Skip to content
Get A Demo
Sign Up Free

    Microsoft Security

    Security How-To
    19 min read | June 28, 2023

    Authentication Protocols 101: NTLM, Kerberos, LDAP and RADIUS

    Read More
    Security How-To
    4 min read | May 24, 2023

    Sysmon 101: Leveling Up Windows Security

    Read More
    Security How-To
    5 min read | May 11, 2023

    How To Detect SYSVOL Enumeration Exploits

    Read More
    Security How-To
    21 min read | April 28, 2023

    How to Select SIEM for Microsoft 365

    Read More
    Security Trends and Info
    2 min read | February 23, 2023

    Top 5 Tools for Microsoft Products

    Read More
    Security Alerts
    14 min read | January 13, 2023

    How To Navigate Microsoft 365 Audit Logs

    Read More
    Security How-To
    18 min read | January 4, 2023

    How To Manage Windows Firewall with GPOs

    Read More
    Security How-To
    15 min read | November 22, 2022

    Office 365 Audit Log Retention: Why It Matters and Best Practices

    Read More
    Product Updates
    11 min read | November 18, 2022

    8 Microsoft 365 Detections You Get Free with Blumira

    Read More
    Security How-To
    20 min read | November 15, 2022

    A Guide To Microsoft Azure Security Logging

    Read More
    Security How-To
    17 min read | October 26, 2022

    Find a User with Their Security ID in Windows

    Read More
    Security How-To
    17 min read | October 18, 2022

    Active Directory Password Auditing with NtdsAudit & NThashes

    Read More
    Security How-To
    17 min read | October 18, 2022

    Event ID 4732: The Case of the Missing Username

    Read More
    Security How-To
    11 min read | October 13, 2022

    Securing Exchange Server: 8 Best Practices

    Read More
    Security Alerts
    16 min read | September 30, 2022

    Zero-Day Vulnerabilities Found in Microsoft Exchange (CVE-2022-41040 and CVE-2022-41082)

    Read More