Misc.
Azure Security
Active Directory
Dallas All-Hands
Randy's History Class
Peter's Sessions
100

This type of migration is used when moving from Gmail to Microsoft Exchange Online, it is done in one of the admin centers.

IMAP

100

With M365 E5, this solution includes custom views and a dashboard for security events in Sentinel.

Workbooks

100

This structure is constructed of one or more domains defined by DNS names

A forest

100

This European company got breached one week after a full AD recovery.

METRO/Metro AG

100

When it comes to ADFS, Microsoft came out with a zoo of standards that start with WS-* (protocol suite), but the world adopted this instead.

SAMLv2/SAML

100

With ransomware as a threat, companies rely on this Active Directory process to recover the domain controllers.

System State Backup or Full Server Backup.

[The system state backup includes only the components needed to restore Active Directory]

200

For Windows devices, this solution provides devices with preinstalled settings, apps, and policies for the business.

Windows Autopilot

200
Used as a framework to create privileged identity strategies using security standards in Azure (based on Zero Trust)

Rapid Modernization Plan/RaMP 

200

This model in Active Directory provides the flexibility of allowing changes to occur at any DC in the enterprise.

Multi-master/ Multi-master model
200

The Special Ops Team from Microsoft, you hope you don't have to call. They are very expensive and can help your business do an analysis/investigation after a special nefarious attack.

DART/Microsoft DART Team/Microsoft Detection and Response Team (DART)

200

According to Randy, they were the big Giant in the 60s and 70s

IBM

200

It will be deprecated along with incoming requests from older protocols by Fall 2023 (Hint: ARM)

TLS 1.1

300

This M365 feature allows restriction of communication and information sharing between members of two departments.

Information barriers

300

It secludes a compute component on a Virtual network, and web apps on this are hosted in your VNET in a dedicated subnet.

The Azure App Service Environment (ASE)

300

According to Randy, this type of Server is to be used where physical security is insufficient.

RDOC/Read-Only Domain Controller

300

The three newest Partners at Edgile (2023)

Paul Gagacki, Jerald Carter, Bob Moore

300

This Network was part of the department of defense, and you didn't get a machine on the network if you weren't aligned with them.

ARPANET

[An arm of the U.S. Defense Department, funded the development of the Advanced Research Projects Agency Network (ARPANET) in the late 1960s.] 

300

An upgrade to traditional MFA. Enforcement tenant-wide begins Feb 27, 2023

Number Matching

400

A technology that adds a security layer for outgoing messages and attachments, you can read the messages if you have a certificate

S/MIME or Secure/Multipurpose Internet Mail Extensions

400

It's a snare for malicious actors to trigger alerts in MDI

Honeytoken/Honeytoken entity tags

400

Microsoft would love to get rid of this method used to manage computers and machines in the last 20 years.

Group Policy/GPO

400

Wipro's cyber consulting (business-aligned, strategy-first) capabilities under one umbrella

CyberTransform/CyberTransformSM

400

Randy spent $3000 for this amount of space in a Hard Disk

300MB

400

They are the 4-step process to migrate to Microsoft's cloud-native DLP from a well-known Information security provider ( the company which is a division of Broadcom)

Input, Analyze, Migrate, and Report

500

A security professional can BEST mitigate the risk of using a Commercial Off-The-Shelf (COTS) solution by deploying the application with this control in place. [CISSP]

Network segmentation

500

This best practice is great for enacting service accounts for API management.

Managed identities in Azure or Application registrations in Azure AD

500

In a hybrid environment, to protect against ransomware, you can use these two solutions to give admin access only when it's needed. One is more focused on duration, and the other on passwords.

JIT and LAPS/ Just-In-Time (JIT) administration and Local Administrator Password Solution (LAPS)

500

This Microsoft Team helps customers in compromise recovery to eliminate the villain from an environment. They assist in recovering critical business systems like AD.

CRSP/Microsoft Compromise Recovery Security Practice

500

According to Randy, no one should be using this Protocol anymore when it comes to Active Directory. It's not secure enough.

LDAP Bind

500

This white paper discloses Microsoft's proposal for how international and national cybersecurity lawmaking should happen in the near future.

Cybersecurity Policy Framework

M
e
n
u