Recent Blog ArticlesMost RecentMost LikesRe: The power of Data Collection Rules: Monitoring PowerShell usage SpitFire-666Oh shoot! Thanks for letting us know. We fixed it; the changes should go live any minute. The power of Data Collection Rules: Detect Disabling Windows Defender Real-Time Protection Although Defender for Endpoint (MDE) consists of various protections against tampering and of alerts to detect it, adversaries are constantly trying to find a way to successfully circumvent and termi...The power of Data Collection Rules: Collecting events for advanced use cases in Microsoft USOP Monitoring Windows Security events is important to every organization's security. Security events can reveal a lot of information that might lead to the discovery of an attack, a sustained effort to ...How to use tagging effectively (Part 2) Tips and tricks from Steve Newby and Miriam Wiesner on how to get the best out of tagging in Microsoft Defender for Endpoint. The power of Data Collection Rules: Monitoring PowerShell usage PowerShell is a great tool for administrators to manage devices and servers in their environment. When using it to administer remote systems with PSRemoting, you don’t leave credentials behind on the...