MDI-configurator v1.0 is out !
A user-friendly graphical interface for managing Microsoft Defender for Identity (MDI) configurations using PowerShell. This PowerShell script prov...
Read Article →Discover the latest insights, best practices, and security research related to Microsoft Defender for Identity.
A user-friendly graphical interface for managing Microsoft Defender for Identity (MDI) configurations using PowerShell. This PowerShell script prov...
Read Article →Defender for Identity — Automatic Windows event auditing configurationOne of the most common issues we encounter during Defender for Identity asses...
Read Article →Identity leverages Secure Score with twenty-seven recommended actions. In a series of blog posts, I will go through all twenty-seven recommended ac...
Read Article →Identity leverages Secure Score with twenty-seven recommended actions. In a series of blog posts, I will go through all twenty-seven recommended ac...
Read Article →Identity leverages Secure Score with twenty-seven recommended actions. In a series of blog posts, I will go through all twenty-seven recommended ac...
Read Article →Identity leverages Secure Score with twenty-seven recommended actions. In a series of blog posts, I will go through all twenty-seven recommended ac...
Read Article →Identity leverages Secure Score with twenty-seven recommended actions. In a series of blog posts, I will go through all twenty-seven recommended ac...
Read Article →Identity leverages Secure Score with twenty-seven recommended actions. In a series of blog posts, I will go through all twenty-seven recommended ac...
Read Article →Identity leverages Secure Score with twenty-seven recommended actions. In a series of blog posts, I will go through all twenty-seven recommended ac...
Read Article →Identity leverages Secure Score with twenty-seven recommended actions. In a series of blog posts, I will go through all twenty-seven recommended ac...
Read Article →Microsoft Defender for Identity identifies users flagged as sensitive and provides additional insights, such as whether these accounts are inactive...
Read Article →Identity leverages Secure Score with twenty-seven recommended actions. In a series of blog posts, I will go through all twenty-seven recommended ac...
Read Article →Microsoft Secure Score helps organizations get insights into security posture based on security-related measurements. Microsoft Defender for Identi...
Read Article →Last Updated on April 13, 2025 by Michael Morten Sonne Introduction Service accounts are often the unsung heroes… The post Defender for Ident...
Read Article →Last Updated on January 21, 2025 by Michael Morten Sonne Introduction Here at my blog, im committed to… The post Microsoft Defender for Ident...
Read Article →Last Updated on June 2, 2025 by Michael Morten Sonne Intoduction What is Microsoft Defender for Identity Microsoft… The post Microsoft Defend...
Read Article →Last Updated on September 28, 2024 by Michael Morten Sonne Introduction Microsoft Defender for Identity (MDI) is designed… The post Microsoft...
Read Article →Introduction Defender for Identity is a very important sensor to detect threats in an Active Directory environment. Therefore, it is important to m...
Read Article →Last Updated on February 24, 2024 by Michael Morten Sonne Intoduction Introducing the Updated Advanced Settings Page for… The post Microsoft ...
Read Article →Last Updated on September 26, 2024 by Michael Morten Sonne Intoduction What is Defender for Identity Microsoft Defender… The post Microsoft D...
Read Article →Deployment guide for Microsoft Defender for Identity.
Read Article →Microsoft Defender for Identity (MDI) has a built-in process that handles continues updates. I had a situation, where this process ... Read more
Read Article →Microsoft Defender for Identity MDI (previously called Azure Advanced Threat Protection or Azure ATP) is a Microsoft security solution that capture...
Read Article →Microsoft announced recently the public availability of the native response actions in Defender for Identity. Security teams can now directly impac...
Read Article →Lateral movement refers to the techniques that a cyber attacker uses, after gaining initial access, to move deeper into a network in search of sens...
Read Article →