- 78
- 92 279
Threatscape
Ireland
Приєднався 5 лют 2021
We are the trusted security partner of enterprise clients who rely on us to secure critical IT assets in over 100 countries around the world. We are one of few cybersecurity companies with a separate Microsoft Security Practice. Our expertise in this space is reflected in our status as the global Microsoft Security & Compliance Partner of the Year for 2020.
Our mission is to create a secure and certain future for our clients. Keeping them protected so that they can go about their business is how we know we’re delivering on our promise. To do this, our expert team of engineers use their skills alongside best-in-class solutions to protect, detect and respond to the growing threat of cyberattacks.
Through this channel we aim to deliver valuable content to help you better secure your business from cyber threats. Learn about topics such as endpoint security, cloud security, ransomware, identity protection, network security and more.
To find out more about us, visit www.threatscape.com
Our mission is to create a secure and certain future for our clients. Keeping them protected so that they can go about their business is how we know we’re delivering on our promise. To do this, our expert team of engineers use their skills alongside best-in-class solutions to protect, detect and respond to the growing threat of cyberattacks.
Through this channel we aim to deliver valuable content to help you better secure your business from cyber threats. Learn about topics such as endpoint security, cloud security, ransomware, identity protection, network security and more.
To find out more about us, visit www.threatscape.com
Why Your Defender for Endpoint Setup Isn’t Working [5 Critical Mistakes]
🚨 Are you making these 5 common Defender for Endpoint mistakes? 🚨
Defender for Endpoint is an incredibly powerful tool, but if you're not using it correctly, it could backfire. From misconfigured security policies to overlooking live response and passive mode settings, these mistakes could leave your organisation vulnerable to attacks.
In our latest video, we break down 5 critical Defender for Endpoint mistakes that you need to avoid to ensure you're getting the full benefit from this tool while keeping your systems secure.
🔍 What’s covered:
Security Policy Pitfalls: Are your settings optimised?
Live Response Best Practices: Don't overlook this powerful tool!
Passive Mode Confusion: What happens when third-party protection takes the wheel?
💡 Why watch?
Avoid costly security lapses.
Learn how to configure settings effectively.
Get actionable advice on securing your endpoints.
#Cybersecurity #DefenderForEndpoint #XDR #SecurityBestPractices #EndpointProtection
Website: www.threatscape.com/
Linkedin: www.linkedin.com/company/942506
Email Address : info@threatscape.com
Defender for Endpoint is an incredibly powerful tool, but if you're not using it correctly, it could backfire. From misconfigured security policies to overlooking live response and passive mode settings, these mistakes could leave your organisation vulnerable to attacks.
In our latest video, we break down 5 critical Defender for Endpoint mistakes that you need to avoid to ensure you're getting the full benefit from this tool while keeping your systems secure.
🔍 What’s covered:
Security Policy Pitfalls: Are your settings optimised?
Live Response Best Practices: Don't overlook this powerful tool!
Passive Mode Confusion: What happens when third-party protection takes the wheel?
💡 Why watch?
Avoid costly security lapses.
Learn how to configure settings effectively.
Get actionable advice on securing your endpoints.
#Cybersecurity #DefenderForEndpoint #XDR #SecurityBestPractices #EndpointProtection
Website: www.threatscape.com/
Linkedin: www.linkedin.com/company/942506
Email Address : info@threatscape.com
Переглядів: 753
Відео
What You’re Doing Wrong with Identity Governance [Practical Tips]
Переглядів 54221 день тому
🔒 Struggling to streamline identity management and enhance security? In this episode, Threatscape MVP Ru Campbell and Jef Kazimer dive into practical tips for simplifying identity governance, enforcing least privilege, and boosting overall security. Learn how Entra ID Governance can revolutionise your approach to: 🌟 Streamlining identity management processes. 🔐 Enforcing least privilege with ea...
Cybersecurity Expert Reacts To M365 Defaults [Detailed Breakdown]
Переглядів 91928 днів тому
How secure is your Microsoft 365 tenant out of the box? In this video, we dive deep into Microsoft's Secure Future Initiative (SFI) and examine the default security settings of Microsoft 365. Are they really "secure by default"? Let’s find out! 📌 Key Highlights: Overview of Microsoft’s SFI: Secure by design, default, and operations. What works and what doesn’t in default MFA and Conditional Acc...
Why Your Entra ID MFA Is Failing You [5 Major Pitfalls]
Переглядів 1,5 тис.Місяць тому
Top Mistakes in ENTRA ID MFA: Key Takeaways Avoid common pitfalls in ENTRA ID Multi-Factor Authentication (MFA) to enhance your tenant's security. Here are the key mistakes to watch out for: Confusing MFA Registration Policies and Campaigns: Understand the difference between MFA registration policies, which require specific licensing and force users to sign up for any supported MFA method, and ...
How Microsoft Graph API Simplifies Admin Tasks [Expert Insights]
Переглядів 1,1 тис.Місяць тому
Discover the untapped power of Microsoft Graph API! Learn how it revolutionises M365 automation for sysadmins and developers alike, from managing conditional access to enhancing email security. Unlock the full potential of Microsoft Graph API in this deep dive with Joe Hosty, a Microsoft security automation expert. Whether you’re a sysadmin streamlining conditional access or a developer buildin...
Why Privileged Identity Management Falls Short [5 Key PIM Mistakes]
Переглядів 1,3 тис.Місяць тому
Are your Microsoft 365 Privileged Identity Management (PIM) settings leaving you exposed? Discover the 5 common mistakes that could be putting your organisation at risk-and how to fix them. In this video, we dive into Microsoft Privileged Identity Management (PIM) to uncover critical misconfigurations that could compromise your security. As a Microsoft Security Partner of the Year, we’ve identi...
How Behavioural Analytics Defends Against AI Cyber Attacks?
Переглядів 1202 місяці тому
AI-powered Email Attacks? Learn How an Ad Tech Mindset Can Secure Your Business Facing complex email threats and AI-driven attacks? Discover how an Ad Tech approach using behavioural analytics can help you protect against evolving cyber threats. ⬇️ With businesses facing increasingly sophisticated email security challenges, attackers are now leveraging AI to bypass traditional defences. In this...
How AI is Changing Microsoft Purview [2024 Update]
Переглядів 8432 місяці тому
In this video, we dive deep into how AI, Copilot, and Purview work together to secure sensitive data, prevent insider threats, and streamline compliance. Learn: - How Microsoft's Copilot enhances security with AI. - The Secure by Default initiative and what it means for your organisation. - Practical tips for deploying sensitivity labels and insider risk management. - Discover why Purview is an...
Why Your Defender Antivirus Strategy Is Failing [5 Critical Misconfigurations]
Переглядів 3,7 тис.2 місяці тому
Are you making these big mistakes in your Defender Antivirus strategy? In this video, we highlight the top 5 misconfigurations that can create gaps in your protection. Learn how to optimise your settings and implement effective strategies to safeguard your system against threats. 00:00 Intro 00:31 Mistake No 1 03:45 Mistake No 2 05:26 Mistake No 3 08:03 Mistake No 4 09:25 Mistake No 5 13:13 Bon...
How Automation is Redefining Microsoft Security [DevSecOps Insights]
Переглядів 6793 місяці тому
In this episode, William breaks down all things automation and Microsoft security! We cover essential topics like DevSecOps, managed identities, and Azure Defender for Cloud, showing how these integrate seamlessly with Azure DevOps to build more secure apps. We also dive into the Microsoft 365 Security and Compliance user group that William and I co-organise every month, sharing tips and best p...
Why Your Entra ID Protection Strategy Is Weak [5 Critical Mistakes]
Переглядів 1,6 тис.3 місяці тому
Are you making these common mistakes in your Entra ID Protection strategy? In this video, we highlight the top 5 most frequent errors that can compromise your security. Learn how to strengthen your defences and avoid these costly pitfalls to keep your sensitive information safe. 00:00 Intro 00:20 Mistake 1 01:39 Mistake 2 02:58 MIstake 3 04:14 MIstake 4 05:06 Mistake 5 Website: www.threatscape....
Why Collaboration is Key in Cyber Security?
Переглядів 1133 місяці тому
Join Paul O'Sullivan on Threat Cast as he talks to Chris Gunner, Group CISO of Pepper Financial Services Group. Chris shares his unique journey from astrophysics to cybersecurity, discussing how he's applied his skills to navigate the evolving landscape of cyber threats. Discover how he's rethinking traditional cybersecurity approaches to prioritise business success while maintaining security. ...
Threat Hunting Explained By Microsoft's Elite Hunter
Переглядів 1,6 тис.4 місяці тому
In this episode of ThreatCast , Ru and Matt dive deep into the world of Microsoft GHOST, a specialised team focused on cybersecurity hunting within Microsoft. Matt explains the role of the DoD (Detection and Response Team), their work on incident response for customers dealing with ransomware and nation-state attacks, and how Microsoft telemetry plays a crucial role in detecting and mitigating ...
How To Secure BYOD Devices Using Conditional Access?
Переглядів 2,9 тис.4 місяці тому
This video dives into how to use Conditional Access in Microsoft 365 to mitigate security risks associated with Bring Your Own Device (BYoD) scenarios. What You'll Learn: The security risks of BYoD with Microsoft 365 (downloading OneDrive/SharePoint content, etc.) How Conditional Access policies can be used to address these risks Step-by-step walkthrough of configuring Conditional Access polici...
How to Successfully Implement Digital Transformation?
Переглядів 1264 місяці тому
Digital Transformation: A Deep Dive with Paul Conroy Join us as we delve into the world of digital transformation with industry expert Paul Conroy. With over 30 years of experience, Paul shares insights on the challenges, opportunities, and best practices for businesses navigating this transformative era. Discover how digital transformation is reshaping industries, from banking to aviation, and...
How Hackers Bypass MFA? [2 Ways To Stop Them]
Переглядів 9 тис.4 місяці тому
How Hackers Bypass MFA? [2 Ways To Stop Them]
How Can I Get the Most Out of Purview eDiscovery?
Переглядів 4814 місяці тому
How Can I Get the Most Out of Purview eDiscovery?
How to Setup Temporary Access Passes? [Passwordless Authentication Fixed]
Переглядів 2,1 тис.5 місяців тому
How to Setup Temporary Access Passes? [Passwordless Authentication Fixed]
How to Win Over Your Board for Cybersecurity Buy-In
Переглядів 1465 місяців тому
How to Win Over Your Board for Cybersecurity Buy-In
Why Your Conditional Access Policies Are Failing [5 Major Pitfalls]
Переглядів 5 тис.5 місяців тому
Why Your Conditional Access Policies Are Failing [5 Major Pitfalls]
How to Secure Local Admins with Intune EPM
Переглядів 5975 місяців тому
How to Secure Local Admins with Intune EPM
Christian Toon on Compliance, Communication, and AI in Cyber
Переглядів 1476 місяців тому
Christian Toon on Compliance, Communication, and AI in Cyber
How is Entra Conditional Access Central to Securing M365?
Переглядів 1,3 тис.6 місяців тому
How is Entra Conditional Access Central to Securing M365?
How to Get Your Board to Buy into Cybersecurity
Переглядів 1307 місяців тому
How to Get Your Board to Buy into Cybersecurity
How To Simulate Threats and Attacks in Microsoft Defender XDR
Переглядів 8187 місяців тому
How To Simulate Threats and Attacks in Microsoft Defender XDR
Do Not Make This Mistake In Your Cybersecurity Career
Переглядів 787 місяців тому
Do Not Make This Mistake In Your Cybersecurity Career
Where Do Certifications End & Your Cyber Security Journey Begin?
Переглядів 4738 місяців тому
Where Do Certifications End & Your Cyber Security Journey Begin?
Cyber Security Trends 2024 | AI, Ransomware, Identity Security & more
Переглядів 2708 місяців тому
Cyber Security Trends 2024 | AI, Ransomware, Identity Security & more
Email Security & Productivity : Don't Compromise | Abnormal
Переглядів 150Рік тому
Email Security & Productivity : Don't Compromise | Abnormal
10 Symantec Security Myths: Forget What You Thought You Knew
Переглядів 44Рік тому
10 Symantec Security Myths: Forget What You Thought You Knew
I have a defender for endpoint P2 license but can't even see the endpoints option on the left hand side of the defender portal. Are any other licenses required?
You should check if you have necessary privileges to see full capabilities of MDE portal. Roles with less privileges does not allow you to view everything there.
microsoft employee uses xbox 360 mic hell yeah
How to go the Application Access View
The main problem to me is that tamper protection doesn't prevent users to exclude folders from AV scans.
I think there is a setting called disable admin merge to avoid that.
yesss WTH?? I CAN NOT access my emails
Very helpful video! Thanks as always
Awesome work guys. I have your KQL book, love it! Lots of work and good content!
really love the video its so informative
Yo Magneto! Wassup
Great video Ru! Thank you for going through out of the box security defaults.
Great video Ru - while secure by default is a great concept it will always be contextual. What i would really like to see is an onboarding permissions run through rather than have defaults at all. Dont let someone create a tenant until they review and set a default of their own before the tenant spins up. I know easy create is great, but if an admin/user was asked to provide a bunch of config before tenant creation in the form of some sort of submission form or flow through window - a) they would be aware of what the current setting is and that it exists in the first place and b) they might consider looking for advice to get it secure from get go.
Default tenant config needs to span from Azure Free all the way through to E5, hence favouring Security Defaults rather than CA, and as you said, they aren’t compatible. I agree though, I’d much rather see MFA for all users, MFA for Admins and block Legacy Auth called out as specific Conditional Access Policies if your licensing supported it. Email authentication- from memory- is only available for Self Service Password Reset- not as a MFA challenge (even though it’s listed in Auth Methods). I could be wrong, that mightn’t be the default. Great content. Keep it up!
Correct, agree, and thanks! Though I don’t like email for SSPR either as you can’t verify the security of the unmanaged mailbox. But, accept the trade off can be worth it (eg coupled with other methods enforced during reset). IMO, CA, or at least some conditions and controls, should trickle down to Entra ID Free. As time goes and what’s considered adequate security does too, that’s my hope (won’t bet the farm on it though).
Magneto relogin please
Yes please to a conditional access design video. We are just planning out a persona based approach as I have seen you use this in other videos
Working on it!
@ nice one!
I have come across an issue in the past with the last mistake. If you're trusting MFA from other tenants and they have a type of authentication method used that you do not allow in your own tenant this will fail, or at least has failed for us in the past. It will show in the audit logs that the MFA was a success but that the user failed to authenticate so we ended up removing this option and forcing users to register the auth app when accessing our application.
Great video!🎉 Can you please help me with the following? We have some users having complaints about the fact the Microsoft Teams, Outlook apps etc on their smartphones are randomly logged out. I have seen some errorcodes in Entra like 70045, 500121 and 70044. I think my users shouldn't get prompted to use MFA when opening these apps on their devices. Its just that when not authenticating the devices aren't syncing new mail, messages etc. What is best practise? We are not enforcing app protection policies (yet)
Thinking out loud - what are the Sign In Frequency settings in CA?
@rucam365 Yep, that seemed to be the issue.. thanks
Honestly thought single user MFA was being sacked off. Great video! Thanks for sharing
Always good to hear another perspective on things. Great vid. Cheers!!
Great video! I'd add #6 - enforcing higher Auth method before being ready... the number of times I've seen tenants being blocked because someone (def. never me) enforced Phishing resistant methods before the tenant was ready!
what auth policies are the safest?
Have an upcoming video explaining each in detail. But if we’re talking auth methods, cert based auth, WHfB, and passkeys (FIDO2) all rank highest, as they are cryptographically enforced, with some nuance and things to consider between them.
@rucam365 thanks sounds good and look forward to upcoming vids. Always looking for new ways to make our azure 365 environments more secure with latest stuff
Great video as usual! Would certainly be handy to have a deep dive in to CA policies, not so much the functionality (though could include that if the video was long enough), but the naming conventions I've seen you use in some videos. It's all to easy to end up with dozens of policies that have an unclear function, particularly when coming in to a new tenant that hasn't been well documented.
Second this^
Thanks! ACK on the CA video; will do this in the new year.
Hi Ru, awesome as always! I have a couple of questions though if I may on number 5. When you say Guests can only register phishing resistant MFA in their home tenant and not a target tenant, what is the mechanism that enforces this? Is is UserType = Member? If so what about External Members? Or put another way is it any user that isn't an Internal Member? Following on from that, what is the expected behaviour for a Guest user, who is challenged for Phishing Resistant MFA by a Target tenant who does trust MFA form other tenants, but the user has not registered any PR-MFA in their home tenant, is it just a straight block? Or do they get redirected to the home tenant to register some?
Great questions. Let me get a video out that deep dives into these.
Thanks for the breakdown! Just a quick off-topic question: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How should I go about transferring them to Binance?
Configured the Group to be activated by using an Authentication Context. Therefor I've created an Authentication Context in Entra, Conditional Access policy pointed to that Authentication Context, PIM group and force to use 2FA. The result is that while activating the group no 2FA is enforced..
Valid point about the Emergency Access accounts and excluding them not only from CA policies but also making them permanent GA, but why would you make "other administrators" the approvers for privilege roles? In my mind I would make department or team managers the approvers, if you need to elevate to GA, your team lead (who might not be technical themselves) would still want justification and maybe a change number to approve your request but do they need to hold an admin role themselves? or have I missed something?
Great content, as per your usual 🙂 I'd add that you can use role-assignable groups to help protect against the last issue discussed about using PIM for groups.
Would like to see more on your conditional access designs.
Really helpful! We have planned to implement PIM next week! 🎉
Subscribed! Thanks 😊
Great video. Thank you for making this, you explained everything perfectly. I really hope that you can make a video on BYOD of mobile devices.
great video - funny that the demo tenant in mistake no 3 is showing an implementation of mistake no 2 :) where admins are blocked only if they are Medium or Low risk but not at high risk :D
Haha, love it - great spot! This is because we have a global policy that blocks high risk :) Then for admins, we also block medium and low. But for standard users, that's quite FP prone, so just scope it our most sensitive users. Working on a more detailed CA design video to go into this kind of strategy.
What about using user environment variables in exclusions? 🙈
Great video Ru and thanks again for the talk at Scottish Summit
Thanks for the video and sharing your experience. I have also had issues with customers when you encrypt by default, breaks all kind of legacy systems, however with the correct exclusions within 2 months people even forget about it and are used to the new “experience”
Hi Folks! The content is really good, and so are the guests. It would be great if you could add some kind of diagrams, images, or anything that helps digest what the guest is explaining, because otherwise, it becomes quite a challenging podcast to stay focused on.
Very useful, i will recommend my clients watch this video
Thanks Ru, can you maybe share the specific settings you use for updates , the baseline you use in general?
Great job Ru 💪🏻
Hi Ru, good video on some common pitfalls. You mentioned Defender running on DC's in the video, but I've not found a lot of information surrounding Domain Controllers being managed by anything but GPO. I know that it's in preview for Intune Management via MDE; have you had much exposure to this method of management? How does the synthetic registration work on a Domain Controller now with this option to manage DC's, and is there any limitations you're aware of with them? (I think you're not getting firewall control on DCs, but do get AV protections).
the exclusion at 5:18 can this format be used in ASR rules to exclude them
It's very surprising to me that this video did not even mention Tamper Protection, which I would argue is perhaps the most important setting considering how domain wide ransomware attacks typically progress.
Yeah, TP is essential. Just didn’t make this particular list because it’s now on by default, and this is about mistakes more commonly observed. In our assessments of MDE/MDAV, folks are mostly doing a good job of having TP enabled.
@@rucam365 Well said!
nice video. Glad we didnt do those mistakes ;) But I have a few questions: 1. Defender exceptions. The last time I looked at ms docs for their own products, they do not give you contextual suggestions. I'm really curious how you could narrow down these exceptions for e.g. IME, ConfigMgr,... do you already have those and are willing to share? 2. not a qeustion but a vital hint: before you disallow local firewall policy merge, be 100% sure, you have manually set all required rules. I heard, once somebody may have set this to false and forgot to defince allow outgoing rules which ended up in all devices being offline and no way to fix this anymore, as all outgoing was blocked... 3. XDR recommendations are broken. We have all our clients set to scan removable storage on full scan. I can verify by powershell and reg key. but for some reason recommendations say, ~50% of my clients are configured wrong. Checking the exposed device, they are all set correct. (And thats not the only recommendation I set to solved by 3rd party, because the detection is just wrong. And there is absolutely no use of making a support ticket there. They actively refuse to address the issues)
Great Video! Is it possible to allow access to office 365 app on device and use them when saving within office 365 but disable saving locally on the device?
Not aware of a way :( But haven’t researched extensively. Usually in these cases, we go down the VDI route.
**Summary of "Why Your Entra ID Protection Strategy Is Weak [5 Critical Mistakes]"** The video highlights five critical mistakes commonly made when configuring Microsoft's Entra ID Protection and offers solutions to enhance security strategies: 1. **Misconfiguring Conditional Access Policies:** - **Risk Level Selection:** When setting up conditional access policies based on sign-in risk, selecting a specific risk level (e.g., "Low") applies **only** to that level, not to higher levels. The risk checkboxes are treated as "equal to," not "greater than or equal to." - **User Risk vs. Sign-in Risk:** If both user risk and sign-in risk are configured in the same policy, **both conditions must be true** for the policy to apply. To optimize, create separate policies for user risk and sign-in risk to ensure they function as intended. 2. **Challenges with Passwordless Authentication:** - **Password Change Requirement:** Requiring high-risk users to change their passwords can confuse passwordless users who do not have a traditional password. - **Solutions:** - **Block Authentication:** Instead of requiring a password change, consider blocking authentication for high-risk users to prompt clearer action. - **Exclude Passwordless Users:** Exclude passwordless users from policies that require a password change, allowing them to continue using passwordless methods without disruption. 3. **One-Size-Fits-All Approach:** - **Customized Policies:** Avoid applying the same identity protection policies to all users. Different user groups, such as administrators and regular users, have varying security needs. - **Gradual Implementation:** Start with stricter policies for high-risk groups like admins and VIPs. For example, block admins on medium or low risk while only blocking regular users on high risk. This approach facilitates smoother adoption and minimizes unintended consequences. 4. **Excluding Guest Users from Protection:** - **Inclusion of Guests:** Do not automatically exclude guest users from identity protection policies. Guest users often access the system from uncontrolled devices, increasing security risks. - **Enhanced Security Measures:** Consider applying more stringent identity protection policies to guest users to mitigate potential vulnerabilities associated with their access. 5. **Overlooking Audit Log Retention:** - **License-Based Retention Periods:** Entra ID log retention varies by license level: - **Free Level:** 7 days - **P1 License:** 30 days - **P2 License:** 90 days - **Data Retention Issues:** Upgrading your license does not retroactively extend log data retention. Important historical data may be unavailable during investigations if not properly retained. - **Recommendations:** - **Proactive Monitoring:** Regularly review and investigate risks to address issues promptly. - **Data Export:** Export log data to external solutions like Log Analytics or Microsoft Sentinel to preserve information beyond default retention periods. **Key Takeaways:** - **Configure Policies Accurately:** Understand how risk levels and conditions interact within conditional access policies to ensure they operate effectively. - **Accommodate Passwordless Users:** Adjust policies to support users who rely on passwordless authentication methods to prevent confusion and access issues. - **Customize Protection Strategies:** Tailor identity protection policies to different user groups based on their access levels and risk profiles. - **Include Guest Users in Protections:** Enhance security by applying appropriate protections to guest users, who may pose additional risks. - **Manage Log Retention Proactively:** Be aware of your license limitations regarding log retention and take steps to preserve essential data for security investigations. By addressing these common mistakes, organizations can strengthen their Entra ID Protection strategy, improve security posture, and reduce the risk of unauthorized access or breaches.
Great video, would this set up apply to BYOD devices which are domain registered, so those devices which have been enrolled via the company portal?
Is it possible to get TAP set for users in bulk?
Wow! This was great. I have been experiencing 'info overload' so many changes in just the last 2 yrs with MS 365 and beyond! Thank you😊
dont you need entra id p2 licenses for all users to do this ?
You’d need it for users targeted by policies, except for the first 50K guests.
Great content! For the "Consumer VPN" bypassing Trusted Locations, appears you need to have Apps deployed with CA App Control. Any chance you can expand on that in a video in terms of covering the M365 Apps as opposed to custom apps?
Yes absolutely. Gonna do a few videos on Defender for Cloud Apps, so will include it then.
Their is two different between mf and mfa