Active DirectoryCyber SecurityMicrosoft DefenderMicrosoft TechnologiesWindows Server

Microsoft Advanced Threat Analytics (ATA) – Part 02

In previous part of this blog post I have explain what is Microsoft Advanced Threat Analytics (ATA) and what it is capable of. If you not read it yet you can find it in here http://www.rebeladmin.com/2017/05/microsoft-advanced-threat-analytics-ata-part-01/ In this part of the post I am going to demonstrate how we can setup ATA. Before we start I like to explain about the demo environment we going…
Read more

Agentic AI Security – Part 2: Threat Modeling

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Azure servicesCyber SecurityMicrosoft Technologies

Getting Started with Azure Security Center

What is Azure Security Center ? Whenever we talk about cloud, one of the main questions still comes from customers is “what about security?“. Azure cloud built by using SDL (Security Development Lifecycle) from initial planning to product launch. It’s continues uses different measurements, safeguards to protect the infrastructures and customer data. You can find details about azure security…
Read more

Agentic AI Security – Part 2: Threat Modeling

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)