Trusted Platform Module (TPM) and Windows Features

The following table defines which Windows features require TPM support. TPM AND WINDOWS FEATURES Windows Features TPM Required Supports TPM 1.2 Supports TPM 2.0 Details Measured Boot Yes Yes Yes Measured Boot requires TPM 1.2 or 2.0 and UEFI Secure Boot. TPM 2.0 is recommended since it supports newer cryptographic algorithms. TPM 1.2 only supports the SHA-1 algorithm which is being deprecated. BitLocker No Yes Yes TPM 1.2 or 2.0 are ...

Read More

The Microsoft Identity Manager (MIM)

Today, many businesses in Corporate America are now implementing more than one level of authentication in order to confirm the identity of an individual.  Many of them have implemented at least Two Factor Authentication (2FA) or even Multifactor Authentication (MFA).  But trying to keep track of all of these authentication levels and mechanisms can be ...

Read More

How To Create A Playbook In Azure Sentinel – Part 2

In our last article, we examined the concept of what a Playbook is, and how to create one specifically for the Azure Sentinel platform.  Specifically, the following topics were covered; Creating the Playbook; Establishing The Trigger Point. In this article, we continue with theme of creating the Playbook, but looking at more advanced functionalities. How To Steps ...

Read More

How To Create A Playbook In Azure Sentinel

As we know, many IT Security teams across Corporate America are totally overburdened with the many alerts and warnings that they receive from their network security tools. CISOs are realizing this and are taking more steps to help alleviate the phenomenon which is known as “Alert Fatigue”. For example, they are strategically placing technologies in ...

Read More

How To Prevent Data Loss With Azure

One of the hottest topics today in the world of Cybersecurity is that of Data Loss. To some degree or another, most companies have experienced this one way or another, whether it was intentional or not. But given that many employees are using their personal devices to do their daily job tasks, this has dramatically ...

Read More

An Introduction To Multi-Factor Authentication

Given all of the security risks out there with the remote workforce, Corporate America is scrambling fast to find new ways to protect their mission-critical information and data.  Apart from the other safeguards that are being put into place, companies are now looking at a new approach to authenticate all employees and even external third ...

Read More

Protecting against new versions of Ransomware, using the Microsoft Security Stack

Ransomware is a threat variant that has existed for quite some time.  It is actually a sophisticated form of malware, and in these types of attacks, the victim’s device gets hijacked.  The screen becomes locked, and all of the files become encrypted with some unknown algorithm.  The only way that the victim can recover them ...

Read More

How To Recognize a Phishing Email

How To Recognize a Phishing Email Introduction – The First Phishing Attack Truth be told, Phishing has been around for quite a long time.  In fact, it even predates the era of the Internet Bubble, which occurred in the mid to late 90’s.  The first known Phishing attack that was made public happened to AOL, in 1999.  ...

Read More

Valentine’s Day Phishing Heartbreaks

It is time to remind your users that heartless con artists use social engineering tactics to trick people looking for love.  The FBI's Internet Crime Complaint Center warns every year that scammers use poetry, flowers, and other gifts to reel in victims, the entire time declaring their "undying love." These callous criminals -- who also troll ...

Read More

An Introduction to Spear Phishing – Part 3

Incidents of Spear Phishing As we have reviewed, Spear Phishing, is quite different than the normal Phishing attack.  In these cases, the Cyber attacker just merely launches an all-out attack, in the hopes of being able to harvest sensitive information and data.  In these cases, typically, a hijacked e-mail address book (or even many of them) ...

Read More