This type of migration is used when moving from Gmail to Microsoft Exchange Online, it is done in one of the admin centers.
IMAP
With M365 E5, this solution includes custom views and a dashboard for security events in Sentinel.
Workbooks
This structure is constructed of one or more domains defined by DNS names
A forest
This European company got breached one week after a full AD recovery.
METRO/Metro AG
When it comes to ADFS, Microsoft came out with a zoo of standards that start with WS-* (protocol suite), but the world adopted this instead.
SAMLv2/SAML
With ransomware as a threat, companies rely on this Active Directory process to recover the domain controllers.
System State Backup or Full Server Backup.
[The system state backup includes only the components needed to restore Active Directory]
For Windows devices, this solution provides devices with preinstalled settings, apps, and policies for the business.
Windows Autopilot
Rapid Modernization Plan/RaMP
This model in Active Directory provides the flexibility of allowing changes to occur at any DC in the enterprise.
The Special Ops Team from Microsoft, you hope you don't have to call. They are very expensive and can help your business do an analysis/investigation after a special nefarious attack.
DART/Microsoft DART Team/Microsoft Detection and Response Team (DART)
According to Randy, they were the big Giant in the 60s and 70s
IBM
It will be deprecated along with incoming requests from older protocols by Fall 2023 (Hint: ARM)
TLS 1.1
This M365 feature allows restriction of communication and information sharing between members of two departments.
Information barriers
It secludes a compute component on a Virtual network, and web apps on this are hosted in your VNET in a dedicated subnet.
The Azure App Service Environment (ASE)
According to Randy, this type of Server is to be used where physical security is insufficient.
RDOC/Read-Only Domain Controller
The three newest Partners at Edgile (2023)
Paul Gagacki, Jerald Carter, Bob Moore
This Network was part of the department of defense, and you didn't get a machine on the network if you weren't aligned with them.
ARPANET
[An arm of the U.S. Defense Department, funded the development of the Advanced Research Projects Agency Network (ARPANET) in the late 1960s.]
An upgrade to traditional MFA. Enforcement tenant-wide begins Feb 27, 2023
Number Matching
A technology that adds a security layer for outgoing messages and attachments, you can read the messages if you have a certificate
S/MIME or Secure/Multipurpose Internet Mail Extensions
It's a snare for malicious actors to trigger alerts in MDI
Honeytoken/Honeytoken entity tags
Microsoft would love to get rid of this method used to manage computers and machines in the last 20 years.
Group Policy/GPO
Wipro's cyber consulting (business-aligned, strategy-first) capabilities under one umbrella
CyberTransform/CyberTransformSM
Randy spent $3000 for this amount of space in a Hard Disk
300MB
They are the 4-step process to migrate to Microsoft's cloud-native DLP from a well-known Information security provider ( the company which is a division of Broadcom)
Input, Analyze, Migrate, and Report
A security professional can BEST mitigate the risk of using a Commercial Off-The-Shelf (COTS) solution by deploying the application with this control in place. [CISSP]
Network segmentation
This best practice is great for enacting service accounts for API management.
Managed identities in Azure or Application registrations in Azure AD
In a hybrid environment, to protect against ransomware, you can use these two solutions to give admin access only when it's needed. One is more focused on duration, and the other on passwords.
JIT and LAPS/ Just-In-Time (JIT) administration and Local Administrator Password Solution (LAPS)
This Microsoft Team helps customers in compromise recovery to eliminate the villain from an environment. They assist in recovering critical business systems like AD.
CRSP/Microsoft Compromise Recovery Security Practice
According to Randy, no one should be using this Protocol anymore when it comes to Active Directory. It's not secure enough.
LDAP Bind
This white paper discloses Microsoft's proposal for how international and national cybersecurity lawmaking should happen in the near future.
Cybersecurity Policy Framework