Error Reported when connecting to SPO Admin URL Connecting to {PnP}…❌ Unable to retrieve SPO Admin URL Resolution: When we get into the error log file, Found the following details The application used to connect to Pnp PowerShell of SharePoint has not been registered with the Legacy ACS Model. Also the application Secret is not […]
In this article, we will focus on how to Integrate Microsoft Defender XDR and Microsoft Sentinel and perform SIEM Activities in one place on Microsoft Defender Portal – https://security.microsoft.com/ n n It would be great to focus on Microsoft 365 Activities and get it done easily without checking multiple portals. Let's begin, n n Note: […]
Error Reported when connecting to SPO Admin URL Connecting to {PnP}…❌ Unable to retrieve SPO Admin URL Resolution: When we get into the error log file, Found the following details The application used to connect to Pnp PowerShell of SharePoint has not been registered with the Legacy ACS Model. Also the application Secret is not […]
Previous Articles Part 1: Microsoft Sentinel Implementation a Deep Dive- Part 1: Workspace Deployment Part 2: Microsoft Sentinel Implementation a Deep Dive – Part 2: Microsoft Sentinel Deployment Part 3: Microsoft Sentinel Implementation a Deep Dive – Part 3: Configuring Data Connectors Validating the Microsoft Sentinel Deployment In the Search Services and Marketplace box, enter […]
Previous Articles Part 1: Microsoft Sentinel Implementation a Deep Dive- Part 1: Workspace Deployment Part 2: Microsoft Sentinel Implementation a Deep Dive – Part 2: Microsoft Sentinel Deployment Part 3: Microsoft Sentinel Implementation a Deep Dive – Part 3: Configuring Data Connectors Part 4: Microsoft Sentinel Implementation a Deep Dive – Part 4: Deploy VM […]
Previous Articles Part 1: Microsoft Sentinel Implementation a Deep Dive- Part 1: Workspace Deployment Part 2: Microsoft Sentinel Implementation a Deep Dive – Part 2: Microsoft Sentinel Deployment Part 3: Microsoft Sentinel Implementation a Deep Dive – Part 3: Configuring Data Connectors Part 4: Microsoft Sentinel Implementation a Deep Dive – Part 4: Deploy VM […]
A distribution list is used to send emails to groups of people without having to enter each recipient’s individual email address in Microsoft 365 Login to O365 Admin Center -> Under Recipients -> Groups -> Distribution List ->Add a group. Select a group type Distribution and click Next. Enter Group name as per the request […]
Received the following Error when trying to get Azure Active Directory Application signing logs. Getting this error after even AzureAD Module is already installed and connected to AzureAD. Get-AzureADAuditSignInLogs : The term ‘Get-AzureADAuditSignInLogs’ is not recognized as the name of a cmdlet, function, script file, or operable program. Check the spelling of the name, or […]
BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2 or later. The TPM is a hardware component installed in […]
BitLocker recovery keys will be automatically deleted from device objects in Azure AD, in case they are deleted locally on the device. This will help keep Azure AD devices from accumulating too many recovery keys. Prerequisites: Steps: 4. Backup the key you just created to AAD by typing the following command from an elevated command […]