Sagar's repositories
Conditional-Access-Policy
Set conditional access to block high risk users using Android for Cloud Apps.
Create-a-File-policy-for-Cloud-Apps
Use Defender for Cloud Apps & create a file policy for detection of sharing US PII. Set email alert.
Data-Loss-Prevention-DLP-
Create a DLP policy for PII only for Exchange. Set encrypt content to enable.
Device-Configuration-Profile-with-Intune
Create a Configuration Profile. Block Personalization. Include Sales. Exclude Marketing.
eDiscovery-hold
Perform an eDiscovery hold on Teams/SharePoint/Exchange content containing the keyword "Stock"
Manage-and-Analyse-audit-logs-and-reports
Create an alert policy for sharing of files externally. Set to high severity.
Manage-Data-Governance-and-Retention
Create a static 10 year deletion retention policy for Teams. Create forever label for MS365 groups.
Password-Expiration-in-Microsoft-365
Configure the Password Expiration to 100 days expire. 30 days notification
Password-Lockout-in-Microsoft-365
Set Authentication Password Policy Lockout threshold to 3 and duration to 250 seconds
Safe-Attachments-Policy-using-Defender-for-Office-365
Create a Safe Attachment Policy for HR. Set to Block and redirect to admin email address
Sensitivity-Labels
Create a sensitivity label called Business Sensitive. Auto Apply if US Bank account number is used.
User-identity-administration
Creating User Identity and assign the EMS license.
Azure-AD-Connect
Synchronization methods with Azure AD Connect
Privileged-Access-Management-in-Microsoft-Purview
We will show you how to provide users with just enough access to elevated tasks, roles, and role groups using Privileged Access Management (PAM).
SOC-Analyst-Interview-Questions-LetsDefend-
This is document of SOC Interview Questions... Credits go to Letsdefend
MFA-registration-policy-via-Azure-AD-Identity-Protection
Configure an Azure MFA policy for your cloud-based users from within the Azure AD Identity Protection pane.
Microsoft-Office-365-Security-Checklist
This workbook is designed to be easy to follow —like a checklist—so that you can implement a good “baseline” level of security as you proceed through to the end.
Monitor-Microsoft-365-Security-with-Microsoft-Sentinel
Use Sentinel. Run Failed Login Attempt Query. Turn on Fusion Machine Learning.
Ninja-Training
Microsoft 365 Defender Ninja Training Certification
SC-100-DUMPS
DUMPS FOR SC-100
Zero-Trust-Framework
Brief introduction about zero trust framework.