Correlating Defender for Endpoint and Global Secure Access Logs

Introduction If you are working with Microsoft security solutions, you might have heard of the new kid on the block called Microsoft Global Secure Access. Being a blue teamer myself, I asked myself...
Read full article →