Hi All, There has been a change in the Defender for Office 365 Anti-Malware Policy notifications. Summary: internal and external Notifications are gone and Action is changed only to "Quarantine" or "Reject" (with NDR).
Not much to see on the M365 Roadmap But there are more Details in the M365 Admin Portal in Message Center
In the M365 Defender Portal you can review the Settings
https://security.microsoft.com/antimalwarev2 Internal- and ExternalSendernotifcations are gone.
Hi All, Azure Active Directory Sign-in Logs is really helpful, when analyzing Sign-in Problems. But it also can be very helpful, when analyzing the overall Sign-ins or looking out for strange behavior. One of the Tips would be th Filter for Location and use the CountryCode and Status of Sucess
I have set up Azure Active Directory Diagnostics to save the Sign-In Logs to a LogAnalytics Workspace. Here you can Query the Logs with KQL.
Hi All, I've been using Windows Hello for Busindess with Face recocnition since a long time on my Surface Laptop 3. This week it stopped working suddently with the Message "Couldn't turn on the Camera". Even the Driver and Firmware Update did not help. The Camera App is working just fine. Also in Teams the Camera works fine.
In the End i remved the two Cameras in the Device Manager (devmgmt.
Hi All, In this Blog Article, i want to talk about how to protect your Azure SQL Databases with Firewall Rules at Server or Database level. Azure SQL Database and Azure Synapse IP firewall rules
https://docs.microsoft.com/en-us/azure/azure-sql/database/firewall-configure
The Server Level you can find on your Server Object
You can also find this when query the master Database --Database: master
SELECT * FROM sys.firewall_rules
At the Database level use this sp_set_firewall_rule (Azure SQL Database)
Hi All, In mid January Microsoft Announced, that the Microsoft Defender for Endpoint Plan 1 will be now Included in M365 E3/A3 Licenses.
Microsoft Defender for Endpoint Plan 1 Now Included in M365 E3/A3 Licenses
https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-for-endpoint-plan-1-now-included-in-m365-e3/ba-p/3060639
My Account has a M365 E3 License and i can see "Microsoft Defender for Endpoint Plan 1" has been assigned.
Overview of Microsoft Defender for Endpoint Plan 1
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/defender-endpoint-plan-1?view=o365-worldwide
I went for the Documentation and Set it up in Micrsosoft Endpoint Manager.
Hi All, A customer recently could not remember the Password of the PFX File. I was curious and searched for a PFX Password Recovery Tool. I created a PFX with a Password 9 chars uppercase chars lowercase cars numbersspecial caracter Certificate Password Recovery Tool https://7thzero.com/blog/certificate-password-recovery-tool
I startet the Tool on Friday 14 January 23:41:41
After about 9 Days there where tested 569'890'000 diffrent combinations. And we're still at 5 Characters.
Hi All, I am pretty sure, i did not read anything about this refresh of Explorer in Microsoft 365 Defender (Security Admin Center) ttps://security.microsoft.com/threatexplorer
It has also been renamed from "Threat Explorer" just to "Explorer". What i absolutely love about this, is that the default now points to "All email" instead of "Malware" like before.
You sill have a lot of Filtering possibilities
And also the Chart view has diffrent Filtering options
Hallo zusammen, Im folgenden Artikel vom Azure Active Directory Identity Blog wird nochmals darauf hingewiesen, dass ab 31. Januar keine TLS 1.0 und TLS 1.1 Verbindungen mehr möglich sein werden
Act fast to secure your infrastructure by moving to TLS 1.2!
https://techcommunity.microsoft.com/t5/azure-active-directory-identity/act-fast-to-secure-your-infrastructure-by-moving-to-tls-1-2/ba-p/2967457
Am besten kann man das über ein KQL Query in einem Azure Log Analytics Workspace machen. Wie man so einen einrichtet habe ich bereits hier gebloggt https://blog.icewolf.ch/archive/2020/03/17/integrate-azure-ad-signins-into-azure-log-analytics-workspace.aspx Ihr braucht folgendes KQL Query: SigninLogs | where TimeGenerated > ago(30d)
Hallo zusammen, Ich bin kürzlich über den folgenden Blog Artikel gestolpert: https://c7solutions.com/2021/10/adding-location-to-azure-ad-mfa
Ich habe das in meinem Tenant durchgespielt. In Azure AD Security > Authentication Methods > Microsoft Authenticator auswählen.
Dabei ist es wichtig, dass eine Gruppe für den Authenticator aktiviert ist.
Holt man sich nun die Einstellungen via Graph Explorer BETA API. Dazu benötigt man die "Policy.ReadWrite.AuthenticationMethod" Berechtigungen. Die kann man allenfalls im "Modify Permissions (Preview)" Tab gewähren. https://graph.microsoft.com/beta/policies/authenticationMethodsPolicy/authenticationMethodConfigurations/microsoftAuthenticator
Hallo zusammen,
Heute gab es einen ziemlichen Wirbel, weil Microsoft Passwordless für Microsoft Accounts angekündigt hat. Dabei wird das Passwort komplett entfernt.
Introducing password removal for Microsoft Accounts https://techcommunity.microsoft.com/t5/azure-active-directory-identity/introducing-password-removal-for-microsoft-accounts/ba-p/2747280 Zuerst meldet man sich bei seinem Microsoft Account an https://account.live.com. Unter Sicherheit > Zusätzliche Sicherheitsoptionen können die Einstellungen verwaltet werden. Als erstes aktiviere ich die Zweifaktorautentifizierung
Nun startet ein Wizard
Den Wiederherstellungscode sollte man an einem sicheren Ort aufbewahren. Vorzugsweise ein Passwortmanager.