ITCalls Blog
Sharing different IT issues with the community
FEATURED POST
Latest Post
Step by Step applying Microsoft Data Loss Prevention on data copied to USB
According to Varonis latest report 53% of companies had over 1000 sensitive files open to every employee. The possibility to lose or get these files exposed to external actor is getting high everyday. On the other hand IBM mentioned that the average cost of data...
read moreNIST Zero Trust Architecture best practices. How Microsoft Azure applies Zero trust Architecture?
As we are closing year 2019, I am sharing few thoughts and providing a quick summary on the latest NIST Zero Trust Architecture (ZTA) best practices. This is a quick good read for your vacation ahead of something we need to focus on in 2020. Zero Trust Architecture...
read moreAzure Active Directory Passwordless Cloud Authentication
In my previous blog post, I highlighted the problem with Identity protection especially in our nowadays cloud and mobile environment. Protecting the identity is the main and first priority for security professionals. Dependence on passwords alone will not help. Moving...
read moreEnabling Microsoft 365 MFA policy with new Admin Center
In this blog post, I am trying to share few tips on Microsoft 365 MFA policy and how to enable it using the new admin center. Microsoft 365 MFA policy is the evolution of the previous Microsoft Azure MFA and Office 365 MFA and its actually built on the same...
read moreMicrosoft Defender ATP Indicators of Compromise IoC explained
Microsoft Defender ATP Indicators of Compromise IoC Most organizations don't realize they are under attack until its too late. In fact, a recent study revealed that it can take more than 200 days to discover that you are compromised. In this blog post, I am going to...
read moreOffice 365 SPF DKIM and DMARC Deep Dive
Office 365 SPF, DKIM and DMARC In this post we will be discussing how to protect your mail flow using Office 365 SPF DKIM and DMARC. These are mainly authentication protocols and mechanisms relying mainly on DNS to protect your mail from phishing and spoofing....
read moreAzure Sentinel Connector with Palo Alto Firewalls
In my previous article, I introduced Azure Sentinel basic configuration and different connector options as office 365. Another type of connector will be shown in this article which is the Palo Alto connector. This is one of the rich features of Azure Sentinel by...
read moreAzure Sentinel Cloud SIEM Solution
Microsoft Azure Sentinel is the latest SIEM offering based on the cloud power, artificial intelligence and Machine learning. In this article I will share the configuration of Azure Sentinel and how to add connectors from different platforms. For Instance connecting...
read moreSubscribe & Follow
Join Our Newsletter
Vivamus magna justo, lacinia eget consectetur sed, convallis at tellus. Sed porttitor lectus nibh. Curabitur non nulla sit amet nisl tempus convallis quis ac lectus.