ou
En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les Conditions d’utilisation, la Politique de confidentialité et la Politique relative aux cookies de LinkedIn.
Nouveau sur LinkedIn ? Inscrivez-vous maintenant
Lyon, Auvergne-Rhône-Alpes, France
Région de Lyon, France
Lyon Area, France
Limonest, France
1997 - 2000
Software Asset Manager chez Allianz Technology
Chef de Produit eMSP & CPO
Responsable du support et du parc informatique chez VIDELIO
Retired
Directeur des systèmes d'information
🔐 Cybersécurité | DevOps | Cloud & IA | Consultant Freelance 🚀 | Réseautage
Adjoint au Chef du Service économique de Bruxelles
Director, Program Management chez EPAM Systems
CIO Procurement - Finance - CSR
Responsable Projets SI chez DIRISI : Direction Interarmées des Réseaux d'Infrastructure et des Systèmes d'Information
Responsable Domaine Infrastructure chez Avril
IT CAD/CAM Project Manager
Christopher Brumm
🚀 Today I published a new blog post: A first look at Microsoft Entra Private Access for Active Directory domain controllers. Over the past few days, I tested the current preview of the Private Access Sensor — a feature that lets you restrict Kerberos SSO for specific SPNs to clients using Entra Private Access. The post walks you through setup, configuration, and my first impressions, along with some tips, tricks, and personal takeaways. This feature shows strong potential to add an extra security layer to on-prem environments — definitely worth a look! 👉 Read the full post here: https://lnkd.in/ejkuYQym Hashtag #MicrosoftEntra #CyberSecurity #ActiveDirectory #Kerberos #GlobalSecureAccess #ZTNA
Saeid Khanipour Ghobadi
If you're looking to build hands-on skills with Azure networking, this comprehensive guide by Victor Nwoke is worth your attention. The "Step-by-Step Point-to-Site VPN Configuration" walkthrough takes you from scratch through setting up a virtual network, deploying a VPN gateway, generating certificates, and establishing secure client connections—all using native Azure tools and PowerShell. It’s detailed, practical, and perfect for IT professionals aiming to implement Point-to-Site VPNs securely and efficiently. Highly recommended for: • Network engineers working with Azure • Professionals preparing for AZ-700 or AZ-104 exams • Anyone building hybrid cloud solutions Author: Victor Nwoke What other Azure networking tasks would you like to see step-by-step guides for? #Azure #VPN #CloudNetworking #AzureNetworking #PointToSite #smenode #smenodelabs #smenodeacademy
Microsoft Security
Microsoft Sentinel graph—in public preview—delivers context that helps defenders respond faster and smarter. Today, scenarios are available in Microsoft Defender and Purview: ✅Lateral movement and privilege escalation mapping ✅ Asset criticality and risk-based alert prioritization ✅ Enriched alerts and hunting with contextual relationships Learn more: https://msft.it/6045sxbMd #MSSecure #MicrosoftSentinel
Wojciech Ciemski
🧩 Struggling to make sense of Windows Event IDs? Or maybe you're training your team to investigate incidents with Event Logs and feel like you're drowning in noise? Then this PDF is your new best friend. 📄 "Windows Event Log Analysis – Analyst Reference" A 25-page compact but deep guide to the most critical logs used in incident response, detection, and threat hunting. Here’s what makes it gold: ✅ Clear explanations of key Event IDs (4624, 4625, 4688, 4776, 5140...) ✅ Privilege escalation, RDP abuse, NTLM/Kerberos failures — all covered ✅ PowerShell & Sysmon event logging breakdown ✅ Real use-cases like credential access, scheduled task abuse, or removable media detection ✅ Defensive tips: where to enable logging via GPO, how to use fields like “Logon Type”, “CommandLine”, “Token Elevation”, etc. 🧠 This isn’t just a cheat sheet — it’s incident handler muscle memory material. If you work in a SOC, blue team, DFIR, or teach cyber defense: this PDF belongs in your toolkit. 📎 Attached below — download, bookmark, and share. #SOC #windowslogs #DFIR #detectionengineering #blueforlife #threathunting #incidentresponse #cybersecurity #infosecresources #loganalysis
Accepter et s’inscrire sur LinkedIn