How-Tos
video
How securing the cloud differs from security on-premises servers
Keep these key points regarding cloud vs. on-premises security as you move to the cloud.
video
How to investigate a Windows network breach
These are the most important actions to take once your Windows network is breached.
How malicious Office files and abused Windows privileges enable ransomware
Ransomware groups most often gain entry to Windows networks through malicious Office documents and then move laterally by abusing Windows privileges. Here's how to defend against both.
video
How to prevent attackers from exploiting Windows privileges
Ransomware and other attackers will often try to escalate privileges once inside Windows systems. These tips can make that harder to do.
video
Most common cyberattack techniques of 2020
Research on the most common techniques attackers used to breach systems provides insight on where to focus your defenses.
Tips to improve domain password security in Active Directory
Follow this advice to better secure domain passwords in a Microsoft environment.
video
How to better manage your domain passwords
Follow this advice to help prevent domain password compromise or lateral movement should your password be compromised.
How to reset Kerberos account passwords in an Active Directory environment
A regular reset of the KRBTGT account password will help prevent golden ticket attacks that allow wide unauthorized access to your network.
video
How to reset the Kerberos password in Active Directory
Changing the Kerberos password will help prevent golden ticket attacks on Active Directory.
video
Microsoft 365 Defender’s new features | What you need to know
M365 Defender has new protections against credential theft and a new threat analytics portal.
How to patch Exchange Server for the Hafnium zero-day attack
Admins in many businesses report indicators of compromise from an Exchange zero-day vulnerability. Don't assume you're not a target. Investigate for signs of the attack and patch now.
How to protect Windows Remote Desktop deployments
Attackers gain access to your Windows network just as work-from-home employees do: remotely. Following these simple steps will send them looking for easier targets.
video
What you need to know about Microsoft’s Advanced Auditing
Advanced Auditing is a powerful new tool that will help track down attacker activities in Microsoft Windows environments—if you have the right license.
How to defend against OAuth-enabled cloud-based attacks
Use these settings in Microsoft Azure Active Directory to take control of user-requested OAuth access permissions.
video
How to protect your network from OAuth-enabled cloud-based attacks
Check your OAuth third-party authentication privileges in Microsoft 365 and Azure to prevent unauthorized access.
DDoS explained: How distributed denial of service attacks are evolving
A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...
How to harden Microsoft Edge against cyberattacks
Chromium-based Edge gives enterprises the opportunity to standardize on one browser. Here are the key security settings you need to know.
video
How to harden your web browser against cloud-based threats
The web browser is now the portal that most employees use to access data and apps. These tips will help prevent attackers from exploiting it.
-
eBook
Sponsored -
eBook
Sponsored -
White Paper
-
eBook
Sponsored -
eBook
Sponsored
BrandPosts
Learn more-
Sponsored by Fortinet
-
Sponsored by Sophos
-
Sponsored by ExtraHop



![Digital Transformation [DX] > dandelion seeds blown by a virtual wind of change](https://images.idgesg.net/images/article/2020/01/cio_dandelion_seeds_blown_by_virtual_wind_of_change_digital_transformation_flower_by_dawid_zawila_cc0_via_unsplash_abstract_digital_wave_stream_by_pete_linforth_aka_thedigitalartist_cc0_via_pixabay_1200x800-100826623-medium.3x2.jpg)