• Stars
    star
    2
  • Language
  • Created over 1 year ago
  • Updated over 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Create an alert policy for sharing of files externally. Set to high severity.

More Repositories

1

-Cyber-Attacks-Map---Using-Azure-Sentinel-SIEM-

4
star
2

Conditional-Access-Policy

Set conditional access to block high risk users using Android for Cloud Apps.
3
star
3

Create-a-File-policy-for-Cloud-Apps

Use Defender for Cloud Apps & create a file policy for detection of sharing US PII. Set email alert.
3
star
4

Azure-AD-Identity-Protection-policies

3
star
5

Safe-Attachments-Policy-using-Defender-for-Office-365

Create a Safe Attachment Policy for HR. Set to Block and redirect to admin email address
2
star
6

Sensitivity-Labels

Create a sensitivity label called Business Sensitive. Auto Apply if US Bank account number is used.
2
star
7

eDiscovery-hold

Perform an eDiscovery hold on Teams/SharePoint/Exchange content containing the keyword "Stock"
2
star
8

Password-Lockout-in-Microsoft-365

Set Authentication Password Policy Lockout threshold to 3 and duration to 250 seconds
2
star
9

Data-Loss-Prevention-DLP-

Create a DLP policy for PII only for Exchange. Set encrypt content to enable.
2
star
10

Manage-Data-Governance-and-Retention

Create a static 10 year deletion retention policy for Teams. Create forever label for MS365 groups.
2
star
11

User-identity-administration

Creating User Identity and assign the EMS license.
2
star
12

Device-Configuration-Profile-with-Intune

Create a Configuration Profile. Block Personalization. Include Sales. Exclude Marketing.
2
star
13

Password-Expiration-in-Microsoft-365

Configure the Password Expiration to 100 days expire. 30 days notification
2
star
14

Azure-AD-Connect

Synchronization methods with Azure AD Connect
1
star
15

sagarm365

1
star
16

Privileged-Access-Management-in-Microsoft-Purview

We will show you how to provide users with just enough access to elevated tasks, roles, and role groups using Privileged Access Management (PAM).
1
star
17

SOC-Analyst-Interview-Questions-LetsDefend-

This is document of SOC Interview Questions... Credits go to Letsdefend
1
star