• Stars
    star
    3
  • Rank 3,963,521 (Top 79 %)
  • Language
  • Created almost 2 years ago
  • Updated almost 2 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

More Repositories

1

-Cyber-Attacks-Map---Using-Azure-Sentinel-SIEM-

4
star
2

Conditional-Access-Policy

Set conditional access to block high risk users using Android for Cloud Apps.
3
star
3

Create-a-File-policy-for-Cloud-Apps

Use Defender for Cloud Apps & create a file policy for detection of sharing US PII. Set email alert.
3
star
4

Safe-Attachments-Policy-using-Defender-for-Office-365

Create a Safe Attachment Policy for HR. Set to Block and redirect to admin email address
2
star
5

Sensitivity-Labels

Create a sensitivity label called Business Sensitive. Auto Apply if US Bank account number is used.
2
star
6

eDiscovery-hold

Perform an eDiscovery hold on Teams/SharePoint/Exchange content containing the keyword "Stock"
2
star
7

Password-Lockout-in-Microsoft-365

Set Authentication Password Policy Lockout threshold to 3 and duration to 250 seconds
2
star
8

Manage-and-Analyse-audit-logs-and-reports

Create an alert policy for sharing of files externally. Set to high severity.
2
star
9

Data-Loss-Prevention-DLP-

Create a DLP policy for PII only for Exchange. Set encrypt content to enable.
2
star
10

Manage-Data-Governance-and-Retention

Create a static 10 year deletion retention policy for Teams. Create forever label for MS365 groups.
2
star
11

User-identity-administration

Creating User Identity and assign the EMS license.
2
star
12

Device-Configuration-Profile-with-Intune

Create a Configuration Profile. Block Personalization. Include Sales. Exclude Marketing.
2
star
13

Password-Expiration-in-Microsoft-365

Configure the Password Expiration to 100 days expire. 30 days notification
2
star
14

Azure-AD-Connect

Synchronization methods with Azure AD Connect
1
star
15

sagarm365

1
star
16

Privileged-Access-Management-in-Microsoft-Purview

We will show you how to provide users with just enough access to elevated tasks, roles, and role groups using Privileged Access Management (PAM).
1
star
17

SOC-Analyst-Interview-Questions-LetsDefend-

This is document of SOC Interview Questions... Credits go to Letsdefend
1
star