Carl Feldman
Carl Feldman
  • 17
  • 58 444
How To Set Up MFA in Microsoft Entra Conditional Access
In this comprehensive tutorial, I walk you through the process of setting up Multi-Factor Authentication (MFA) in Microsoft Entra Conditional Access. Discover how to enhance your organization's security by requiring an additional layer of protection for user sign-ins, ensuring only authorized access to critical resources. Don't miss this essential guide for IT admins and security professionals looking to strengthen their defense against cyber threats. Watch now and start securing your environment today! 🔐💻 #CyberSecurity #MicrosoftEntra #MFA"
มุมมอง: 7 276

วีดีโอ

How To Create Device Groups In Microsoft Endpoint
มุมมอง 8K2 หลายเดือนก่อน
Device Groups in Microsoft Defender for Microsoft XDR Walkthrough. Are you looking to streamline device management within Microsoft Defender for Endpoint? In this video, we’ll walk through the step-by-step process of creating device groups in Microsoft XDR. Whether you're managing a small team or a large organization, understanding how to categorize and group your devices effectively can signif...
How To Connect Sentinel To Microsoft Defender XDR
มุมมอง 2.4K2 หลายเดือนก่อน
This video is about how to connect Microsoft Sentinel which is a SIEM to Microsoft Defender XDR. In this video, I’ll walk you through the entire process of connecting Microsoft Sentinel to Microsoft XDR, creating a powerful synergy between these tools to streamline threat detection and response. With Sentinel’s advanced analytics and XDR’s unified incident management, integrating these platform...
How to Create Windows EC2 Instance NEW 2024 AWS
มุมมอง 4876 หลายเดือนก่อน
Windows EC2 Instances Made Easy: Step-by-Step Guide! In this video, we’ll walk through the entire process-from launching your first Windows EC2 instance to configuring security groups and connecting via RDP. Buckle up, because cloud computing just got a whole lot more exciting! 🚀🔍💻 Like and subscribe!!! comment what else you'd like to learn Happy cloud adventures! 😊🌐
How To Create Anti-Malware Policy on Microsoft Defender
มุมมอง 2056 หลายเดือนก่อน
Safeguarding Your Systems: A Step-by-Step Guide to Crafting Effective Antimalware Policies.Navigating the Security Maze: Crafting Effective Antimalware Policies in Microsoft Defender” In this comprehensive 500-word guide, we delve into the intricacies of antimalware policies within Microsoft Defender. From the initial click on “Threat Policies” to the final configuration, we demystify the proce...
Have Your Email Passwords Been Leaked To The Dark Web Or Data Breached?
มุมมอง 1216 หลายเดือนก่อน
How to tell if your email passwords have been in a data breach and leaked to the dark web. If they have been I will instruct you on what to do. In this video, we’ll explore how to determine if your email address has been part of a data breach and whether your passwords are at risk. Stay tuned for essential steps to take if your information has been compromised! 🔍🌐 I will be using haveibeenpwned...
Automate Scanning Website Vulnerabilities Beginner Friendly
มุมมอง 457 หลายเดือนก่อน
Using this great tool nessus you can automate scanning for web application vulnerabilities bwhich can be done no matter your level. www.tenable.com/products/nessus/nessus-essentials
Boosting SOC Teams Efficiency: Automating Low-Level Alerts and Incident Assignment.
มุมมอง 1117 หลายเดือนก่อน
How to Create An Automation Rule that closes low & Infomational severity Incidents Microsoft Sentinel. In this video, we dive into creating automation rules that streamline incident management. Learn how to automatically close low and informational incidents, allowing your SOC analysts to focus on critical threats. Plus, discover how to assign low-severity alerts to junior analysts, freeing up ...
How To Onboard Devices To Defender For Endpoint Microsoft XDR New 2024
มุมมอง 1.8K9 หลายเดือนก่อน
How to onboard a Microsoft Windows ( azure) VM to Defender for endpoint. This is the same process for any Windows computer/laptop or so forth. In this step-by-step tutorial, I guide you through the process of onboarding your Windows 10 virtual machine to Microsoft Defender for Endpoint. Learn how to enhance your system’s security, detect threats, and respond effectively using this powerful endp...
Microsoft Sentinel Playbook that Emails you when you've been hacked
มุมมอง 79410 หลายเดือนก่อน
In this video I create a Microsoft Sentinel Playbook that emails you when an incident occurs. This incident is found via an analytics rules which we will attach this Microsoft playbook to. I'll demonstrate a Microsoft playbook that triggers email notifications for security incidents. We'll discuss the benefits of instant alerts and how this playbook can enhance your team's response times.
How To Become A KQL (Kusto Query Language) Expert Very Quickly For Free
มุมมอง 20211 หลายเดือนก่อน
The secret and best way to become a KQL expert is here. A fun, free and practical way to learn KQL. Discover the Best Way to Master KQL - It's FREE! If you're in cybersecurity, IT, or just fascinated by data analysis, you need to know KQL (Kusto Query Language). It unlocks powerful insights from massive datasets! In this video, I reveal why KC7Cyber.com is the absolute best way to learn KQL. Wh...
Cloud Cybersecurity Projects For Microsoft Take Whilst Itis Free
มุมมอง 84ปีที่แล้ว
learn.microsoft.com/en-us/credentials/browse/?credential_types=applied skills Microsoft Applied Skills is a new way to validate your cybersecurity skills and showcase them to potential employers. This hands-on assessment program allows you to demonstrate your ability to implement real-world cybersecurity projects using Microsoft Sentinel and Microsoft Defender for Cloud. In this video, I'll wal...
Secure Azure Virtual Machine using Defender For Cloud And NSG.
มุมมอง 523ปีที่แล้ว
In this video, I will show you how to create a virtual machine (VM) using PowerShell script, associate a network security group (NSG) to a subnet, restrict RDP access to only your IP address, and use Microsoft Defender for Cloud to secure your VM. Azure VMs are a popular choice for running workloads in the cloud, but it is important to secure them properly to protect them from threats. This top...
Simulating A Brute Force Attack & Investigating With Microsoft Sentinel
มุมมอง 7Kปีที่แล้ว
I will simulating a brute force attack on Azure VM and then use Microsoft Sentinel logs to see details on the attack. I create Sentinel Analytics rule and I will close the investigation as benign postive.
How to Add Donate Button On Facebook Page
มุมมอง 27K9 ปีที่แล้ว
How to Add Donate Button On Facebook Page