A while ago, I wanted to ensure that all endpoints in the company where I was responsible for security were fully updated. Since we had a consistent Windows 10 environment, the task was to verify that the latest Microsoft Cumulative…
A long time ago, when Microsoft Entra ID was still called Azure Active Directory, and Microsoft 365 was known as Office 365, I managed a cloud migration for one of my customers. The objective was simple but ambitious: eliminate every…
Some time ago, I became concerned about unnoticed sources that had stopped sending logs to our SIEM system. This issue can have serious consequences, ranging from undetected attacks to compliance violations, so I began searching for a reliable solution. The…
Some time ago, I had the opportunity to configure File Integrity Monitoring (FIM) on the CrowdStrike platform. The setup was relatively straightforward, except for one aspect – email alerts. When configuring notifications for file changes, I found two native options…
Many years ago, I was concerned about how passwords were sent in the organization where I worked. We didn’t have any standardized solution, so various methods such as mobile texts, emails, and chat were used – methods that weren’t necessarily…
In today’s digital landscape, Multi-Factor Authentication (MFA) is becoming a standard security measure across various platforms, from Microsoft 365 to online applications and server access. But should we extend MFA to laptop and workstation logins? The answer isn’t straightforward, as…
Some time ago, I was assigned the task of implementing a File Integrity Monitoring (FIM) solution for PCI-DSS compliance. At that time, I was managing Cortex XDR as the company’s Endpoint Protection, but it did not include a dedicated FIM…