Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Peter_Elmer
Employee
Employee

Securing access to Microsoft 365 using R80.40

This 10min introduces the access control and threat prevention for traffic directed to Microsoft 365 services.

You see an how Infinity SoC is used to verify IP address observed in unknown traffic.  (see cpr file below)

A Logs & Monitor View has been created to provide visibility on the various applications used and their related traffic volume. 

0 Replies

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events