Despite criminal masterminds and “security researchers” always coming up with the next greatest tool for causing financial damage to our businesses and economy, there are patterns.
Security
Defense implies a reactionary approach. Prevention set the scene where ransomware can’t get you in the first place.
The Chrome version of Edge has a full set of Group Policy and Intune configuration options that can enhance security.
Once these two items have been set the ability of PlugX to take advantage of innocent people should be thwarted.
let’s say that you’ve come across a situation, and you want to remove a device from the network – remotely, while you investigate. Interestingly this device, need not be enrolled in Defender for Business. It can an unmanaged device to
Microsoft recently published an analysis of the techniques used by one popular phishing-as-a-service provider. We’ll take that analysis and implement a solution based upon it
I often get asked how we manage networks without an RMM tool and I always reply that we take full advantage and make use of what Microsoft has to offer. This type of rule is an example of that philosophy.
It’s an Attack Surface Reduction rule and it is exploited in the wild, so it’s import to close up this vulnerability to fileless attacks.
Turning off Autoplay is a recommended policy in Endpoint Manager device configuration. It is recommended because it can prevent the automatic opening a files from any drive type
entities. Two of them are particularly good ideas to limit how a domain can be accessed and will create significant hurdles for criminals