Recent Blog ArticlesMost RecentMost LikesMicrosoft Defender for Endpoint Commonly Used Queries and Examples Sometimes you forgot a few content lines in the needed "Advanced Hunting Query" of Microsoft Endpoint Protection (Microsoft Defender ATP), the following cheat sheet of commonly used MD ATP Queries ma...Microsoft Defender for Identity - Azure ATP Deployment and Troubleshooting Step-by-step deploying, testing and troubleshooting for Microsoft Defender for Identity (Azure ATP) LOG SENSOR AND TELEMETRY SERVICES IN ISOLATED NETWORK Microsoft Monitoring Agent connection, Telemetry connection, Stand-alone Sensor connection in Isolated Network. Re: DEPLOYING WINDOWS 10 APPLICATION CONTROL POLICY Managed Installer has to be combined with Applocker as per MS doc: -Setting up managed installer tracking and application execution enforcement requires applying both an AppLocker and WDAC policy ...DEPLOYING WINDOWS 10 APPLICATION CONTROL POLICY All things about WDAC – Windows Defender Application Control: Planning, Deployment, Testing, Monitoring, best practice, tips and Troubleshooting. Windows 10 - All Things About Application Guard Windows Defender Application Guard: features, advantages, configuration, testing and troubleshooting. Demystifying Ransomware Attacks Against Microsoft Defender Solution Examining how well the MD for Endpoint and Identity acted against ransomware attack. The proactive way to eliminate ransomware attack surface.Reviewing the Industry's standard, AV Lab tests, bi-mont...Re: How-To: Automated Company-Wide IP Blocking via Azure Firewall and Azure Functions Excellent article on automatic IP blocking. Thanks for your share of knowledge. Re: Azure Network Security Hygiene with Traffic Analytics It is a useful tool for Azure Network Admin. Re: Set Your Alert State Using Azure Automation This article answer for what my Customer was looking for, exactly. Thank you.