-
Notifications
You must be signed in to change notification settings - Fork 2
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
4b46132
commit 502e829
Showing
15 changed files
with
397 additions
and
339 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
# Microsoft Defender for Cloud | ||
|
||
## Microsoft Tech Community Blogs | ||
|
||
## Community Blogs |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,20 @@ | ||
# Microsoft Defender for Cloud Apps & App Governance | ||
|
||
## Microsoft Tech Community Blogs | ||
|
||
- [Safeguarding your OAuth apps with App Governance](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/safeguarding-your-oauth-apps-with-app-governance/ba-p/3837343) | ||
- [Improve your app posture and hygiene using Microsoft Defender for Cloud Apps](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/improve-your-app-posture-and-hygiene-using-microsoft-defender/ba-p/3742361) | ||
- [Protect apps that use non-standard ports with Defender for Cloud Apps](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/protect-apps-that-use-non-standard-ports-with-defender-for-cloud/ba-p/3685351) | ||
- [Hunt for compromised Azure subscriptions using Microsoft Defender for Cloud Apps](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/hunt-for-compromised-azure-subscriptions-using-microsoft/ba-p/3607121) | ||
- [Protect sensitive SharePoint sites with Defender for Cloud Apps](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/protect-sensitive-sharepoint-sites-with-defender-for-cloud-apps/ba-p/3592441) | ||
- [Microsoft Defender for Cloud Apps experiences are now part of Microsoft 365 Defender](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/microsoft-defender-for-cloud-apps-experiences-are-now-part-of/ba-p/3545176) | ||
- [Introducing predefined policies in app governance](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/introducing-predefined-policies-in-app-governance/ba-p/3371631) | ||
- [Announcing Microsoft Defender for Cloud Apps](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/announcing-microsoft-defender-for-cloud-apps/ba-p/2835842) | ||
- [Secure Access for applications with Microsoft Cloud App Security](https://techcommunity.microsoft.com/t5/security-compliance-identity/secure-access-for-applications-with-microsoft-cloud-app-security/ba-p/2157495) | ||
- [Uncover your blind spots: seamlessly control cloud usage risks to your organization](https://techcommunity.microsoft.com/t5/security-compliance-identity/uncover-your-blind-spots-seamlessly-control-cloud-usage-risks-to/ba-p/2157447) | ||
- [Prevent sophisticated attacks: Microsoft Cloud App Security and Microsoft 365 Defender](https://techcommunity.microsoft.com/t5/security-compliance-identity/prevent-sophisticated-attacks-microsoft-cloud-app-security-and/ba-p/2157646) | ||
-[Microsoft Cloud App Security update: March 2021](https://techcommunity.microsoft.com/t5/security-compliance-identity/microsoft-cloud-app-security-update-march-2021/ba-p/2157650) | ||
- [MCAS: Top 5 Queries You Need to Save](https://techcommunity.microsoft.com/t5/security-compliance-identity/mcas-top-5-queries-you-need-to-save/ba-p/2274518) | ||
- [Microsoft Cloud App Security: The Hunt in a multi-stage incident](https://techcommunity.microsoft.com/t5/microsoft-365-defender/microsoft-cloud-app-security-the-hunt-in-a-multi-stage-incident/ba-p/2193484) | ||
|
||
## Community Blogs |
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,22 @@ | ||
# Microsoft Defender External Attack Surface Management | ||
|
||
## Microsoft Tech Community Blogs | ||
|
||
- [Leverage Generative AI to expedite attack surface investigations in Defender EASM](https://techcommunity.microsoft.com/t5/microsoft-defender-external/leverage-generative-ai-to-expedite-attack-surface-investigations/ba-p/4110163) | ||
- [Get visibility into your curated external assets with enhanced generative AI capabilities](https://techcommunity.microsoft.com/t5/microsoft-defender-external/get-visibility-into-your-curated-external-assets-with-enhanced/ba-p/4081757) | ||
- [Latest Defender EASM Features Increase Visibility and Enhance Querying for Faster Remediation](https://techcommunity.microsoft.com/t5/microsoft-defender-external/latest-defender-easm-features-increase-visibility-and-enhance/ba-p/4037760) | ||
- [Defender EASM - Performing a Successful Proof of Concept (PoC)](https://techcommunity.microsoft.com/t5/microsoft-defender-external/defender-easm-performing-a-successful-proof-of-concept-poc/ba-p/3994862) | ||
- [Optimize insights and efficiency with latest Defender EASM features and generative AI integrations](https://techcommunity.microsoft.com/t5/microsoft-defender-external/optimize-insights-and-efficiency-with-latest-defender-easm/ba-p/3976482) | ||
- [Latest Enhancements Boost Usability, Enhance Your Tools and Workflows](https://techcommunity.microsoft.com/t5/microsoft-defender-external/latest-enhancements-boost-usability-enhance-your-tools-and/ba-p/3818055) | ||
- [Part 2: Uncovering Trackers Using the Defender EASM API](https://techcommunity.microsoft.com/t5/microsoft-defender-external/part-2-uncovering-trackers-using-the-defender-easm-api/ba-p/3806494) | ||
- [Seeking Dead and Dying Servers with the MDEASM APIs](https://dtechcommunity.microsoft.com/t5/microsoft-defender-external/seeking-dead-and-dying-servers-with-the-mdeasm-apis/ba-p/3741412) | ||
- [Identify Digital Assets Vulnerable to Subdomain Takeover](https://techcommunity.microsoft.com/t5/microsoft-defender-external/identify-digital-assets-vulnerable-to-subdomain-takeover/ba-p/3700773) | ||
- [Seeking Out Dead and Dying Servers](https://techcommunity.microsoft.com/t5/microsoft-defender-external/seeking-out-dead-and-dying-servers/ba-p/3715874) | ||
- [Latest Engineering Semester Enables Tighter Integrations, Ease of Use](https://techcommunity.microsoft.com/t5/microsoft-defender-external/latest-engineering-semester-enables-tighter-integrations-ease-of/ba-p/3728668) | ||
- [Uncovering Trackers Using the Defender EASM UI Pt. 1](https://techcommunity.microsoft.com/t5/microsoft-defender-external/uncovering-trackers-using-the-defender-easm-ui-pt-1/ba-p/3742726) | ||
- [Microsoft Defender External Attack Surface Overview, Concepts, and Vocabulary](https://techcommunity.microsoft.com/t5/microsoft-defender-external/microsoft-defender-external-attack-surface-overview-concepts-and/ba-p/3745749) | ||
- [Why is Defender EASM Discovery important?](https://techcommunity.microsoft.com/t5/microsoft-defender-external/why-is-defender-easm-discovery-important/ba-p/3745757) | ||
- [Data Connectors for Azure Log Analytics and Data Explorer Now in Public Preview](https://techcommunity.microsoft.com/t5/microsoft-defender-external/data-connectors-for-azure-log-analytics-and-data-explorer-now-in/ba-p/3776898) | ||
- [Welcome to the Microsoft Defender External Attack Surface Management Tech Community](https://techcommunity.microsoft.com/t5/microsoft-defender-external/welcome-to-the-microsoft-defender-external-attack-surface/ba-p/3698416) | ||
|
||
## Community Blogs |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
# Microsoft Defender for Identity | ||
|
||
## Microsoft Tech Community Blogs | ||
|
||
- [Securing AD CS: Microsoft Defender for Identity's Sensor Unveiled](https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/securing-ad-cs-microsoft-defender-for-identity-s-sensor-unveiled/ba-p/3980265) | ||
- [Simplified deployment with Defender for Identity](https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/simplified-deployment-with-defender-for-identity/ba-p/3966035) | ||
- [Microsoft Defender for Identity expands its coverage with new AD CS sensor!](https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/microsoft-defender-for-identity-expands-its-coverage-with-new-ad/ba-p/3894215) | ||
- [Deceptive defense: best practices for identity based honeytokens in Microsoft Defender for Identity](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/deceptive-defense-best-practices-for-identity-based-honeytokens/ba-p/3851641) | ||
- [Leveraging the convergence of Microsoft Defender for Identity in Microsoft 365 Defender Portal](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/leveraging-the-convergence-of-microsoft-defender-for-identity-in/ba-p/3856321) | ||
- [Microsoft Defender for Identity now detects suspicious certificate usage](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/microsoft-defender-for-identity-now-detects-suspicious/ba-p/3743335) | ||
- [Using gMSA account in Microsoft Defender for Identity in multi-domain forests.](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/using-gmsa-account-in-microsoft-defender-for-identity-in-multi/ba-p/2942690) | ||
- [Microsoft Defender for Identity and Npcap](https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/microsoft-defender-for-identity-and-npcap/m-p/2584151) | ||
- [Microsoft Defender for Identity Experiences in Microsoft 365 Defender](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/microsoft-defender-for-identity-experiences-in-microsoft-365/ba-p/2414610) | ||
- [Using Microsoft Defender for Identity Data to Make Powerful Advanced Hunting Queries](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/using-microsoft-defender-for-identity-data-to-make-powerful/ba-p/2404305) | ||
- [Enhancing Microsoft Defender for Identity Data Using Microsoft 365 Defender](https://techcommunity.microsoft.com/t5/security-compliance-identity/enhancing-microsoft-defender-for-identity-data-using-microsoft/ba-p/2178286) | ||
|
||
## Community Blogs |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
# Microsoft Defender for IOT/EIOT | ||
|
||
## Microsoft Tech Community Blogs | ||
|
||
- [Enterprise IoT security is now included in Microsoft 365 E5 and E5 Security plans](https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/enterprise-iot-security-is-now-included-in-microsoft-365-e5-and/ba-p/3967533) | ||
- [Microsoft Defender for IoT moves to site-based licensing for protecting OT environments](https://techcommunity.microsoft.com/t5/microsoft-defender-for-iot-blog/microsoft-defender-for-iot-moves-to-site-based-licensing-for/ba-p/3843302) | ||
- [Protect printers, cameras and the rest of your IoT devices with Microsoft 365 Defender](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/protect-printers-cameras-and-the-rest-of-your-iot-devices-with/ba-p/3033151) | ||
- [Protect your printers, cameras and the rest of your IoT devices starting today!](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/protect-your-printers-cameras-and-the-rest-of-your-iot-devices/ba-p/3031940) | ||
- [IoT Asset discovery based on FW logs](https://techcommunity.microsoft.com/t5/azure-sentinel/iot-asset-discovery-based-on-fw-logs/ba-p/2232851) | ||
|
||
## Community Blogs |
Oops, something went wrong.