Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Peter_Elmer
Employee
Employee

Securing access to Microsoft 365 using R80.40

This 10min introduces the access control and threat prevention for traffic directed to Microsoft 365 services.

You see an how Infinity SoC is used to verify IP address observed in unknown traffic.  (see cpr file below)

A Logs & Monitor View has been created to provide visibility on the various applications used and their related traffic volume. 

0 Replies

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    Tue 20 May 2025 @ 11:30 AM (PDT)

    Las Vegas: Check Point Hybrid Mesh

    Wed 21 May 2025 @ 11:30 AM (MST)

    Tempe, AZ: Check Point Hybrid Mesh

    Tue 03 Jun 2025 @ 06:00 PM (EDT)

    Montreal: CPX Recap

    Tue 10 Jun 2025 @ 06:00 PM (EDT)

    Quebec City: CPX Recap
    CheckMates Events