• Stars
    star
    1
  • Language
  • Created 11 months ago
  • Updated 11 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Synchronization methods with Azure AD Connect

More Repositories

1

-Cyber-Attacks-Map---Using-Azure-Sentinel-SIEM-

4
star
2

Conditional-Access-Policy

Set conditional access to block high risk users using Android for Cloud Apps.
3
star
3

Create-a-File-policy-for-Cloud-Apps

Use Defender for Cloud Apps & create a file policy for detection of sharing US PII. Set email alert.
3
star
4

Azure-AD-Identity-Protection-policies

3
star
5

Safe-Attachments-Policy-using-Defender-for-Office-365

Create a Safe Attachment Policy for HR. Set to Block and redirect to admin email address
2
star
6

Sensitivity-Labels

Create a sensitivity label called Business Sensitive. Auto Apply if US Bank account number is used.
2
star
7

eDiscovery-hold

Perform an eDiscovery hold on Teams/SharePoint/Exchange content containing the keyword "Stock"
2
star
8

Password-Lockout-in-Microsoft-365

Set Authentication Password Policy Lockout threshold to 3 and duration to 250 seconds
2
star
9

Manage-and-Analyse-audit-logs-and-reports

Create an alert policy for sharing of files externally. Set to high severity.
2
star
10

Data-Loss-Prevention-DLP-

Create a DLP policy for PII only for Exchange. Set encrypt content to enable.
2
star
11

Manage-Data-Governance-and-Retention

Create a static 10 year deletion retention policy for Teams. Create forever label for MS365 groups.
2
star
12

User-identity-administration

Creating User Identity and assign the EMS license.
2
star
13

Device-Configuration-Profile-with-Intune

Create a Configuration Profile. Block Personalization. Include Sales. Exclude Marketing.
2
star
14

Password-Expiration-in-Microsoft-365

Configure the Password Expiration to 100 days expire. 30 days notification
2
star
15

sagarm365

1
star
16

Privileged-Access-Management-in-Microsoft-Purview

We will show you how to provide users with just enough access to elevated tasks, roles, and role groups using Privileged Access Management (PAM).
1
star
17

SOC-Analyst-Interview-Questions-LetsDefend-

This is document of SOC Interview Questions... Credits go to Letsdefend
1
star