Matt Soseman
Matt Soseman
  • 223
  • 1 171 931
Auto Isolate w/ PowerAutomate + Defender for Endpoint
Being able to automatically isolate a device from the network during a cyber incident can be beneficial, but how do you do that? With Microsoft Power Automate + Microsoft Defender for Endpoint!
More Info: learn.microsoft.com/en-us/defender-cloud-apps/flow-integration
Переглядів: 3 476

Відео

Isolate Devices During an Incident - Morning Cyber Walks w/ Matt
Переглядів 651Рік тому
Isolating a device from the network can be a useful remediation response during a cyber incident. Let's take a look at how to accomplish this with Microsoft Defender for Endpoint. More Information: learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/respond-machine-alerts?view=o365-worldwide#isolate-devices-from-the-network
Authentication Strengths in Azure AD - Morning Cyber Walks w/ Matt
Переглядів 374Рік тому
On my morning walk and wanted to share some thoughts... Sorry about the wind. Using Authentication Strengths in Azure AD Conditional Access can be beneficial to help meet technical and business goals, especially if wanting to require Passwordless. More information: learn.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-strengths
I have big news to share with you...
Переглядів 620Рік тому
A quick channel update. I left Microsoft and started a company. www.thepartnermasters.com P.S. Sorry about the audio only on the left channel, my fault! :)
Identity Secure Score (60 secs)
Переглядів 1,3 тис.Рік тому
Assessing configuration of your Azure Active Directory tenant is important to understand if you are aligning to Microsoft best practices. I'd like to show you a neat little tool that allows you to do exactly that! More information: docs.microsoft.com/en-us/azure/active-directory/fundamentals/identity-secure-score
How can Passwordless make new hire onboarding even easier...?
Переглядів 2,8 тис.Рік тому
I got a new microphone! .. Using a Temporary Access Pass is a wonderful way to allow a new hire to register a password less method such as a FIDO2 security key and provision a new Windows PC without IT intervention. In today's video I take this a step further by introducing Conditional Access, Device Compliance and Windows Intone into the architecture that makes this an even more seamless and e...
I used passwordless first day on the job
Переглядів 4,2 тис.Рік тому
I used a passwordless to get my work computer setup my first day on the job. In this video I cover the user experience of how to register a FIDO2 Security Key on a personal computer (Mac) and setup a Windows 11 computer using that key without a password. I also show you how to set this up in Azure Active Directory and Microsoft Intune. Stay tuned as I'm planning on releasing a video for Passwor...
Design a Device Compliance Architecture
Переглядів 1,9 тис.Рік тому
A key part of Zero Trust architecture is to ensure the devices connecting to your environment are compliant with IT policy. Join me as we learn how to approach device compliance with Microsoft Endpoint Manager! Link to deck:1drv.ms/p/s!AhzQ4p0K1fqij8ZNQa8hI63ZpVz7QQ?e=NeRtUh Gear: -Sony A6400 4K DLSR -Elgato Key Light -Sigma 30mm 1.4f Lens -Camtasia Editing Software -Elgato 4K Capture Stick -Bl...
Ignite is back and in-person! #shorts
Переглядів 3692 роки тому
ignite.microsoft.com/en-US/home
How to remote wipe macOS w/ Microsoft Endpoint Manager
Переглядів 2,4 тис.2 роки тому
Do you have macOS devices in your environment and manage them with Microsoft Endpoint Manager? Join me as we look at how to remote erase them in the even they are lost or stolen... Resources: More info on Apple Hardware Security: support.apple.com/guide/security/hardware-security-overview-secf020d1074/1/web/1 Activation Lock on Apple devices: support.apple.com/guide/deployment/activation-lock-d...
Block SaaS Apps w/ Power Automate + Defender for Endpoint + Defender for Cloud Apps!
Переглядів 1,9 тис.2 роки тому
How can you email the SecOps team when a new SaaS app is discovered, AND give them the option to allow or block automatically? Watch to find out...! Here's the JSON schema I show in the video, special thanks to the individuals that helped me with this! { "type": "object", "properties": { "Type": { "type": "string" }, "AppId": { "type": "integer" }, "Name": { "type": "string" }, "Domains": { "ty...
My car has 2FA
Переглядів 8372 роки тому
My car has 2FA
Does Zero Trust even matter?
Переглядів 9832 роки тому
The industry talks a lot about "Zero Trust", and many of us in IT and Cyber view it as a buzzword. Is this important and something that we should pay attention to?
Risky User & Confirm Compromise API in Azure AD
Переглядів 3,2 тис.2 роки тому
Risky User & Confirm Compromise API in Azure AD
Block access using hardware serial numbers (AAD+Intune)
Переглядів 3,2 тис.2 роки тому
Block access using hardware serial numbers (AAD Intune)
Reliving my childhood through Xbox Cloud Gaming
Переглядів 2722 роки тому
Reliving my childhood through Xbox Cloud Gaming
Do this to increase cyber posture and lower risk...
Переглядів 1,1 тис.2 роки тому
Do this to increase cyber posture and lower risk...
Building an IT Career Foundation
Переглядів 4472 роки тому
Building an IT Career Foundation
This is the easiest chore I have all weekend… (Windows 365 Cloud PC)
Переглядів 1,1 тис.2 роки тому
This is the easiest chore I have all weekend… (Windows 365 Cloud PC)
How to Build a Cyber Security Architecture...
Переглядів 1,8 тис.2 роки тому
How to Build a Cyber Security Architecture...
Azure Defender for IoT Ep 13: Attack Vectors
Переглядів 6423 роки тому
Azure Defender for IoT Ep 13: Attack Vectors
Azure Defender for IoT Ep 12: Risk Assessment
Переглядів 5443 роки тому
Azure Defender for IoT Ep 12: Risk Assessment
Azure Defender for IoT Ep 11: Trends & Statistics
Переглядів 4593 роки тому
Azure Defender for IoT Ep 11: Trends & Statistics
Azure Defender for IoT Ep 10: Data Mining
Переглядів 4813 роки тому
Azure Defender for IoT Ep 10: Data Mining
Azure Defender for IoT Ep 9: Event Timeline
Переглядів 5923 роки тому
Azure Defender for IoT Ep 9: Event Timeline
Azure Defender for IoT Ep 8: Working with Alerts
Переглядів 7803 роки тому
Azure Defender for IoT Ep 8: Working with Alerts
Azure Defender for IoT Ep 7: Device Inventory
Переглядів 8153 роки тому
Azure Defender for IoT Ep 7: Device Inventory
Azure Defender for IoT Ep6: Devices Map
Переглядів 1,1 тис.3 роки тому
Azure Defender for IoT Ep6: Devices Map
Azure Defender for IoT Ep5: Azure Sentinel Integration
Переглядів 1,5 тис.3 роки тому
Azure Defender for IoT Ep5: Azure Sentinel Integration
Solarwinds and SUNBURST attacks compromised my lab!
Переглядів 1,1 тис.3 роки тому
Solarwinds and SUNBURST attacks compromised my lab!

КОМЕНТАРІ

  • @poppin_U
    @poppin_U 6 днів тому

    How do I prevent a particular app being blocked by Smartscreen which I am trying to install? Device is being maintained by Intune.

  • @townnine
    @townnine 16 днів тому

    old videos doesn't work anymore

  • @gggal123
    @gggal123 22 дні тому

    Great video

  • @niranmanandhar8517
    @niranmanandhar8517 Місяць тому

    Amazing content thank you .Going passwordless sounds great but how are we going to authenticate on MSFT native apps in Android and apple devices like outlook or teams onedrive?

  • @AnnaSirne-n7r
    @AnnaSirne-n7r Місяць тому

    Awesome explanation! Thank you!

  • @Eric-t3y
    @Eric-t3y Місяць тому

    Open PowerShell Admin ************************************************************************************************ Set-ExecutionPolicy bypass Install-Script -Name Get-WindowsAutopilotInfo -force [Y] Yes Get-WindowsAutopilotInfo -Online ************************************************************************************************* (If you copy this for later use give a like please!)

  • @iamkapilkalra
    @iamkapilkalra Місяць тому

    Does this block work on mobile as well? As in if I have the word doc open in Edge browser on mobile, will it work there too?

  • @MotivationalVideo-SagarD
    @MotivationalVideo-SagarD Місяць тому

    Thank you bro

  • @rachitmishra6051
    @rachitmishra6051 Місяць тому

    Does it require any log server setup beforehand

  • @shyamsundar1985
    @shyamsundar1985 Місяць тому

    hi, great video. Can you make another video explaining how to authenticate an Azure app in Tableau server i.e. the changes that we need to do in Tableau server settings to register an azure app, so that an external application can access the work book, reports from Tableau via this Azure app..that will be great. Thanks :)

  • @irfankazi3518
    @irfankazi3518 2 місяці тому

    Helpfull

  • @scooter825
    @scooter825 2 місяці тому

    Hey Matt love your stuff...this is great to know. All of the sudden my Tenant is inspecting and at times blocking copy and paste into web apps....Any idea what kind of policy that might live in?

  • @rupamchoudhury6861
    @rupamchoudhury6861 3 місяці тому

    , but does not meet the criteria to access this resource

  • @TheKojootti23
    @TheKojootti23 3 місяці тому

    Does MAM model block user for adding organisation user to non-managed application for example non-managed mail app?

  • @kb8570
    @kb8570 3 місяці тому

    THANK YOU! I was looking for this!

  • @pizzel
    @pizzel 3 місяці тому

    hey there, im getting error 65000, on devices that I'm trying to configure these settings: windows 11 ver 22h2

  • @ShiningMTV
    @ShiningMTV 4 місяці тому

    This no longer works as of Aug 2022.

  • @user-kt5jo7py2z
    @user-kt5jo7py2z 4 місяці тому

    Hello ! Do you have service to read sensitive data file on web browser ?

  • @mahi4udear
    @mahi4udear 5 місяців тому

    Hi Matt, thank you for the video. I want to block third-party uploads, but we won't label documents. Can we still deploy this policy?

  • @bradstevens8798
    @bradstevens8798 5 місяців тому

    Does this process still work in 2024? I set this up exactly the same but it still allows the device to enroll and personal and never shows the serial number as Enrolled :(.

  • @angelschafer7770
    @angelschafer7770 5 місяців тому

    Really interesting content, thanks!

  • @georgewashington3012
    @georgewashington3012 5 місяців тому

    Excellent overview. Some of those functions seem like hooks just because they can offer hooks, not because they provide value. UEBA sounds interesting though.

  • @mritorto1
    @mritorto1 6 місяців тому

    i dont see that option to block storage at all is this for an older version

  • @user-hi2nr3gx6f
    @user-hi2nr3gx6f 6 місяців тому

    Hi, very nice explanation, i have a query, by configuring this do we can see email activity log in MCAS, i am no seeing any documentation or information specifically for Gmail user activity logs into MCAS, any help on this that will be useful, thanks

  • @fyrstrike
    @fyrstrike 6 місяців тому

    Hey Matt, this was great to see. I got right through it, but now I'm stuck just few screens after this last screen at time 2:30. Once the device is wiped the setup gets to the Remote Management screen where I click Enroll. A sign-in window appears and asks for credentials: Enter your credentials for "COMPANY NAME". But no matter what credential I enter it won't proceed any further. What credentials do I need to enter? if it's a user, the user has no MFA setup on the account and is not a part of any conditional access policies. Does an admin user enter credentials? or is it something else? can't find any info anywhere else on this detail.

  • @rajivsharaf99
    @rajivsharaf99 6 місяців тому

    With O365 MDM is available. Can we achieve the objective of whitelisting personal devices ?

  • @taofeekadisa7619
    @taofeekadisa7619 6 місяців тому

    How can I fully automate this process on power automate or any other tool?

  • @amadoumane7600
    @amadoumane7600 8 місяців тому

    Thanks you so much 🎉

  • @amadoumane7600
    @amadoumane7600 8 місяців тому

    Thanks you so much 🎉

  • @rewindchildhood153
    @rewindchildhood153 8 місяців тому

    So what is the way to fix it

  • @user-ym7bn5hs7m
    @user-ym7bn5hs7m 9 місяців тому

    Anyone have an idea how to do this with a Mac?

  • @matthewunverferth2200
    @matthewunverferth2200 9 місяців тому

    should probably update this video to reflect what we're seeing now

  • @matthewunverferth2200
    @matthewunverferth2200 9 місяців тому

    this video needs to be updated

  • @user-mq6fd7wh2k
    @user-mq6fd7wh2k 9 місяців тому

    Hi Matt how would we do this if we are on Gsuite rather the Microsoft environment? Thank you for your help.

  • @chrismorganofficial
    @chrismorganofficial 10 місяців тому

    Hey Matt, Really great explanation! Would love to know if we can download this file as it isn't available on the link provide.

  • @DomClimbs
    @DomClimbs 10 місяців тому

    but how does it see the tenant? does this require having intune running on a local server and the client device being on the same network?

  • @stevenhageman8255
    @stevenhageman8255 10 місяців тому

    Hey Matt, is there a way to remove "all apps" I want users to see apps that are appointed to them in a collection.

  • @amitmanolkar
    @amitmanolkar 10 місяців тому

    Hello Matt, is there any integration available where we can send the Activity Explorer data/ DLP incident and alerts info into external SIEM?

  • @mohamedshaaban5446
    @mohamedshaaban5446 10 місяців тому

    How to map user profile photo from azure AD to slack?

  • @fiinstrumental
    @fiinstrumental 11 місяців тому

    Hi Matt. Pleas i have a question. I wuld like to lock some files to a, specific hardware by serialnumber. So only that hardware can open it. Pleas if you have any idea on how to do that HELP PLEAS. Any software that can do that?. I use a Synthisizer that has a, serial number,so i wuld like to lock my sounds and files to my synthisizers serialnumber, so olny my synthisizer recodnize those files. So if you try to putt same foldes to another synthisizer that is same model but different serialnumber it should not open it. Pleas any advice or sokution or software that can make it PLEAS BEGING you

  • @gachigabe5895
    @gachigabe5895 11 місяців тому

    Or turn off connect on demand

  • @tyronedeklerk
    @tyronedeklerk 11 місяців тому

    How can you edit that small toast message that pops up on the users machine after isolation? Example at 1:20

  • @biswajeetrout3893
    @biswajeetrout3893 11 місяців тому

    can you please share the slide if possible

  • @austinnovitsky5173
    @austinnovitsky5173 11 місяців тому

    I have been working at MSPs for around 6 years and I'd add what are the ways we can retire legacy systems, and modernize infrastructure quickly to prevent security risks and daily performance issues in a business environment where we have to spread cost over time?

  • @ploidemedia
    @ploidemedia Рік тому

    Whilst amazingly cool, I have noticed this is really hit and miss - we have had an issue for over 12 months, that MS themselves cannot even solve, a simple DLP rule (for Exchange online) - applied to one group of users, block sensitive information enabled + allow overrides (with business justitication). It works fine for one user in the group its applied to, but the other users after pressing send and entering justification, just have their messages blocked. Beyond frustrating.

  • @saidbela5529
    @saidbela5529 Рік тому

    Hi Matt, Nice demo. I have use case where I need to block file download from OneDrive and SharePoint to any external application application not defined in our tenant. is possible to set this ?

  • @fifitomanalotto5887
    @fifitomanalotto5887 Рік тому

    What about screenshot?

  • @Pearl_1
    @Pearl_1 Рік тому

    Will it collect data of other apps on personal device?

  • @arsxthelegend2897
    @arsxthelegend2897 Рік тому

    Is there a way to allow a removable device once an administrators password has been entered. If the device is removed and re-inserted it would need to be re-entered?

  • @user-vv8ww9by1c
    @user-vv8ww9by1c Рік тому

    valuable :)