New Study Reveals Top Concerns for Microsoft Platform Management

Managing Microsoft environments can be complex and time-consuming, but they provide critical services to maintain business continuity and allow access to employees to keep them productive. Whether on-premises Active Directory, hybrid, or Microsoft 365 (formerly Office 365), IT executives must balance efficiency while maintaining Active Directory security, such as managing user and group permissions, and […]

NSA Discovers New Critical Exchange Server Vulnerabilities

Microsoft released three new patches for its Exchange Server software on Tuesday after the National Security Agency (NSA) alerted the company to a fresh batch of critical vulnerabilities. All discovered flaws, four in total, lead to remote code execution on a vulnerable machine. “We urge all owners and operators of Microsoft Exchange Servers to apply […]

Disgruntled IT Contractor in Jail | Protect Against Insider Threats

Large-scale internal security breaches are becoming increasingly more popular, costing companies millions of dollars each year. The sum of this loss comes from the financial damages of the breach itself and, in some cases more importantly, damage to the company’s reputation, translating to big dollars off the company’s bottom line. A recent judgement serves as […]

The #1 Way to Prevent Insider Threats

Protecting Your Critical Assets with Insider Threat Prevention Data Breaches Happen Data security is nothing new. Where there is sensitive information, there are those who seek to access, steal, and misuse it, mostly for financial gain. The unfortunate truth about malicious activities is that a third of all data breaches are perpetrated by someone from […]

Security Budgets During COVID-19 – A New Infographic

When lockdown protocols kicked in due to COVID-19’s rapid spread all around the world, teams across many industries migrated to a work-from-home normal. However, with remote work comes new security risks—like employees accessing sensitive company assets through personal devices and home wifi. How have security budgets changed as a result of new and broadening security […]

What’s the difference between Microsoft user-based MFA and Azure MFA?

  If your business relies on cloud computing services, it’s essential that you set security defaults that include multi–factor authentication (MFA) to protect your resources. Protecting your user accounts during a sign in event is vital for securing accounts that require privileged access to data and other resources in the cloud. MFA has become the standard in electronic […]

Azure Sentinel Solution to Find Vulnerable Netlogon Clients

  Microsoft is addressing a privilege vulnerability in a two-part rollout by modifying how Netlogon handles the usage of Netlogon secure channels.   Phase one, deployment, began on Aug 11. In this phase, secure Remote ProtoCol (RPC) is enforced for machine, trust and domain controller accounts. This phase also includes a new group policy object (GPO) and a […]

AMSI and Machine Learning Help to Stop Active Directory Attacks and Other Post-exploitation Behavior

  Last week, Microsoft Defender ATP Research team blogged about Antimalware Scan Interface (AMSI)-driven behavior-based machine learning protections. AMSI helps security software detect malicious scripts by revealing script content and behavior. AMSI integrates with scripting engines on Windows 10 as well as Office 365 VBA to provide insights into the execution of PowerShell, WMI, VBScript, JavaScript, and Office VBA macros. So basically, AMSI’s […]