Granular Access to GenAI Apps with Defender for Cloud Apps
Microsoft Defender for Cloud Apps can Add an action to a Discovered app to allow [Sanction] or block [Unsanction] access to discovered generative A...
Read Article →Discover the latest insights, best practices, and security research related to Microsoft Defender for Cloud (formerly Azure Security Center).
Microsoft Defender for Cloud Apps can Add an action to a Discovered app to allow [Sanction] or block [Unsanction] access to discovered generative A...
Read Article →Learn how to detect when a Global Admin silently elevates their access across all Azure subscriptions using Entra ID, Log Analytics, Azure Monitor,...
Read Article →With the evolution of AI, especially Generative AI [or GenAI], CISO get or have a lot of questions on how to deal with the safety and compliance of...
Read Article →What is Defender for Cloud Apps. Defender for Cloud Apps aims to tackle the security problems that come with the increasing use of SaaS application...
Read Article →Artificial intelligence (AI) tools and Large Language Models (LLM) behind those tools have become a talking point and for some, the new Google sear...
Read Article →Recently, Microsoft announced a new protection plan for AI workloads as part of the Microsoft Defender for Cloud suite. AI security is becoming mor...
Read Article →Last Updated on January 16, 2025 by Michael Morten Sonne Introduction Microsoft Defender for Cloud Apps (MDA) has… The post Microsoft Defende...
Read Article →Last Updated on December 19, 2024 by Michael Morten Sonne Intoduction The principle of Zero Trust emphasizes that… The post Microsoft Defende...
Read Article →Microsoft Defender for Cloud Apps is one of the many puzzle pieces of the Microsoft XDR solution that helps you to secure your corporate environmen...
Read Article →Last Updated on May 2, 2024 by Michael Morten Sonne Intoduction Resetting Microsoft Defender for Cloud Configuration Are… The post Defender f...
Read Article →Last Updated on April 27, 2024 by Michael Morten Sonne Intoduction In the ever-evolving landscape of cloud-based infrastructures,… The post D...
Read Article →With the use of Defender for Cloud Apps in combination with Defender for Endpoint it is possible to block unsanctioned apps, the block of apps is p...
Read Article →Check out this article via web browser: Step-up authentication with Defender for Cloud Apps and Authentication Context In this post, I will show yo...
Read Article →Intro Up until now, onboarding non-Azure servers to Defender for Servers required Azure Arc as a mandatory pre-requisite. With this new release, Mi...
Read Article →Intro This blog will be about an issue I bumped into when deploying one of the enhanced protection features in defender for cloud. The enhanced fea...
Read Article →Introduction I decided to start a blog series about the Advanced protection features which are included in the Defender for Servers Plan 2 provided...
Read Article →Microsoft Defender for Cloud is a cloud-native application protection platform (CNAPP). Defender for Cloud contains a large set of features and cap...
Read Article →Background Recently, I was asked to build a simple reporting-script, which integrates data from Microsoft Defender for Cloud and Azure ... Read more
Read Article →You can find my previous blog posts on my medium site. Block the automated onboarding of mde without disabling the mde integration: https://medium....
Read Article →Microsoft’s Defender Vulnerability Management is a built-in module in Microsoft Defender for Endpoint that can: If you’ve enabled ...
Read Article →File Integrity Monitoring (FIM) is a technology that monitors and detects file changes that could be indicative of a cyberattack. File Integri...
Read Article →It is time for part 3C of the ultimate Microsoft Defender for Endpoint (MDE) series. After Part 3B (Onboard Defender for Endpoint using Defender fo...
Read Article →It is time for part 3B of the ultimate Microsoft Defender for Endpoint (MDE) series. After Part 3A (Onboard Defender for Endpoint using Microsoft I...
Read Article →Defender for Cloud was since the release based on the Microsoft Monitoring Agent (MMA). Since august 2022 it is possible to auto-deploy the Azure M...
Read Article →The new Defender for Endpoint unified agent is generally available for some time (since April 11th, 2022. The new unified Microsoft Defender for En...
Read Article →Microsoft Defender for Endpoint deployment is possible based on multiple deployment mechanisms. Microsoft Defender for Cloud (previous Azure Defend...
Read Article →The basics Let’s start this article with some basic cybersecurity terminology. Security hygiene, or cyber hygiene, is a general term used to ...
Read Article →Since the last years, there is a large increase in cybercriminals attempting to run attacks by exploiting the login credentials. With the current w...
Read Article →Azure Security Center included integration with Azure Workbooks. With the new Workbooks feature is it possible to build custom reports. From Azure ...
Read Article →