We are sorry, the event "Threat Mitigation: 5 Keys to Successful Use of Active Directory" has already expired.
When migrating Microsoft 365 tenants during mergers, acquisitions, and divestitures, it’s essential to keep your users communicating and collaborating during and after the migration ― without even the slightest interruption. This is especially important since so many employees are working remotely. And, you want to maintain coexistence between the tenants for as long as necessary.Sounds easy enough, right? Maybe not so much.How smoothly this
Learn the techniques attackers use in order to compromise an organization and how to best effectively prioritize and combat threats.
Learn how Microsoft delivers knowledge and insights built on the Microsoft Graph, utilizing Project Cortex, Workplace Analytics, SharePoint, and Search.
Cybersecurity threats are always evolving. And with more people working from home than ever before, the chances that your IT environment can be infected has drastically increased. But it doesn’t have to be that way. With efficient permissions reporting and effective permissions management, you can stay on top of access in your IT environment to keep your users and data safe.In this 30-minute demo, we’ll explore how t
Learn everything an architect needs to know about WebAuthn, CTAP2 and the internal workings of Microsoft's hybrid FIDO2 implementation.
Discover the recent state of cyberattacks and how using the MITRE ATT&CK Framework as a guide can help to identify where you are most vulnerable.
Randy Franklin Smith explores security dependencies between DCs, domains, forests, synchronization, and other potential issues in a global AD environment.
Learn how applications can be abused for sustained persistence, how these permissions work, and what overprivileged looks like in your environment.