cswrld.com/2026/03/how-to-crea

    #cswrld #microsoft #intune #wifi #wpa3

  2. ๐‡๐จ๐ฐ ๐‚๐จ๐ง๐๐ข๐ญ๐ข๐จ๐ง๐š๐ฅ ๐€๐œ๐œ๐ž๐ฌ๐ฌ ๐๐จ๐ฅ๐ข๐œ๐ข๐ž๐ฌ ๐€๐ซ๐ž ๐„๐ฏ๐š๐ฅ๐ฎ๐š๐ญ๐ž๐ ๐ข๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐„๐ง๐ญ๐ซ๐š ๐ˆ๐ƒ

    Understanding how Conditional Access policies are evaluated in Microsoft Entra ID is absolutely essential if you are involved in their creation or management.

    I often encounter fundamental misunderstandings regarding how the evaluation of Conditional Access policies takes place. Many administrators are accustomed to systems like firewalls, where there is an order or priority for evaluating created rules. However, it does not work this way with Conditional Access policies in Microsoft Entra ID. Applying the same principle to Conditional Access policies will very likely lead to significant security risks.

    Read my blog post bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    cswrld.com/2026/02/how-conditi

    #cswrld #entraid #securitytips #conditionalaccess

  3. ๐‡๐จ๐ฐ ๐ญ๐จ ๐ฎ๐ฌ๐ž ๐š๐œ๐œ๐ž๐ฌ๐ฌ ๐ฉ๐š๐œ๐ค๐š๐ ๐ž๐ฌ ๐ญ๐จ ๐ฆ๐š๐ง๐š๐ ๐ž ๐ ๐ซ๐จ๐ฎ๐ฉ ๐ฆ๐ž๐ฆ๐›๐ž๐ซ๐ฌ๐ก๐ข๐ฉ๐ฌ

    Access packages allow you to dynamically manage group, Teams, application, and SharePoint site membership based on user requests.

    It works by creating an access package and then publishing it to users โ€“ either all users or a select group of users. Users can then activate the package from the My Access portal after meeting defined conditions.

    cswrld.com/2026/02/how-to-use-

    #cswrld #entraid #entitlementmanagement #identitygovernance #accesspackage

  4. ๐‡๐จ๐ฐ ๐ญ๐จ ๐ ๐ž๐ญ ๐ฎ๐ง๐ฅ๐ข๐ฆ๐ข๐ญ๐ž๐ ๐ฆ๐š๐ข๐ฅ๐›๐จ๐ฑ ๐ฌ๐ข๐ณ๐ž ๐ข๐ง ๐„๐ฑ๐œ๐ก๐š๐ง๐ ๐ž ๐Ž๐ง๐ฅ๐ข๐ง๐ž

    Exchange Online Plan 1 licenses generally have a primary mailbox capacity of 50 GB. Exchange Online Plan 2 licenses have a capacity of 100 GB. However, this capacity can be extended by using Online Archive. With Exchange Online Plan 2, this capacity is unlimited. Technically speaking, the capacity is limited to 1.5 TB.

    An interesting fact is that Microsoft 365 Business Premium licenses, which by default include Exchange Online Plan 1, are also entitled to this feature.

    cswrld.com/2026/01/how-to-enab

    #cswrld #exchangeonline #mailbox #archive

  5. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฎ๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ถ๐—ฐ๐—ฎ๐—น๐—น๐˜† ๐˜‚๐—ฝ๐—ฑ๐—ฎ๐˜๐—ฒ ๐—ฎ๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€ ๐—ผ๐—ป ๐—ฐ๐—ผ๐—บ๐—ฝ๐˜‚๐˜๐—ฒ๐—ฟ๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—œ๐—ป๐˜๐˜‚๐—ป๐—ฒ

    Microsoft Intune does not have any built-in options for updating installed applications on Windows computers.

    If you want to update applications on managed computers, you must manually create a new version of the given application and deploy it to all computers. However, this is quite a lot of manual work, and you also have to monitor the availability of new versions of installed applications, which is another lot of manual work.

    Read more in the article on my blog ๐Ÿ‘‡ ๐Ÿ‘‡
    cswrld.com/2025/08/how-to-upda

    #cswrld #cybersecurityworld #blog #intune #applicationmanagement #appupdates #patchmypc

  6. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฎ๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ถ๐—ฐ๐—ฎ๐—น๐—น๐˜† ๐˜‚๐—ฝ๐—ฑ๐—ฎ๐˜๐—ฒ ๐—ฎ๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€ ๐—ผ๐—ป ๐—ฐ๐—ผ๐—บ๐—ฝ๐˜‚๐˜๐—ฒ๐—ฟ๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—œ๐—ป๐˜๐˜‚๐—ป๐—ฒ

    Microsoft Intune does not have any built-in options for updating installed applications on Windows computers.

    If you want to update applications on managed computers, you must manually create a new version of the given application and deploy it to all computers. However, this is quite a lot of manual work, and you also have to monitor the availability of new versions of installed applications, which is another lot of manual work.

    Read more in the article on my blog ๐Ÿ‘‡ ๐Ÿ‘‡
    cswrld.com/2025/08/how-to-upda

    #cswrld #cybersecurityworld #blog #intune #applicationmanagement #appupdates #patchmypc

  7. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฎ๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ถ๐—ฐ๐—ฎ๐—น๐—น๐˜† ๐˜‚๐—ฝ๐—ฑ๐—ฎ๐˜๐—ฒ ๐—ฎ๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€ ๐—ผ๐—ป ๐—ฐ๐—ผ๐—บ๐—ฝ๐˜‚๐˜๐—ฒ๐—ฟ๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—œ๐—ป๐˜๐˜‚๐—ป๐—ฒ

    Microsoft Intune does not have any built-in options for updating installed applications on Windows computers.

    If you want to update applications on managed computers, you must manually create a new version of the given application and deploy it to all computers. However, this is quite a lot of manual work, and you also have to monitor the availability of new versions of installed applications, which is another lot of manual work.

    Read more in the article on my blog ๐Ÿ‘‡ ๐Ÿ‘‡
    cswrld.com/2025/08/how-to-upda

    #cswrld #cybersecurityworld #blog #intune #applicationmanagement #appupdates #patchmypc

  8. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฎ๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ถ๐—ฐ๐—ฎ๐—น๐—น๐˜† ๐˜‚๐—ฝ๐—ฑ๐—ฎ๐˜๐—ฒ ๐—ฎ๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€ ๐—ผ๐—ป ๐—ฐ๐—ผ๐—บ๐—ฝ๐˜‚๐˜๐—ฒ๐—ฟ๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—œ๐—ป๐˜๐˜‚๐—ป๐—ฒ

    Microsoft Intune does not have any built-in options for updating installed applications on Windows computers.

    If you want to update applications on managed computers, you must manually create a new version of the given application and deploy it to all computers. However, this is quite a lot of manual work, and you also have to monitor the availability of new versions of installed applications, which is another lot of manual work.

    Read more in the article on my blog ๐Ÿ‘‡ ๐Ÿ‘‡
    cswrld.com/2025/08/how-to-upda

    #cswrld #cybersecurityworld #blog #intune #applicationmanagement #appupdates #patchmypc

  9. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฎ๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ถ๐—ฐ๐—ฎ๐—น๐—น๐˜† ๐˜‚๐—ฝ๐—ฑ๐—ฎ๐˜๐—ฒ ๐—ฎ๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€ ๐—ผ๐—ป ๐—ฐ๐—ผ๐—บ๐—ฝ๐˜‚๐˜๐—ฒ๐—ฟ๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—œ๐—ป๐˜๐˜‚๐—ป๐—ฒ

    Microsoft Intune does not have any built-in options for updating installed applications on Windows computers.

    If you want to update applications on managed computers, you must manually create a new version of the given application and deploy it to all computers. However, this is quite a lot of manual work, and you also have to monitor the availability of new versions of installed applications, which is another lot of manual work.

    Read more in the article on my blog ๐Ÿ‘‡ ๐Ÿ‘‡
    cswrld.com/2025/08/how-to-upda

    #cswrld #cybersecurityworld #blog #intune #applicationmanagement #appupdates #patchmypc

  10. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฐ๐—ผ๐—น๐—น๐—ฒ๐—ฐ๐˜ ๐—ฐ๐˜‚๐˜€๐˜๐—ผ๐—บ ๐—ฒ๐˜ƒ๐—ฒ๐—ป๐˜ ๐—œ๐——๐˜€ ๐˜๐—ผ ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—ฆ๐—ฒ๐—ป๐˜๐—ถ๐—ป๐—ฒ๐—น

    Microsoft Sentinel is Microsoft's SIEM/SOAR. It is used to collect and evaluate logs.

    If you choose to collect security logs from Windows Server, Microsoft Sentinel can collect predefined log sets using the built-in settings. By default, you have the option to select from the predefined sets All Security Events, Common, or Minimal.

    However, if you need to collect some custom Event IDs that do not belong to the above built-in categories, or simply want your own set of Event IDs to collect, you can define your own Event IDs using XPath queries.

    XPath (XML Path Language) is a query language used for selecting nodes from an XML document. It allows you to navigate through elements and attributes in XML documents, making it a powerful tool for extracting specific pieces of information. XPath is commonly used in combination with XML parsers to filter and locate data based on complex conditions.

    Read my blog post bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    cswrld.com/2025/06/how-to-coll

    #cswrld #sentinel #eventid #logcollection #custom

  11. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฑ๐—ถ๐˜€๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ฆ๐—ฒ๐—น๐—ณ-๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ ๐—ฃ๐—ฎ๐˜€๐˜€๐˜„๐—ผ๐—ฟ๐—ฑ ๐—ฅ๐—ฒ๐˜€๐—ฒ๐˜ ๐—ณ๐—ผ๐—ฟ ๐—ฎ๐—ฑ๐—บ๐—ถ๐—ป๐—ถ๐˜€๐˜๐—ฟ๐—ฎ๐˜๐—ผ๐—ฟ๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—˜๐—ป๐˜๐—ฟ๐—ฎ ๐—œ๐——

    Self-service password reset can be a useful feature that allows users to access their account in case they forget their password.

    On the other hand, it is potentially risky, as a potential attacker may target the self-service password reset feature to gain access to the account. Especially for privileged accounts, this is very risky and therefore I would generally recommend disabling self-service password resets for privileged accounts.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/KIlRPx_9XRA

    #cswrld #videotutorial #sspr #passwordreset #entraid #administrators

  12. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฏ๐—น๐—ผ๐—ฐ๐—ธ ๐—ฎ๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ถ๐—ฐ ๐—ฒ๐—บ๐—ฎ๐—ถ๐—น ๐—ณ๐—ผ๐—ฟ๐˜„๐—ฎ๐—ฟ๐—ฑ๐—ถ๐—ป๐—ด ๐—ถ๐—ป ๐—ข๐—ณ๐—ณ๐—ถ๐—ฐ๐—ฒ ๐Ÿฏ๐Ÿฒ๐Ÿฑ

    Automatic email forwarding is very risky. First, it can lead to exfiltration of sensitive internal information outside the corporate environment. But it can also cause account compromise, for example through password reset whose code arrives at some external address that may be under the control of an attacker.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/sdjG-gl6Xxs

    #cswrld #videotutorial #email #forwarding #office365 #exchangeonline

  13. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฏ๐—ฎ๐—ฐ๐—ธ๐˜‚๐—ฝ ๐—ข๐—ณ๐—ณ๐—ถ๐—ฐ๐—ฒ ๐Ÿฏ๐Ÿฒ๐Ÿฑ ๐—ฑ๐—ฎ๐˜๐—ฎ

    Right off the bat, you might be wondering why I should back up data from Office 365 when it's a cloud service. Microsoft assures you of high data availability, but the service itself has no built-in backup mechanisms. And that's something to keep in mind.

    Office 365 has two levels of recycle bins in it. The first level is user level, and data from this recycle bin can be restored directly by the user. The second level is admin and only an administrator can restore data from this level. You can have litigation hold and in-place hold set up, but that is not available in all plans, and you probably won't activate it on all mailboxes, SharePoint sites and teams in Teams.

    ๐Ÿ“บ Learn more how to backup Office 365 data in my today's video ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/BBEjAKeaRCQ

    #videotutorial #cswrld #backup #office365

  14. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฏ๐—น๐—ผ๐—ฐ๐—ธ ๐˜€๐—ฝ๐—ฒ๐—ฐ๐—ถ๐—ณ๐—ถ๐—ฐ ๐—ณ๐—ถ๐—น๐—ฒ ๐˜๐˜†๐—ฝ๐—ฒ๐˜€ ๐—ถ๐—ป ๐—ฒ๐—บ๐—ฎ๐—ถ๐—น ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ต๐—บ๐—ฒ๐—ป๐˜๐˜€

    A very common source of infection is email. Everyone uses email and threat actors take advantage of it. Either in the form of phishing or in the form of malicious attachments.

    There are very advanced protection options within Office 365. Whether it be within Exchange Online Protection, which is included in all Office 365 / Exchange Online plans, or within Safe Attachments, which is an extension within Microsoft Defender for Office 365.

    But a very effective protection is the very simple blocking of unwanted file types within email attachments. You simply block what is unwanted, making it very easy and effective to block many potentially malicious files.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/dFlD_CH5Kp8

    #cswrld #videotutorial #email #attachments #filter #office365 #exchangeonline

  15. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฏ๐—น๐—ผ๐—ฐ๐—ธ ๐˜‚๐—ป๐—ธ๐—ป๐—ผ๐˜„๐—ป ๐—ฝ๐—น๐—ฎ๐˜๐—ณ๐—ผ๐—ฟ๐—บ๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—˜๐—ป๐˜๐—ฟ๐—ฎ ๐—œ๐——

    Under conditional access policies, it is possible to block individual device platforms. In general, it is a good idea to eliminate all ways that a potential threat actor could use to compromise the environment. In other words, block everything that is not needed.

    This also applies to device platforms within Microsoft Entra ID. For example, if your organization only uses Windows, iOS, and Android, it's a good idea to disable all other platforms. If you also use macOS, you need to add macOS as well, of course.

    What I would definitely recommend blocking is Windows Phone and other unknown platforms. Unrecognized / unknown platforms are usually spoofed User Agents, which is mainly used by threat actors.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/vFhQgwXmqTo

    #cswrld #videotutorial #entraid #conditionalaccess #platforms #blocking

  16. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฏ๐—น๐—ผ๐—ฐ๐—ธ ๐—ป๐—ฒ๐˜„๐—น๐˜† ๐—ฟ๐—ฒ๐—ด๐—ถ๐˜€๐˜๐—ฒ๐—ฟ๐—ฒ๐—ฑ ๐—ฑ๐—ผ๐—บ๐—ฎ๐—ถ๐—ป๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ ๐—ณ๐—ผ๐—ฟ ๐—˜๐—ป๐—ฑ๐—ฝ๐—ผ๐—ถ๐—ป๐˜

    Newly registered domains can of course be legitimate. Every domain is new at some point. But usually there isnโ€™t any content on new domains right away โ€“ the content is still being developed, and the launch of the site wonโ€™t happen for some time.

    But newly registered domains are often a tool for phishing attacks. Such domains are usually used in phishing attacks immediately after registration and usually disappear again after a short time, for example because they are cancelled or blocked by the registrar.

    Blocking access to newly registered domains is a relatively popular and effective way of eliminating phishing.

    It is possible to block newly registered and parked domains within Microsoft Defender for Endpoint. Domains within the first 30 days of registration are considered newly registered.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/oYtDHK90P1M

    #cswrld #videotutorial #mde #defender #phishing #newdomains

  17. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฟ๐—ฒ๐—พ๐˜‚๐—ถ๐—ฟ๐—ฒ ๐—ฐ๐—ผ๐—บ๐—ฝ๐—น๐—ถ๐—ฎ๐—ป๐˜ ๐—ฑ๐—ฒ๐˜ƒ๐—ถ๐—ฐ๐—ฒ ๐—ณ๐—ผ๐—ฟ ๐—ฎ๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ฎ๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—˜๐—ป๐˜๐—ฟ๐—ฎ ๐—œ๐——

    Requiring a managed device to access Microsoft 365 services (or generally any apps/services integrated with Microsoft Entra ID) is a very effective method of phishing protection.

    This is because in such a case it is not enough for a threat actor to obtain, for example, login credentials through phishing. It is not even enough to somehow obtain or bypass MFA. In such a case, the threat actor would also have to have a managed device from the organizationโ€™s tenant. Which should be unrealistic to obtain.

    Thus, requiring access from a managed device is a very effective and powerful method of protecting corporate identity. And yet it shouldnโ€™t be too complicated to deploy, since corporate devices should be managed anyway.

    ๐Ÿ“บ Watch my YouTube video on how to require compliant devices via conditional access policies in Microsoft Entra ID ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/mH-8x29xdW0

    #cswrld #videotutorial #entraid #devicecompliance #applications

  18. ๐’๐ก๐จ๐ฎ๐ฅ๐ ๐ˆ ๐ญ๐ซ๐ฎ๐ฌ๐ญ ๐ž๐ฑ๐ญ๐ž๐ซ๐ง๐š๐ฅ ๐Œ๐…๐€ ๐จ๐ซ ๐ง๐จ๐ญ ๐ˆ๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐„๐ง๐ญ๐ซ๐š ๐ˆ๐ƒ?

    Trust or do not trust external MFA in Microsoft Entra ID? There are different opinions, and I will talk about the pros and cons in this video.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/xjmUay482Mk

    #cswrld #videotutorial #mfa #externaltrust #entraid

  19. ๐‡๐จ๐ฐ ๐ญ๐จ ๐ญ๐ฎ๐ซ๐ง ๐จ๐ง ๐ข๐ง๐›๐จ๐ฎ๐ง๐ ๐’๐Œ๐“๐ ๐ƒ๐€๐๐„ ๐ข๐ง ๐Ž๐Ÿ๐Ÿ๐ข๐œ๐ž 365

    Inbound SMTP DANE (DNS-Based Authentication of Named Entities) is a security protocol designed to secure email communication by ensuring the authenticity of the receiving mail server's encryption certificates when emails are delivered via the Simple Mail Transfer Protocol (SMTP).

    By default, SMTP doesn't guarantee encryption, which makes it vulnerable to man-in-the-middle attacks. To secure email communication, SMTP can use STARTTLS, which upgrades a plain text connection to an encrypted one. However, STARTTLS by itself doesn't verify the authenticity of the receiving mail server's certificate, leaving it vulnerable to attacks where a malicious entity might impersonate the server.

    DANE addresses this issue by enabling domain owners to publish their mail serverโ€™s encryption certificates in DNS records, which are protected by DNSSEC (Domain Name System Security Extensions). This allows sending mail servers to verify the authenticity of the receiving mail server's certificate before establishing an encrypted connection.

    When an email is received, the receiving mail server uses DANE to publish its certificate in the DNS, allowing the sending server to check the certificate's validity before establishing a secure TLS connection. This ensures that emails are delivered over an encrypted connection and that the encryption certificate is trustworthy and has not been tampered with.

    ๐Ÿ“บ Watch my YouTube video bellow on how to run on inbound SMTP DANE in Office 365 ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/UEAlyU3CTHk

    #cswrld #videotutorial #smtp #inbound #dane #office365

  20. SharePoint sites are used to share data within an organization. Typically, this data is shared within teams or projects.

    If itโ€™s data that multiple people work with on a regular basis, then itโ€™s ideal to automatically connect these SharePoint sites to all users who work with the data so that they donโ€™t have to find the SharePoint site themselves and manually set it to sync to their computer.

    Automatic synchronization can be easily set up using Microsoft Intune.

    ๐Ÿ“บ Watch my YouTube video bellow on how to automatically map SharePoint sites via Microsoft Intune ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/gAjn6_hb80Y

    #cswrld #videotutorial #intune #sharepoint #sitemapping

  21. ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐Ÿ๐จ๐ซ ๐„๐ง๐๐ฉ๐จ๐ข๐ง๐ญ ๐“๐š๐ฆ๐ฉ๐ž๐ซ ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง ๐ž๐ฑ๐ฉ๐ฅ๐š๐ข๐ง๐ž๐

    Tamper Protection in Microsoft Defender for Endpoint is protection that protects selected settings, such as virus and malware protection. With tamper protection, you cannot disable selected components of Microsoft Defender for Endpoint or change their settings.

    In fact, disabling or changing settings on a security product is usually what a threat actor is trying to do. If they were able to deactivate the protection, it would make their subsequent work much easier. This is why it is extremely important to keep tamper protection active.

    ๐Ÿ“บ Watch my YouTube video bellow on Microsoft Defender for Endpoint protection ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/xnC6Ufl025I

    #cswrld #mde #videotutorial #defender #tamperprotection

  22. ๐๐ฅ๐จ๐œ๐ค๐ข๐ง๐  ๐ฎ๐ฌ๐ž๐ซ ๐œ๐จ๐ง๐ฌ๐ž๐ง๐ญ ๐ญ๐จ ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐„๐ง๐ญ๐ซ๐š ๐ˆ๐ƒ ๐ž๐ง๐ญ๐ž๐ซ๐ฉ๐ซ๐ข๐ฌ๐ž ๐š๐ฉ๐ฉ๐ฌ

    Microsoft Entra ID is primarily an identity system for Microsoft applications and services. However, you can also integrate other applications and services with Microsoft Entra ID. And itโ€™s even highly recommended, because you get single sign-on using corporate identity, you donโ€™t have to maintain another separate user account system, you have the ability to apply conditional access policies to these external applications and services, etc.

    But the problem is that by default, even a regular user can give consent to an external application to access Microsoft Entra ID and other services tied to it. This is very risky as it can lead to leakage of sensitive internal information as such applications can have arbitrary permissions that the user gives the application access to.

    ๐Ÿ“บ Watch my YouTube video bellow on how to block user consent to Enterprise Apps in Microsoft Entra ID ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/Ht-zcZt9nzM

    #cswrld #entraid #enterpriseapps #userconsent #block

  23. ๐๐ฅ๐จ๐œ๐ค๐ข๐ง๐  ๐ฎ๐ฌ๐ž๐ซ ๐œ๐จ๐ง๐ฌ๐ž๐ง๐ญ ๐ญ๐จ ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐„๐ง๐ญ๐ซ๐š ๐ˆ๐ƒ ๐ž๐ง๐ญ๐ž๐ซ๐ฉ๐ซ๐ข๐ฌ๐ž ๐š๐ฉ๐ฉ๐ฌ

    Microsoft Entra ID is primarily an identity system for Microsoft applications and services. However, you can also integrate other applications and services with Microsoft Entra ID. And itโ€™s even highly recommended, because you get single sign-on using corporate identity, you donโ€™t have to maintain another separate user account system, you have the ability to apply conditional access policies to these external applications and services, etc.

    But the problem is that by default, even a regular user can give consent to an external application to access Microsoft Entra ID and other services tied to it. This is very risky as it can lead to leakage of sensitive internal information as such applications can have arbitrary permissions that the user gives the application access to.

    ๐Ÿ“บ Watch my YouTube video bellow on how to block user consent to Enterprise Apps in Microsoft Entra ID ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/Ht-zcZt9nzM

    #cswrld #entraid #enterpriseapps #userconsent #block

  24. ๐๐ฅ๐จ๐œ๐ค๐ข๐ง๐  ๐ฎ๐ฌ๐ž๐ซ ๐œ๐จ๐ง๐ฌ๐ž๐ง๐ญ ๐ญ๐จ ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐„๐ง๐ญ๐ซ๐š ๐ˆ๐ƒ ๐ž๐ง๐ญ๐ž๐ซ๐ฉ๐ซ๐ข๐ฌ๐ž ๐š๐ฉ๐ฉ๐ฌ

    Microsoft Entra ID is primarily an identity system for Microsoft applications and services. However, you can also integrate other applications and services with Microsoft Entra ID. And itโ€™s even highly recommended, because you get single sign-on using corporate identity, you donโ€™t have to maintain another separate user account system, you have the ability to apply conditional access policies to these external applications and services, etc.

    But the problem is that by default, even a regular user can give consent to an external application to access Microsoft Entra ID and other services tied to it. This is very risky as it can lead to leakage of sensitive internal information as such applications can have arbitrary permissions that the user gives the application access to.

    ๐Ÿ“บ Watch my YouTube video bellow on how to block user consent to Enterprise Apps in Microsoft Entra ID ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/Ht-zcZt9nzM

    #cswrld #entraid #enterpriseapps #userconsent #block

  25. ๐๐ฅ๐จ๐œ๐ค๐ข๐ง๐  ๐ฎ๐ฌ๐ž๐ซ ๐œ๐จ๐ง๐ฌ๐ž๐ง๐ญ ๐ญ๐จ ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐„๐ง๐ญ๐ซ๐š ๐ˆ๐ƒ ๐ž๐ง๐ญ๐ž๐ซ๐ฉ๐ซ๐ข๐ฌ๐ž ๐š๐ฉ๐ฉ๐ฌ

    Microsoft Entra ID is primarily an identity system for Microsoft applications and services. However, you can also integrate other applications and services with Microsoft Entra ID. And itโ€™s even highly recommended, because you get single sign-on using corporate identity, you donโ€™t have to maintain another separate user account system, you have the ability to apply conditional access policies to these external applications and services, etc.

    But the problem is that by default, even a regular user can give consent to an external application to access Microsoft Entra ID and other services tied to it. This is very risky as it can lead to leakage of sensitive internal information as such applications can have arbitrary permissions that the user gives the application access to.

    ๐Ÿ“บ Watch my YouTube video bellow on how to block user consent to Enterprise Apps in Microsoft Entra ID ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/Ht-zcZt9nzM

    #cswrld #entraid #enterpriseapps #userconsent #block

  26. ๐“๐€๐Œ๐๐„๐‘ ๐๐‘๐Ž๐“๐„๐‚๐“๐ˆ๐Ž๐ ๐…๐Ž๐‘ ๐„๐—๐‚๐‹๐”๐’๐ˆ๐Ž๐๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐ƒ๐„๐…๐„๐๐ƒ๐„๐‘ ๐…๐Ž๐‘ ๐„๐๐ƒ๐๐Ž๐ˆ๐๐“

    Antivirus exclusions can do a lot of damage because what is in the exclusions is not monitored and possibly blocked. Exclusions should only be put in with great circumspection and there should be as few exclusions as possible.

    Threat actors may try to create their own exclusions within various malware to allow them to run other malware and thus extend their control over the device. Therefore, exclusions need to be carefully protected and fully controlled.

    ๐Ÿ“บ Watch my YouTube video bellow on how to enable tamper protection for exclusions in Microsoft Defender for Endpoint ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/8OjuGuGAXiY

    #cswrld #mde #tamperprotection #exclusions #videotutorial

  27. ๐“๐€๐Œ๐๐„๐‘ ๐๐‘๐Ž๐“๐„๐‚๐“๐ˆ๐Ž๐ ๐…๐Ž๐‘ ๐„๐—๐‚๐‹๐”๐’๐ˆ๐Ž๐๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐ƒ๐„๐…๐„๐๐ƒ๐„๐‘ ๐…๐Ž๐‘ ๐„๐๐ƒ๐๐Ž๐ˆ๐๐“

    Antivirus exclusions can do a lot of damage because what is in the exclusions is not monitored and possibly blocked. Exclusions should only be put in with great circumspection and there should be as few exclusions as possible.

    Threat actors may try to create their own exclusions within various malware to allow them to run other malware and thus extend their control over the device. Therefore, exclusions need to be carefully protected and fully controlled.

    ๐Ÿ“บ Watch my YouTube video bellow on how to enable tamper protection for exclusions in Microsoft Defender for Endpoint ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/8OjuGuGAXiY

    #cswrld #mde #tamperprotection #exclusions #videotutorial

  28. ๐“๐€๐Œ๐๐„๐‘ ๐๐‘๐Ž๐“๐„๐‚๐“๐ˆ๐Ž๐ ๐…๐Ž๐‘ ๐„๐—๐‚๐‹๐”๐’๐ˆ๐Ž๐๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐ƒ๐„๐…๐„๐๐ƒ๐„๐‘ ๐…๐Ž๐‘ ๐„๐๐ƒ๐๐Ž๐ˆ๐๐“

    Antivirus exclusions can do a lot of damage because what is in the exclusions is not monitored and possibly blocked. Exclusions should only be put in with great circumspection and there should be as few exclusions as possible.

    Threat actors may try to create their own exclusions within various malware to allow them to run other malware and thus extend their control over the device. Therefore, exclusions need to be carefully protected and fully controlled.

    ๐Ÿ“บ Watch my YouTube video bellow on how to enable tamper protection for exclusions in Microsoft Defender for Endpoint ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/8OjuGuGAXiY

    #cswrld #mde #tamperprotection #exclusions #videotutorial

  29. ๐“๐€๐Œ๐๐„๐‘ ๐๐‘๐Ž๐“๐„๐‚๐“๐ˆ๐Ž๐ ๐…๐Ž๐‘ ๐„๐—๐‚๐‹๐”๐’๐ˆ๐Ž๐๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐ƒ๐„๐…๐„๐๐ƒ๐„๐‘ ๐…๐Ž๐‘ ๐„๐๐ƒ๐๐Ž๐ˆ๐๐“

    Antivirus exclusions can do a lot of damage because what is in the exclusions is not monitored and possibly blocked. Exclusions should only be put in with great circumspection and there should be as few exclusions as possible.

    Threat actors may try to create their own exclusions within various malware to allow them to run other malware and thus extend their control over the device. Therefore, exclusions need to be carefully protected and fully controlled.

    ๐Ÿ“บ Watch my YouTube video bellow on how to enable tamper protection for exclusions in Microsoft Defender for Endpoint ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/8OjuGuGAXiY

    #cswrld #mde #tamperprotection #exclusions #videotutorial

  30. ๐‡๐Ž๐– ๐“๐Ž ๐“๐”๐‘๐ ๐Ž๐ ๐‘๐„๐๐Ž๐‘๐“ ๐Œ๐Ž๐ƒ๐„ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐ƒ๐„๐…๐„๐๐ƒ๐„๐‘ ๐…๐Ž๐‘ ๐„๐๐ƒ๐๐Ž๐ˆ๐๐“ ๐–๐„๐ ๐‚๐Ž๐๐“๐„๐๐“ ๐…๐ˆ๐‹๐“๐„๐‘๐ˆ๐๐†

    Web Content Filtering in Microsoft Defender for Endpoint allows you to filter content based on categories. There are a number of predefined categories to choose from. But first, you need to turn on report mode in Microsoft Defender for Endpoint.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/lg3VhjS564k

    #cybersecurityworld #cswrld #mde #defender #wcf #contentfiltering #report

  31. ๐‡๐Ž๐– ๐“๐Ž ๐€๐‹๐‹๐Ž๐– ๐๐ˆ๐ ๐‘๐„๐’๐„๐“ ๐…๐Ž๐‘ ๐–๐ˆ๐๐ƒ๐Ž๐–๐’ ๐‡๐„๐‹๐‹๐Ž ๐…๐Ž๐‘ ๐๐”๐’๐ˆ๐๐„๐’๐’

    PIN is one of the login options in Windows Hello for Business. If a user forgets their PIN, they can reset it. Windows Hello for Business allows two types of PIN reset:
    - Destructive PIN reset, which deletes everything in the Windows Hello for Business container. This is a forced reset, but it requires no additional configuration and works by default.
    - Non-destructive PIN reset, which requires additional configuration but does not delete the existing Windows Hello for Business container and the keys stored in it.

    ๐Ÿ“บ Watch my YouTube video bellow on how to configure it ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/XdHrajCf-Tk

    #cswrld #videotutorial #pinreset #windowshello #whfb

  32. ๐‡๐Ž๐– ๐“๐Ž ๐€๐‹๐‹๐Ž๐– ๐๐ˆ๐ ๐‘๐„๐’๐„๐“ ๐…๐Ž๐‘ ๐–๐ˆ๐๐ƒ๐Ž๐–๐’ ๐‡๐„๐‹๐‹๐Ž ๐…๐Ž๐‘ ๐๐”๐’๐ˆ๐๐„๐’๐’

    PIN is one of the login options in Windows Hello for Business. If a user forgets their PIN, they can reset it. Windows Hello for Business allows two types of PIN reset:
    - Destructive PIN reset, which deletes everything in the Windows Hello for Business container. This is a forced reset, but it requires no additional configuration and works by default.
    - Non-destructive PIN reset, which requires additional configuration but does not delete the existing Windows Hello for Business container and the keys stored in it.

    ๐Ÿ“บ Watch my YouTube video bellow on how to configure it ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/XdHrajCf-Tk

    #cswrld #videotutorial #pinreset #windowshello #whfb

  33. ๐‡๐Ž๐– ๐“๐Ž ๐€๐‹๐‹๐Ž๐– ๐๐ˆ๐ ๐‘๐„๐’๐„๐“ ๐…๐Ž๐‘ ๐–๐ˆ๐๐ƒ๐Ž๐–๐’ ๐‡๐„๐‹๐‹๐Ž ๐…๐Ž๐‘ ๐๐”๐’๐ˆ๐๐„๐’๐’

    PIN is one of the login options in Windows Hello for Business. If a user forgets their PIN, they can reset it. Windows Hello for Business allows two types of PIN reset:
    - Destructive PIN reset, which deletes everything in the Windows Hello for Business container. This is a forced reset, but it requires no additional configuration and works by default.
    - Non-destructive PIN reset, which requires additional configuration but does not delete the existing Windows Hello for Business container and the keys stored in it.

    ๐Ÿ“บ Watch my YouTube video bellow on how to configure it ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/XdHrajCf-Tk

    #cswrld #videotutorial #pinreset #windowshello #whfb

  34. ๐‡๐Ž๐– ๐“๐Ž ๐€๐‹๐‹๐Ž๐– ๐๐ˆ๐ ๐‘๐„๐’๐„๐“ ๐…๐Ž๐‘ ๐–๐ˆ๐๐ƒ๐Ž๐–๐’ ๐‡๐„๐‹๐‹๐Ž ๐…๐Ž๐‘ ๐๐”๐’๐ˆ๐๐„๐’๐’

    PIN is one of the login options in Windows Hello for Business. If a user forgets their PIN, they can reset it. Windows Hello for Business allows two types of PIN reset:
    - Destructive PIN reset, which deletes everything in the Windows Hello for Business container. This is a forced reset, but it requires no additional configuration and works by default.
    - Non-destructive PIN reset, which requires additional configuration but does not delete the existing Windows Hello for Business container and the keys stored in it.

    ๐Ÿ“บ Watch my YouTube video bellow on how to configure it ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/XdHrajCf-Tk

    #cswrld #videotutorial #pinreset #windowshello #whfb

  35. ๐‡๐Ž๐– ๐‚๐Ž๐๐…๐ˆ๐†๐”๐‘๐„ ๐†๐‘๐€๐ƒ๐”๐€๐‹ ๐‘๐Ž๐‹๐‹๐Ž๐”๐“ ๐๐‘๐Ž๐‚๐„๐’๐’ ๐…๐Ž๐‘ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐ƒ๐„๐…๐„๐๐ƒ๐„๐‘ ๐…๐Ž๐‘ ๐„๐๐ƒ๐๐Ž๐ˆ๐๐“

    Microsoft Defender for Endpoint supports gradual rollout of all update types โ€“ Security Intelligence Updates, Engine Updates, and also Platform Updates.

    ๐Ÿ“บ Watch my YouTube video on how to configure gradual rollout process for the updates ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/DJ6k7BucK7Q

    #cswrld #videotutorial #mde #defender #rollout #updates #microsoft

  36. Microsoft announced via the Message Center message ID MC810406 that support is ending for User Enrollment with Company Portal for iOS devices in September 2024.

    The reason for this change is that in iOS 18 Apple is no longer supporting profile-based user enrollment, which effectively means the end of support just for user enrollment through the Company Portal app. And given that most of the commonly used iOS/iPadOS devices get the update to iOS 18, it probably doesn't make sense to continue support for user enrollment through the Company Portal app.

    ๐Ÿ“บ Watch my YouTube video bellow for details ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/7uBCGNrU2oA

    #cswrld #videotutorial #intune #enrollment #accountdriven #ios #ipados

  37. ๐’๐Œ๐€๐‘๐“ ๐‹๐Ž๐‚๐Š๐Ž๐”๐“๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐„๐๐“๐‘๐€ ๐ˆ๐ƒ

    Smart Lockouts in Microsoft Entra ID help protect Microsoft Entra ID accounts from password attacks. And smart lockouts are also called smart lockouts because they are smart in the meaning of that they should not negatively impact regular users.

    ๐Ÿ“บ Do you want to learn more about Smart Lockouts in Microsoft Entra ID? Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/7V7BJcqb5CM

    #cswrld #smartlockouts #entraid #cybersecurity #videotutorial

  38. ๐ƒ๐ˆ๐…๐…๐„๐‘๐„๐๐‚๐„ ๐๐„๐“๐–๐„๐„๐ ๐„๐๐“๐„๐‘๐๐‘๐ˆ๐’๐„ ๐€๐๐๐’ ๐€๐๐ƒ ๐€๐๐ ๐‘๐„๐†๐ˆ๐’๐“๐‘๐€๐“๐ˆ๐Ž๐๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐„๐๐“๐‘๐€ ๐ˆ๐ƒ

    In Microsoft Entra ID, there are Enterprise Apps and App Registrations. Many administrators donโ€™t know the difference between the two and confuse the two important concepts. But there is a major difference between them, and it is good to know it.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/4ljbruQOOiI

    #cswrld #videotutorial #entraid #enterpriseapps #appregistrations

  39. ๐ƒ๐ˆ๐…๐…๐„๐‘๐„๐๐‚๐„ ๐๐„๐“๐–๐„๐„๐ ๐„๐๐“๐„๐‘๐๐‘๐ˆ๐’๐„ ๐€๐๐๐’ ๐€๐๐ƒ ๐€๐๐ ๐‘๐„๐†๐ˆ๐’๐“๐‘๐€๐“๐ˆ๐Ž๐๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐„๐๐“๐‘๐€ ๐ˆ๐ƒ

    In Microsoft Entra ID, there are Enterprise Apps and App Registrations. Many administrators donโ€™t know the difference between the two and confuse the two important concepts. But there is a major difference between them, and it is good to know it.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/4ljbruQOOiI

    #cswrld #videotutorial #entraid #enterpriseapps #appregistrations

  40. ๐ƒ๐ˆ๐…๐…๐„๐‘๐„๐๐‚๐„ ๐๐„๐“๐–๐„๐„๐ ๐„๐๐“๐„๐‘๐๐‘๐ˆ๐’๐„ ๐€๐๐๐’ ๐€๐๐ƒ ๐€๐๐ ๐‘๐„๐†๐ˆ๐’๐“๐‘๐€๐“๐ˆ๐Ž๐๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐„๐๐“๐‘๐€ ๐ˆ๐ƒ

    In Microsoft Entra ID, there are Enterprise Apps and App Registrations. Many administrators donโ€™t know the difference between the two and confuse the two important concepts. But there is a major difference between them, and it is good to know it.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/4ljbruQOOiI

    #cswrld #videotutorial #entraid #enterpriseapps #appregistrations

  41. ๐ƒ๐ˆ๐…๐…๐„๐‘๐„๐๐‚๐„ ๐๐„๐“๐–๐„๐„๐ ๐„๐๐“๐„๐‘๐๐‘๐ˆ๐’๐„ ๐€๐๐๐’ ๐€๐๐ƒ ๐€๐๐ ๐‘๐„๐†๐ˆ๐’๐“๐‘๐€๐“๐ˆ๐Ž๐๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐„๐๐“๐‘๐€ ๐ˆ๐ƒ

    In Microsoft Entra ID, there are Enterprise Apps and App Registrations. Many administrators donโ€™t know the difference between the two and confuse the two important concepts. But there is a major difference between them, and it is good to know it.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/4ljbruQOOiI

    #cswrld #videotutorial #entraid #enterpriseapps #appregistrations

  42. ๐๐š๐ฌ๐ฌ๐ค๐ž๐ฒ๐ฌ ๐ข๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐€๐ฎ๐ญ๐ก๐ž๐ง๐ญ๐ข๐œ๐š๐ญ๐จ๐ซ ๐š๐ซ๐ž ๐ง๐จ๐ฐ ๐ ๐ž๐ง๐ž๐ซ๐š๐ฅ๐ฅ๐ฒ ๐š๐ฏ๐š๐ข๐ฅ๐š๐›๐ฅ๐ž!

    What does it mean? Users can now enroll passkeys in Microsoft Authenticator for their Microsoft Entra ID accounts in the default authentication methods setting. No need for key restrictions anymore!

    #cswrld #entraid #passkey #authenticator

  43. ๐ƒ๐ˆ๐…๐…๐„๐‘๐„๐๐‚๐„ ๐๐„๐“๐–๐„๐„๐ ๐Œ๐…๐€ ๐€๐๐ƒ ๐๐‡๐ˆ๐’๐‡๐ˆ๐๐†-๐‘๐„๐’๐ˆ๐’๐“๐€๐๐“ ๐Œ๐…๐€

    Phishing is a very popular technique of attackers. They trick the user into entering their credentials on some fraudulent site pretending to be a corporate login page, for example to log into Microsoft Entra ID. The user enters their login credentials there and sends them to the attacker.

    ๐Ÿ“บ Watch my YouTube video where I show the difference between MFA and phishing-resistant MFA ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/NGx6tRKtEFI

    #cswrld #video #mfa #phishing #authentication #phishingresistant #entraid

  44. ๐‡๐Ž๐– ๐“๐Ž ๐ƒ๐„๐๐‹๐Ž๐˜ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐ƒ๐„๐…๐„๐๐ƒ๐„๐‘ ๐…๐Ž๐‘ ๐„๐๐ƒ๐๐Ž๐ˆ๐๐“ ๐Ž๐ ๐ˆ๐Ž๐’ ๐•๐ˆ๐€ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐ˆ๐๐“๐”๐๐„

    Unlike Android, Microsoft Defender for Endpoint can be installed and configured on Apple iOS in a completely zero-touch mode for the end user via Microsoft Intune. The end user does not need to confirm any settings, permissions or anything else on their iOS/iPadOS device afterwards.

    ๐Ÿ“บ Watch my YouTube video bellow for more details ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/QHJCDr49RhY

    #cswrld #intune #videotutorial #mde #defender #ios

  45. ๐‡๐Ž๐– ๐“๐Ž ๐”๐’๐„ ๐“๐„๐Œ๐๐Ž๐‘๐€๐‘๐˜ ๐€๐‚๐‚๐„๐’๐’ ๐๐€๐’๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐„๐๐“๐‘๐€ ๐ˆ๐ƒ

    When an organization uses passwordless authentication, they need to figure out how to onboard users. In other words, you need to solve the chicken/egg problem. If a user has not registered any passwordless authentication method, how can they authenticate to register a passwordless authentication method?

    Temporary Access Pass (TAP) solves this problem.

    ๐Ÿ“บ Watch my YouTube video bellow on how to use Temporary Access Pass in Microsoft Entra ID ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/AqqvMqNcXRU

    #cswrld #entraid #temporaryaccesspass #authentication #tap #videotutorial

  46. ๐‡๐Ž๐– ๐“๐Ž ๐Œ๐€๐๐€๐†๐„ ๐๐‘๐„๐€๐Š-๐†๐‹๐€๐’๐’ ๐€๐‚๐‚๐Ž๐”๐๐“๐’ ๐ˆ๐ ๐Œ๐ˆ๐‚๐‘๐Ž๐’๐Ž๐…๐“ ๐„๐๐“๐‘๐€ ๐ˆ๐ƒ

    When you start tightening the requirements for access to your corporate cloud, it can be easy to accidentally lock yourself out and cut yourself off from access to the admin interface.

    Alternatively, some part of Microsoft Entra ID may fail. For example, there have been a couple of times in the past where multi-factor authentication in Microsoft Entra ID has had a failure and you couldnโ€™t authenticate.

    That is why you need break-glass accounts.

    ๐Ÿ“บ Watch my YouTube video bellow on how to manage break-glass accounts ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/Q2vicBapspg

    #cswrld #breakglass #entraid #accountmanagement

  47. ๐‡๐Ž๐– ๐“๐Ž ๐‘๐„๐’๐„๐“ ๐ƒ๐Ž๐Œ๐€๐ˆ๐ ๐€๐ƒ๐Œ๐ˆ๐ ๐๐€๐’๐’๐–๐Ž๐‘๐ƒ ๐Ž๐ ๐€๐ ๐€๐™๐”๐‘๐„ ๐•๐Œ

    There are cases when you forget the local admin password of a machine. Or worse, someone changes your password, such as a threat actor in a cybersecurity incident. This happens, and Iโ€™ve been there a few times, where a threat actor started resetting all the adminsโ€™ passwords to effectively cut them off so they couldnโ€™t stop the ongoing attack.

    With Azure VMs, it is possible to reset passwords directly from the Azure portal. Either by using a PowerShell script or by directly entering a command from the Azure portal. This works for both a local admin account and also a domain admin account if the VM in question is a domain controller.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/Lmug9xI3h24

    #cswrld #videotutorial #azurevm #admin #password #reset

  48. Authentication Strengths in Microsoft Entra ID allows you to granularly define authentication requirements for different situations.

    Before authentication strengths were available, authentication requirements were defined globally for the entire tenant, and then conditional access policies could just say that multi-factor authentication was required, for example. But it was not possible to define what type of multifactor authentication was required. So anything that was available globally could be used by all users in all situations.

    Which was not optimal. There are situations where a less secure authentication method like SMS or TOTP might be enough. But there are situations where we only want to use very secure authentication methods like FIDO2 when someone is logging into a global admin account for example.

    Such granularity was not possible before. If SMS authentication was enabled for a given tenant, even the global admin could use SMS for authentication.

    Watch my YouTube video bellow for more details ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/8sIX19pbdho

    #cswrld #cybersecurity #entraid #authentication #authenticationstrength #conditionalaccess

  49. HOW TO BLOCK TOP-LEVEL DOMAINS VIA MICROSOFT INTUNE

    There are multiple ways to block specific domains. The easiest way to do this is within Microsoft Defender for Endpoint using Indicators. However, Indicators does not allow you to block top level domains (TLDs). But what if you want to block the entire top level domain, for example everything on the .ru domain?

    In that case, you can use firewall rules in Microsoft Intune.

    ๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/fRDlsPh1C0g

    #cswrld #intune #firewall #domainblock

  50. RECOMMENDED CONDITIONAL ACCESS POLICIES IN MICROSOFT ENTRA ID

    Conditional access policies in Microsoft Entra ID allow for very granular security management. The problem is that organizations usually do not have conditional access policies properly defined. There tend to be blind spots, policies donโ€™t cover all applications, all users, and all scenarios.

    Many organizations have conditional access policies defined but do not think about them properly. This is because they often target only specific applications or specific users. And when I ask them why the MFA policy only targets Office 365 for example, they tell me they donโ€™t use anything else. Or when I ask why they only target one group of users, they tell me that other users donโ€™t use cloud services.

    But thatโ€™s just the wrong approach. You are not primarily protecting the services from your users, but from attackers. And just because you donโ€™t use anything other than Office 365 doesnโ€™t mean an attacker will not use it. Or just because some users donโ€™t use cloud services doesnโ€™t mean those accounts canโ€™t be exploited by an attacker. If those apps or accounts exist in the cloud, they need to be protected whether regular users use them or not. Attackers are looking for the most insecure places, the weakest links.

    ๐Ÿ“บ Watch my YouTube video bellow where I talk about the conditional access policies that I recommend implementing ๐Ÿ‘‡ ๐Ÿ‘‡
    youtu.be/LtIgFBDJzXs

    #cswrld #videotutorial #entraid #conditionalaccess #recommendation