Microsoft Defender XDR in Action: Defender for Office 365 & Defender for Endpoint
A practical deep dive into Microsoft’s Extended Detection and Response strategy, connecting signals across Office 365 and Endpoints to build automated defense.
Join the list and I’ll drop my newest blog posts into your inbox every week—no spam, just tech wisdom (and maybe a coffee joke)
Γράψου στη λίστα και θα λαμβάνεις κάθε εβδομάδα τα νέα μου άρθρα – χωρίς spam, μόνο IT γνώση (και λίγη δόση χιούμορ)
You have successfully joined our subscriber list.
A practical deep dive into Microsoft’s Extended Detection and Response strategy, connecting signals across Office 365 and Endpoints to build automated defense.
XDR in Action: Mastering Microsoft Defender Join my session for a practical deep dive into Microsoft’s Extended Detection and Response strategy, connecting signals across Office 365 and Endpoints to build automated defense. Saturday Feb 14 2026, 11:00 (UTC+2). See my session here and check the conference page here.
Δήλωσε συμμετοχή στο Microsoft Masterclass για να βελτιώσεις τη καριέρα σου εδώ: https://systemplus.gr/masterclass/ Πάρε την έκπτωση για το NordVPN εδώ: https://nordvpn.com/special/?utm_medium=affiliate&utm_term=&utm_content=&utm_source=aff112236&utm_campaign=off15
For years, the phrase “Windows Defender” conjured images of a basic, free utility that you disabled the moment you installed a “real” antivirus. That era is long gone. Today, Microsoft Defender for Endpoint (MDE) is a completely different beast. It is no longer just a virus scanner; it is a holistic, cloud-native security platform that…
As cyberthreats accelerate in both sophistication and volume, many security teams are struggling to keep pace with internal talent gaps and overloaded SOCs. To help organizations modernize their defenses and strengthen cyber resilience, Microsoft has introduced the Microsoft Defender Experts Suite: a unified, expert-led managed security offering that brings together proactive threat hunting, incident…
2025: A Year of Growth, Knowledge Sharing, and Community Impact As 2025 comes to a close, it’s a great moment to pause and reflect on a year full of learning, collaboration, and meaningful milestones. This year was all about one thing: helping IT professionals grow their skills, confidence, and careers in the Microsoft ecosystem. Empowering…
At Microsoft Ignite, Microsoft shared the newly enhanced Microsoft Purview Data Security Posture Management (DSPM) experience—an AI-powered, centralized solution that focuses on the goals your organization needs to accomplish, and helps you strengthen data security to confidently embrace AI apps and agents with actionable insights, new third-party signals, and Security Copilot agents. Check the original article…
Deploying Microsoft Defender for Endpoint across Windows devices can be challenging, especially in environments that mix modern and legacy operating systems. The new Defender deployment tool (preview) helps simplify this process by automating installation, prerequisite checks, and onboarding without the need for complex scripts. Why Use the Tool The tool provides several key advantages: This…
At #HIPConf25, Linda Taylor and Cliff Fisher from Microsoft’s AD team shared a powerful truth:“Things that 20 years ago were features are now becoming vulnerabilities.” If you manage identity security, this session is a wake-up call and a roadmap. You’ll learn: ✅ Why AD still matters in a hybrid world✅ How Microsoft is hardening AD…
🎉 Today, the 22nd of November, I celebrate 25 years as a Microsoft Certified Trainer (MCT) – a milestone that represents a quarter of a century dedicated to sharing knowledge, empowering IT professionals, and growing alongside the ever-changing world of technology. Reflecting on the Journey When I first became an MCT back in…
This year, I’ll be delivering a session on Microsoft Copilot for Security, exploring how AI transforms the way security professionals detect, investigate, and respond to threats. Sinergija has always been one of the most inspiring Microsoft community events in the region, bringing together IT pros, decision-makers, and innovators who share the same passion for technology…
Microsoft has been recognized as a Leader in the IDC MarketScape: Worldwide Extended Detection and Response (XDR) Software 2025. This recognition highlights Microsoft’s comprehensive coverage across endpoints, identities, email, SaaS, cloud workloads, and data security — delivering unified visibility and response that goes beyond fragmented tools. With AI-powered automation and built-in attack disruption, Defender XDR…
Are you preparing for a Microsoft Certification exam? Go and check the Practice Assessments on Microsoft Learn, a free exam preparation resource that allows you to assess your knowledge and fill knowledge gaps so that you are better prepared for your certification exam. These assessments provide you with an overview of the style, wording, and…
In this episode, we explore the new Microsoft Defender for Identity sensor. Senior Product Manager Mark Thomas discusses the new sensor, including updated requirements, how this next-gen design simplifies deployment and what’s next. Whether preparing for a fresh rollout or migrating from the classic version, this discussion offers valuable insights for security teams focused on…
Highlights from the latest release:🔹 Security Store – a marketplace for ready-to-use Copilot agents.🔹 No-code agent creation – empower analysts to build automation without coding.🔹 Deeper Sentinel integration – richer data, faster incident response.🔹 Custom promptbooks – standardize and streamline SOC workflows. These updates bring more automation, consistency, and accessibility to SOC operations – helping…
Tune in to gain insight from Microsoft MVP Ru Campbell as he shares Defender for Endpoint settings recommendations that can help you avoid common mistakes and misconceptions. From tailored configurations to different device and user personas, discover how to strike the right balance between security, productivity, and performance for your specific scenarios.
In this session, we’ll demystify Security Compute Units (SCUs) by unpacking what they are, how they function, and more! Security Compute Units (SCUs) are the required resource units that power Microsoft Security Copilot, ensuring dependable and consistent performance across both standalone and embedded product experiences within Microsoft Security. In this session, we’ll demystify SCUs by unpacking:…
I recently came across an excellent LinkedIn post by Kavya A., highlighting how PowerShell and AdminDroid can work together to simplify Microsoft 365 reporting. (Thank you, Kavya, for the inspiration!) This is the original Linkedin post (you can still find it here). “𝟐𝟎𝟎+ 𝐏𝐨𝐰𝐞𝐫𝐒𝐡𝐞𝐥𝐥 𝐒𝐜𝐫𝐢𝐩𝐭𝐬 𝐄𝐯𝐞𝐫𝐲 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝟑𝟔𝟓 𝐀𝐝𝐦𝐢𝐧 𝐒𝐡𝐨𝐮𝐥𝐝 𝐇𝐚𝐯𝐞. Tired of hunting for…
Microsoft’s latest announcement around Sovereign Cloud solutions marks an important milestone for European organizations. At the center of this news is Microsoft 365 Local — a new way to run productivity services like Exchange and SharePoint inside environments fully controlled by the customer, powered by Azure Local. Why Microsoft 365 Local? For many organizations in…
We’re excited to announce CollabDays Greece 2025 — coming to Greece for the very first time! 🎉 CollabDays is a global series of community-driven events dedicated to Microsoft 365, Power Platform, Collaboration, and Modern Work. In 2025, Greece proudly joins the map, bringing together IT professionals, developers, business users, and community leaders to share knowledge,…
In a world where cloud platforms, remote work, and cyber threats evolve more rapidly than ever, simply erecting higher firewalls and bolstering traditional perimeter defenses is no longer enough. Security must be redesigned with the assumption that compromise is inevitable—and trust must never be granted by default. Enter Zero Trust: a security philosophy that shifts…
Microsoft is introducing a new wave of agentic security with Security Copilot. Instead of relying only on prebuilt options, security teams can now create custom agents — either with a no-code interface using natural language or with full developer tools. New agents like the Phishing Triage Agent and Access Review Agent show how everyday security…
In today’s cloud-driven workplace, data is constantly being created, shared, and stored across multiple platforms. Without a solid classification strategy, organizations risk losing control over their most sensitive information. Microsoft 365, through the Purview compliance portal, provides a set of powerful tools for discovering, labeling, and governing data across the environment. Here’s a breakdown of…
Are you eager to elevate your workplace productivity using artificial intelligence? Good news—Microsoft now offers a free, self-paced learning path designed to help you do just that. What’s Included? This free Learning Path is tailored for beginners and business users who want to become skilled in using Microsoft 365 Copilot across real-world scenarios. You’ll walk…
In a cybersecurity era defined by sophisticated adversaries and relentless ransomware campaigns, having a partner that not only defends but also anticipates threats is crucial. Microsoft has just achieved a remarkable milestone—being named a Leader in the 2025 Gartner Magic Quadrant for Endpoint Protection Platforms, marking its sixth consecutive year in this esteemed position. Outpacing…
In today’s cybersecurity landscape, phishing remains a growing and pervasive force. Attackers employ increasingly sophisticated tactics, leveraging AI-generated emails that blend seamlessly into legitimate communications. This upsurge in threat sophistication has burdened security operations center (SOC) teams with constant alert fatigue—often sifting through thousands of user-reported emails just to find a handful of real threats.…
Ever felt trapped in the labyrinth of Microsoft’s portals? If you’ve ever worked with Microsoft technologies, you know the struggle: dozens of different admin centers, user portals, dashboards, and tools—each with its own unique web address. Remembering them all is nearly impossible, and hunting them down eats up valuable time. That’s where MSPortals.io comes in.…
Introduction In today’s digital landscape, where cyber threats evolve by the minute, a reactive security posture is no longer sufficient. Organizations must adopt intelligent, proactive strategies to safeguard their endpoints — and that’s exactly what Microsoft Defender Vulnerability Management brings to the table. Available as part of Microsoft Defender for Endpoint Plan 2, this tool…
1. Overview and Context Zero-Hour Auto Purge (ZAP) is a post-delivery remediation mechanism built into Exchange Online Protection (EOP), enabling retroactive mitigation of malware, phishing, and spam threats after messages have entered cloud mailboxes. This functionality arises in response to two critical realities: Evolving threat intelligence: New spam/malware signatures and heuristics are continuously updated,…
Microsoft now offers new interactive use cases for the Cybersecurity Course SC-100, and they are FREE! 🔗 Direct links to the interactive use cases:– Identity Data Security: https://learn.microsoft.com/en-us/training/modules/case-study-identity-data-security/– Access Control Threat Resilience: https://learn.microsoft.com/en-us/training/modules/case-study-access-control-threat-resilience/– Apps Data Protection: https://learn.microsoft.com/en-us/training/modules/case-study-apps-data/– Endpoints Infrastructure Security: https://learn.microsoft.com/en-us/training/modules/case-study-endpoints-infrastructure/ And don’t forget to check the Microsoft Official Courseware for SC-100 located here: https://learn.microsoft.com/el-gr/training/courses/sc-100t00?wt.mc_id=esi_m2l_content_wwl#study-guide
As of now, Microsoft is retiring its legacy Multi-Factor Authentication (MFA) and Self-Service Password Reset (SSPR) policies. Starting September 30, 2025, these older policies will no longer be configurable, prompting enterprises and IT admins to transition to the unified and far more flexible Authentication Methods Policy within Microsoft Entra ID. Why migrate? Migration Options: Automated…
The internet can feel like a minefield—just one misstep, one careless click, and suddenly you’re handing over access to malware, stolen data, or worse. One of the more clever and dangerous tricks making the rounds lately is called ClickFix. It’s a social engineering method that looks innocuous, but packs a nasty punch. What is…
The “Secure sensitive data with Microsoft Purview Ninja training scenarios” learning path offers intermediate-level guidance designed for administrators working with Microsoft Purview and Microsoft 365. It consolidates information protection fundamentals and advanced data loss prevention strategies through five practical, real-world scenarios. Participants explore how to classify sensitive information, apply protection with sensitivity labels, enforce DLP policies…
Microsoft researchers at Cambridge have developed a prototype analog optical computer (AOC)—a computing device that leverages light (via micro‑LEDs, optical lenses, and camera sensors) rather than traditional binary electronics to perform computations. Their goal was to utilize commercially available components to build a system that could operate at room temperature, be energy-efficient, and scalable. The…
Microsoft Zero Trust Workshop: What It Is and How It Works In today’s cybersecurity landscape—marked by increasing complexity, hybrid environments, and sophisticated threats—organizations need a clear, actionable framework for robust security. Enter the Microsoft Zero Trust Workshop, a self-service, technically guided toolkit designed to help customers and partners adopt and operationalize Zero Trust principles across…
Microsoft Defender XDR has evolved into a powerful, unified platform for detecting, investigating, and responding to modern cyber threats. One of the most critical capabilities it provides to security analysts is Live Response. This feature empowers defenders to establish a secure, interactive session with endpoints or servers under investigation, enabling immediate collection of forensic data…
Comprehensive Technical Procedures for Automation and Scripting Modern enterprise environments demand automation and repeatability in administrative tasks. Integrating a custom domain into Microsoft 365 via PowerShell is a crucial operation for identity management, branding, and hybrid infrastructure scenarios. With the deprecation of the legacy *MSOnline* and *AzureAD* modules, leveraging only the Microsoft Graph (*mg*) cmdlets…
Protect, Detect, and Respond to Threats in Your Office 365 Environment In today’s digital landscape, organizations face an ever-increasing barrage of cyber threats that test the limits of traditional security measures. Email-borne attacks, malicious attachments, and advanced phishing campaigns are just some of the tactics cybercriminals use to compromise business operations and steal sensitive data.…
GPT‑5, OpenAI’s most capable AI system yet, is now available worldwide in both Microsoft 365 Copilot and Copilot Studio. According to Microsoft commitment, they deliver the latest OpenAI models to Microsoft customers within 30 days of release—with enterprise-grade security, compliance, and privacy baked in. How GPT-5 Enhances Copilot Dynamic Prompt Processing: Copilot now intelligently analyzes prompts and,…
The new reality of identity threats The world of cybersecurity is changing at breakneck speed. Identity has become the number one attack surface for organizations—whether through phishing campaigns, password spraying, token theft, or exploitation of misconfigured policies. Hackers don’t necessarily need to break into servers anymore; they can often just sign in using stolen credentials.…
Microsoft Security Copilot — August 2025 Update: What You Should Know In the fast-paced world of cyber defense, security—and Security Copilot—never slows down. This month, we’re rolling out a series of powerful enhancements designed to help security and IT professionals investigate threats, manage identities, and automate protection with lightning-fast precision. From AI-driven triage to optimized…
Microsoft Embeds OpenAI’s GPT-5 Deeply Across Its Platforms Unleashing Smarter AI Everywhere As of August 7, 2025, Microsoft has integrated GPT‑5, OpenAI’s most advanced reasoning model to date—trained entirely on Azure—into a wide array of its consumer, developer, and enterprise tools Source. With the launch, users gain access to a suite of upgraded AI capabilities…
Details Join us on Friday, August 8th 2025 for the August Edition of the Workplace Ninja User Group Denmark meeting.The event is 100% free and delivered online using Microsoft Teams. The event will include interesting sessions which are all Microsoft 365 related.Due to the online format of the event, all sessions will be approx.…
In today’s cyberthreat landscape, security must go beyond theory—it must be built, embedded, and sustained by design. That’s the promise of Microsoft’s Secure Future Initiative (SFI). Launched in November 2023, this multiyear security transformation marshaled the equivalent of 34,000 full-time engineers, representing Microsoft’s largest-ever cybersecurity effort. 1. Foundations Built on Three Core Principles Microsoft anchored…
Microsoft Copilot for Security—the world’s first generative AI solution tailored for cybersecurity—is already available globally starting April 1, 2024. Designed to enhance the capabilities of security and IT professionals, Copilot helps teams detect threats faster, respond with greater precision, and elevate overall expertise. It leverages Microsoft’s vast threat intelligence, processing over 78 trillion signals daily,…
In Exchange Online (part of Microsoft 365), the synchronisation log is a file or record that keeps track of issues when Outlook (the client) is trying to sync with Exchange Online (the server). Where it appears:In Outlook, you may see a folder called “Sync Issues” with subfolders like: Conflicts Local Failures Server Failures Purpose:The synchronisation…
Microsoft Copilot for Security: Use AI to defend! What if I told you that you could use GPT-powered natural language to investigate and respond to security incidents, threats, and vulnerabilities facing your organization right now? This presentation on Microsoft Copilot for Security will showcase its advanced integration with Microsoft 365 Security technologies. This innovative tool…
Community Event in Thessaloniki on February 19, 2025 On February 19, 2025, a highly anticipated community event took place, garnering the attention and participation of many enthusiastic attendees. The focal point of the event was a comprehensive presentation on Microsoft Defender XDR, accompanied by an in-depth discussion on security measures. Presenter: Chris Spanougakis MCT Presentation…
Πώς μπορείτε να ξεκινήσετε και να αποκτήσετε την πρώτη σας τεχνική πιστοποίηση Microsoft
Microsoft Copilot for Security: Use AI to defend! 🚨 Revolutionize Your Organization’s Security with Microsoft Copilot for Security 🚨 🌟 What if I told you that you could investigate and respond to security incidents in real time using the power of GPT-driven natural language? In this presentation, we’ll dive into Microsoft Copilot for Security and…
Community Event in Thessaloniki on January 13, 2025 On January 13, 2025, a highly anticipated community event took place, garnering the attention and participation of many enthusiastic attendees. The focal point of the event was a comprehensive presentation on Microsoft 365 Copilot, accompanied by an in-depth discussion on security measures. Presenter: Chris Spanougakis MCT Presentation…
Live Webinar: Introducing Microsoft Azure ARC, 21 March 2024
Live Webinar: Introducing Microsoft Intune & Windows Autopilot, 14 March 2024
Αγαπητοί φίλοι, Πρόσφατα συμμετείχα σαν Technical Reviewer στο νέο βιβλίο του Dishan Francis, με τίτλο “Mastering Active Directory”, το οποίο πλέον είναι διαθέσιμο στην 3η έκδοσή του με ανανεωμένο περιεχόμενο. Πρόκειται για ένα πολύ χρήσιμο τεχνικό βιβλίο, το οποίο καλύπτει όλες τις γνώσεις που χρειάζεται κάποιος σχετικά με το Active Directory, είτε αυτό βρίσκεται μέσα…
Αγαπητοί φίλοι και συνεργάτες, Στις 5 Οκτωβρίου του 2020 ανακοινώθηκε η συμφωνία για την δημιουργία νέων Microsoft Datacenters στην Ελλάδα. Η ανακοίνωση της συμφωνίας αλλάζει ραγδαία το τοπίο της πληροφορικής στην Ελλάδα, αφού πλέον οι Microsoft cloud τεχνολογίες έρχονται στην πόρτα μας, δημιουργώντας νέες θέσεις εργασίας και ευκαιρίες, αρκεί να τις αξιοποιήσουμε σωστά. Σκεφτείτε ότι…
Όσοι από εσάς έχετε κατεβάσει το δωρεάν eBook που είχα γράψει τον Νοέμβριο του 2017, σίγουρα θα θυμάστε ότι είχα αναφερθεί στην αναγκαιότητα του να μπορείς να αποδείξεις ότι έχεις τις κατάλληλες τεχνικές γνώσεις, προκειμένου να έχεις ένα πλήρες επαγγελματικό προφίλ. Και για να λέμε και τα πράγματα με το όνομά τους, στο σημερινό…