This article is primarily targeted at Czech state institutions and is based on recommendations of the Czech authority. However,...
Welcome to my blog! If you're looking for tutorials, hints or tips for IT, you're right here. You will find mostly articles on Microsoft products and technologies - operating systems, servers, virtualization, networks, management, but also the cloud. Sometimes I add some other interesting things.
This article is primarily targeted at Czech state institutions and is based on recommendations of the Czech authority. However, the guidance and recommendations provided below can be applied to any organization. The National Cyber and Information Security Agency published a warning against cyber threats targeting Czech state institutions [...]Lukas Beran
In addition to discovery, Microsoft Cloud App Security can actively interfere with communication. Through the integration of Microsoft Cloud App Security (MCAS) and Microsoft Defender Advanced Threat Protection, it is possible to block access to certain URLs or IP addresses. The list of blocked addresses can be defined directly in [...]Lukas Beran
Multi-factor authentication (MFA) is a method to dramatically increase the security of a user identity. For multi-factor authentication, at least two independent authentication methods of the following three are required for successful user authentication: Something I know (typically username and password) Something I have (eg mobile [...]Lukas Beran