Doug Does Tech
Doug Does Tech
  • 32
  • 74 343
Setup a Hyper-V Demo Lab: Server 2022, Domain Controller, DHCP, DNS - Oh My!
Welcome to my channel! In this video, I will walk you through the process of rebuilding my home lab environment using Hyper-V. We'll cover everything from setting up the server, installing Windows Server 2022, configuring the network, setting up a Domain Controller, and configuring DHCP and DNS. Whether you're setting up your own lab or just curious about the process, this video has got you covered. Let's dive in!
Links:
labgopher.com/
www.microsoft.com/en-us/evalcenter/evaluate-windows-server-2022
Time Stamps:
00:00:00 - Introduction
00:00:39 - Overview of the Lab Setup
00:05:09 - Setting Up the Hyper-V Host
00:12:20 - Setting Up your Domain Controller
00:16:18 - Creating the Domain Forest
00:18:20 - DHCP and DNS Setup
zhlédnutí: 229

Video

How to setup Defender for Cloud Apps Session Control
zhlédnutí 2,2KPřed 3 měsíci
Welcome to Doug Does Tech! In this video, Doug takes you step-by-step through setting up session control policies and conditional access in Microsoft Defender for Cloud Apps. If you're looking to enhance security and control access to your organization's cloud applications, this guide is for you. We'll start with a demo of session control, showing you how users on unmanaged devices can access W...
Unlocking Defender for Cloud Apps: Your Swiss Army Knife of Cloud Security
zhlédnutí 921Před 4 měsíci
Hey everyone, it's Doug from Doug Does Tech! I'm thrilled to introduce a new video series where we explore various Defender technologies by Microsoft. Today, we're kicking off with Defender for Cloud Apps. I like to think of this tool as the Swiss Army Knife of Microsoft security. In this video, I'll delve into its placement within the Microsoft security stack, highlight its top-level features,...
Is MFA Enough? Implementing FIDO Keys with Microsoft 365
zhlédnutí 1,7KPřed 4 měsíci
Traditional MFA may no longer suffice as a robust security measure to safeguard your crucial accounts. Hackers have devised new methods to breach your sign-in process, even with MFA in place. Hence, we require stronger forms of authentication. In this video, I delve into the array of options supported by Microsoft for robust authentication and demonstrate precisely how to implement FIDO Keys. L...
Welcome Back
zhlédnutí 180Před 4 měsíci
After a little break, I'm back and ready to dive into some exciting new content. Get ready for deep dives into Microsoft 365 security, Defender, and Purview. Don't worry, I'll keep it relaxed and easy to understand, even for beginners. Thank you for your patience and support. If you have content or questions you would like me to cover put them into the comments and I will do my best to make a v...
Microsoft 365 Security Basics: Password Protection
zhlédnutí 1,2KPřed rokem
Weak and easily guessable passwords 🗝️ have been a common pain for an organization's security. We all have tried to add password complexity, but users just think of easy ways to bypass it with things like CompanyName1! 😝 Or worse helpdesk uses passwords like the common Winter2023! or Fall2019! 🤢 Well in this video I will show you how you can ban those passwords from use in your environment whet...
Build a website using Azure Static Web Apps and Authenticate with AAD
zhlédnutí 10KPřed rokem
Docusarus, Azure Static Web Apps, Github and Azure Active Directory, Oh MY! In this video, I'll introduce you to some exciting new technologies for building and hosting your own website for documentation. We'll start by creating a local site using Node JS and Docusaurus, followed by deploying it on Azure Static Web Apps. To enable seamless updates, we'll use GitHub's pull feature. Lastly, we'll...
Practical Conditional Access: The Secure Endpoint
zhlédnutí 857Před rokem
In this final video on Practical Conditional Access, we'll be sharing our favorite set of policies designed to ensure secure access to your organization's environment. Specifically, we'll be focusing on the "The Secure Endpoint" policy, which is a customizable template that addresses a variety of scenarios. The main goal of which is to limit access from non-managed devices and ensure that our B...
Create a Conditional Access Policy Design: The Castle Bypass
zhlédnutí 822Před rokem
In the second video in our series on Practical Conditional Access, we are talking about requiring MFA except when you are in a trusted location. This type of policy is common but increases an organization's risk due to the bypass. So in this video, we will walk through a design called "The Castle Bypass" which fixes some of the issues with using a trusted location. In this video, we will be foc...
Create a Conditional Access Policy Design: The Baseline
zhlédnutí 641Před rokem
Creating a set of Conditional Access policies on your own without ever seeing how other orgs do it can be hard. In this series, we will be showcasing different policy designs and providing examples of practical deployments to meet various organizational requirements. These policies are designed to be templates that can be easily customized to fit the unique needs of your organization. In this v...
Microsoft 365 Security Basics: Exchange Online
zhlédnutí 1,9KPřed rokem
In this video, we'll cover some key points you need to know to secure your Exchange Online environment. We'll discuss topics such as disabling legacy authentication, identifying risky email overrides, enabling audit logging, blocking outbound forwarding, help users quickly identify external emails, and enabling an easy way for your users to report phishing attacks. By the end of this video, you...
Conditional Access 101: Understanding and Implementing This Powerful Security Feature
zhlédnutí 749Před rokem
In this video, we'll be discussing the importance of MFA and how you can use conditional access to ensure that your organization's accounts are properly secured. Did you know that only 26.64% of Azure AD accounts use MFA? This means that a large number of accounts are not adequately protected against unauthorized access. By implementing conditional access, you can require MFA for certain types ...
Microsoft Purview DLP report Using Power Bi
zhlédnutí 3,9KPřed rokem
The Built-in reporting engine for Purview DLP is pretty limited. However, with Power Bi, we can create custom reports that really help extend the functionality of our reporting. In this video, I do my best impression of a Power Bi Report designer and show how you can get started with PowerBi reporting. L I N K S Sample Report app.powerbi.com/view?r=eyJrIjoiN2Q3ODRhNDgtMWY1OS00MzQ3LWI4NzAtMTcxZG...
Microsoft 365 Security Basics: SharePoint & One Drive Security
zhlédnutí 1,4KPřed rokem
SharePoint and OneDrive leave a lot to be desired in the way of default security configs. in this video, I walk through the basic options of locking down your environment so you make sure your data is protected. C H A P T E R S 00:00 Video Intro 01:28 Sharing Controls 07:41 Security Controls 12:14 Access Controls 16:58 Wrap UP L I N K S Sharing Controls learn.microsoft.com/en-US/sharepoint/turn...
Set up Microsoft Exact Data Match - Sensitive Info Type Setup
zhlédnutí 1,4KPřed rokem
This is the final video in the series on building an EDM solution using Microsoft Purview. In this video, we will set up the Sensitive Info Definition that uses EDM. I will cover creating the SIT using XML, and cover the key decisions/items that go into your policy design. L I N K S MSFT Doc learn.microsoft.com/en-us/microsoft-365/compliance/sit-get-started-exact-data-match-create-rule-package?...
Microsoft 365 Security Basics: Separate & Cloud Gapped Admin accounts
zhlédnutí 595Před rokem
Microsoft 365 Security Basics: Separate & Cloud Gapped Admin accounts
Set up Microsoft Exact Data Match - Hash and Upload your Data
zhlédnutí 1,6KPřed rokem
Set up Microsoft Exact Data Match - Hash and Upload your Data
Set up Microsoft Exact Data Match - Build your data Schema
zhlédnutí 1,5KPřed rokem
Set up Microsoft Exact Data Match - Build your data Schema
Set up Microsoft Exact Data Match - Overview
zhlédnutí 1,6KPřed rokem
Set up Microsoft Exact Data Match - Overview
Microsoft 365 Security Basics: Enterprise Application Admin Consent Workflows
zhlédnutí 2,1KPřed 2 lety
Microsoft 365 Security Basics: Enterprise Application Admin Consent Workflows
Microsoft 365 Security Basics: MFA Fraud Alert
zhlédnutí 1,9KPřed 2 lety
Microsoft 365 Security Basics: MFA Fraud Alert
Microsoft 365 Security Basics: Secure Azure AD Directory Access
zhlédnutí 410Před 2 lety
Microsoft 365 Security Basics: Secure Azure AD Directory Access
Microsoft 365 Security Basics: Deploy MFA (4 Options)
zhlédnutí 1,4KPřed 2 lety
Microsoft 365 Security Basics: Deploy MFA (4 Options)
Automatically Apply Sensitive Labels: 3 Options
zhlédnutí 7KPřed 2 lety
Automatically Apply Sensitive Labels: 3 Options
Deploy MIP Sensitivity Labels
zhlédnutí 2,9KPřed 2 lety
Deploy MIP Sensitivity Labels
MIP - Sensitivity Label Overview
zhlédnutí 1,5KPřed 2 lety
MIP - Sensitivity Label Overview
Exchange Online DLP Advanced Options
zhlédnutí 1,9KPřed 2 lety
Exchange Online DLP Advanced Options
DLP Next Steps - User Education Mode
zhlédnutí 1,3KPřed 2 lety
DLP Next Steps - User Education Mode
Design a Custom Sensitive Info Type (SIT) in Microsoft Purview
zhlédnutí 3,3KPřed 2 lety
Design a Custom Sensitive Info Type (SIT) in Microsoft Purview
Exploring Sensitive Info Types
zhlédnutí 2,5KPřed 2 lety
Exploring Sensitive Info Types

Komentáře

  • @icedutah
    @icedutah Před 18 dny

    Why not require a FIDO2 key for all users? Since any user in the company is a very bad thing. Not just the admins.

  • @nazerbor3i
    @nazerbor3i Před 19 dny

    This is perfect. I’m looking forward to this. Security with M365

  • @Fideska1
    @Fideska1 Před 25 dny

    Hi, Doug thanks fo your video. Do you know which license i need for option 2 and 3?

    • @DougDoesTech
      @DougDoesTech Před 25 dny

      All auto labeling options require an advance license. Option 1,2 requires aip plan2 which is in E5. Option 3 requires MDCA which can be standalone or as part of the security bundle.

  • @perezdeandarandyuriel2664

    Hi, thanks for the video. I'm having some trouble understanding DLP in general. What exactly is the role of Microsoft Purview in DLP? From what I understand, the features and capabilities are largely determined by the types of licenses a client has, correct? For example, let's say a client wants to implement DLP in Outlook and SharePoint across their organization. In this case, we need to know which tier they have on Exchange Online and Microsoft 365 licenses. So, where does Purview fit into all of this? I know Microsoft Purview is a governance solution and doesn't have any compute power (I think). Is it simply the platform where these features can be enabled? Do I need an Azure Purview solution to utilize the features available through the licenses? Thanks

    • @DougDoesTech
      @DougDoesTech Před 27 dny

      It’s confusing because MSFT took and combined multiple product all under the hood of purview. All DLP is now purview, and the old azure purview solution is now also Purview. 🤷🏻‍♂️. Think of the Old azure purview solution as the way to track structured data in your systems. The compliance purview solution, whats included in your m365 license, is all about unstructured data. Ye should are correct that what feature you get is due to your license sku. But almost all but the very basic license gets dlp for exo and spo. Best place to compare features is m365maps.com

  • @SA-hu9sp
    @SA-hu9sp Před 27 dny

    would this work for apps like Slack or Google Workspace? for example, if I’m trying to restrict a non compliant device (managed via intune) from being able to access corp apps like the ones mentioned + 365 apps, are session policies or access control policies the solution?

    • @DougDoesTech
      @DougDoesTech Před 27 dny

      Yes it would work for slack and google workspace. For that use case if you are using defender for cloud apps use the access policy. As that will cover the largest scenarios for those.(slack thick client) session policy would only work on web access. However, the best way to handle this is probably a ca policy that requires the device to be compliant. Look up my Secure Endpoint video on CA. May give you some ideas.

  • @Viya_the_cool
    @Viya_the_cool Před měsícem

    Thanks Doug. Please create detailed video on Defender for Cloud Apps

  • @michaelbirt9131
    @michaelbirt9131 Před měsícem

    I really really wish this would have worked for me.i have sent me a credit card number 25 times, everyone gets through

  • @simple-security
    @simple-security Před měsícem

    Anything in the works for the new purview portal? How about the purview scanner, on-prem file shares, azure blob storage, azure sql server, and what dlp features will work with all of that. Thanks!

  • @NDSLAB
    @NDSLAB Před měsícem

    Good Stuff! Keep doing all the MS Security stuff.

  • @PazGorbiz
    @PazGorbiz Před měsícem

    Amazing! I have been looking for this guidance for a long time! :)

  • @tarishiverma
    @tarishiverma Před měsícem

    Is the block and encrypt available to all users with E3 license or only for users with E5 license?

    • @DougDoesTech
      @DougDoesTech Před měsícem

      I believe it is available for all E3 users. But there are probably some caveats like customs ome templates are for E5 or application of customs labels are.

  • @kjhgliuguiug
    @kjhgliuguiug Před měsícem

    I haven't been able to get Device Exclusions to work in the CA policy. When trying to exclude Compliant devices, specifically, the Conditional Access App Control policy is applied regardless. As a result, I'm getting stumped trying to allow downloads from Exchange Online on compliant devices. We're not hybrid and it's looking the only solution is going to be with certificates. Have you seen this issue?

    • @DougDoesTech
      @DougDoesTech Před měsícem

      If you are using chome make sure you have the Microsoft sso extension installed. Also make sure you are signed into the machine as an entra if user.(not a local machine user) if none of those work check the dsregcmd status.

  • @atulpathare2775
    @atulpathare2775 Před měsícem

    Thanks a bunch for this Video, Really you explain very well

  • @fernandofischer3725
    @fernandofischer3725 Před 2 měsíci

    Awesome video, Thanks!! Would definitely love seeing a B2C walkthrough.

  • @rlee431
    @rlee431 Před 2 měsíci

    This was incredibly helpful!!

  • @cloudengineersacademy
    @cloudengineersacademy Před 2 měsíci

    Excellent Video, Helped a lot.

  • @aadilkarolia
    @aadilkarolia Před 2 měsíci

    Thank you for this video, it was really helpful. I was struggling to find an end-to-end guide in a single video/article. Appreciate this 🙂

  • @danaknox3395
    @danaknox3395 Před 2 měsíci

    I'm not seeing any exceptions in my my policy?

    • @DougDoesTech
      @DougDoesTech Před 2 měsíci

      They changed the portal since making this video. In the rule section create a group then use the “not” toggle. And add all the exceptions you need to that.

    • @danaknox3395
      @danaknox3395 Před 2 měsíci

      @@DougDoesTech Thank you! Yes, I added a group and chose NOT for the exceptions. I also added encryption after the approval to enforce the sensitive data to be encrypted. This guide really helped me!!

    • @danaknox3395
      @danaknox3395 Před 2 měsíci

      @@DougDoesTech I have another question. If I block sensitive data stored in Office 365. How would I go about marking them as false positives or not sensitive? I'm in the content explorer console and it only calls out "Not a Match". Is there a way to handle those files vs using the override feature?

  • @angelcardenas4266
    @angelcardenas4266 Před 3 měsíci

    Me fue de mucha utilidad, gracias! Nuevo suscriptor

  • @ehabgalal9181
    @ehabgalal9181 Před 3 měsíci

    Hi, What is the value of adding the admin user in onboarding page ? I don’t have one configured and I was able to onboarding the app

    • @DougDoesTech
      @DougDoesTech Před 3 měsíci

      Many times you don’t need it. But if something doesn’t go right or work you have some of the diagnostic tools you need to fix the app. learn.microsoft.com/en-us/defender-cloud-apps/proxy-deployment-any-app

    • @ehabgalal9181
      @ehabgalal9181 Před 3 měsíci

      @@DougDoesTech Thank you for your clarification. One more point please We have custom mobile app that using azure ad for authentication. We have tried to onboard it to MCAS but it seems it didn’t So, is the MCAS support only web not mobile app

    • @DougDoesTech
      @DougDoesTech Před 3 měsíci

      As far as I know session policy’s like blocking download can only be applied to web based sessions. You can use access policy to control access to mobile and desktop apps. But it won’t do the block download type controls.

  • @lasolution365
    @lasolution365 Před 3 měsíci

    Thank you very much for these videos, it has been really helpful. You are one of the best instructor I watch. Thanks again.

    • @DougDoesTech
      @DougDoesTech Před 3 měsíci

      Hey so glad it was helpful! and thank you for the compliment!

  • @slartibartfastlunkwill5790
    @slartibartfastlunkwill5790 Před 3 měsíci

    Good to see you're back to making videos.

  • @christopherpeterson6004
    @christopherpeterson6004 Před 4 měsíci

    Thank you. Very helpful to tell us the evaluated options. I was terrified of activating it and potentially losing access. Would you recommend multiple devices for Domain Admins?

    • @DougDoesTech
      @DougDoesTech Před 4 měsíci

      Yes I have 2 keys for my admin account just in case. But if you are supporting passwordless via Authenticator app it should be fine.

  • @jg-365
    @jg-365 Před 4 měsíci

    About time =)

  • @mannykhan7752
    @mannykhan7752 Před 4 měsíci

    Amazing video. Just what I was looking for. This helped me in a big way. Thanks.

  • @zol95
    @zol95 Před 4 měsíci

    This is exactly what I needed, a straight to the point comparison between all the options. I spent several hours figuring out the difference based on the documentation and random Yt videos, even spend a couple of bucks on Udemy courses which all lack this info. Great content and style subscribed!

  • @zol95
    @zol95 Před 4 měsíci

    Just found your channel thanks to your MFA rollout video. I really like the clean straightforward explanation style you use. I will check your previous videos and I'm looking forward to your new videos! Best of luck to your channel!

  • @gvdlaarse
    @gvdlaarse Před 4 měsíci

    Appreciate the demo thank you! Like many I need this data to be real-time, or even be updated once a month. Any idea if an API is available? Or how to update the data source with a script for instance.

  • @tancouver
    @tancouver Před 5 měsíci

    Thanks, Doug. This really helped me. For some reason, the manifest.json linked in the index.html causes unintentional redirects whenever I try to add any type of authentication. I just removed it and that helped me for now. Weird how this doesn't come up in your example, making me think this could be something specific to my organizational tenant.

  • @akashnautiyal4490
    @akashnautiyal4490 Před 5 měsíci

    Hi Doug, could you please share the spreadsheet, it will be really helpful.

  • @akashnautiyal4490
    @akashnautiyal4490 Před 5 měsíci

    Great playlist Doug!

  • @MrAshwin283
    @MrAshwin283 Před 5 měsíci

    Cool video Doug. Very simply and clearly explained !!

  • @artorhemnnahs
    @artorhemnnahs Před 5 měsíci

    I rarely post, but when I do, it's to say thanks. This helped a lot. Very clear.

  • @puduville1
    @puduville1 Před 6 měsíci

    Please show us how to connect to AAD B2c please!

  • @cacurazi
    @cacurazi Před 6 měsíci

    Bro, how many times do you have to sneeze 🤧? Jesus Christ 😭 Anyway, this was wonderful. Keep it up!!

  • @Kinyo-ck6rf
    @Kinyo-ck6rf Před 7 měsíci

    Thanks for the video Doug. When i try to Parse the "Sensitive Info type - metadata" column, I get a 97% error. The excel file is directly exported from Purview and hasnt been modified. Are you able to advise on this pls

  • @user-oe6pi8fu8g
    @user-oe6pi8fu8g Před 7 měsíci

    Great Video, How can I get lab for testing

  • @chitchatvn5208
    @chitchatvn5208 Před 7 měsíci

    Thanks a lot. Great content and presentation.

  • @Elegant-Shanvi
    @Elegant-Shanvi Před 7 měsíci

    Trust me your videos ae pretty much better than concept wise and practically.

  • @nazerbor3i
    @nazerbor3i Před 8 měsíci

    Can you please make a long video and cover the best practices of secure a microsoft 365 Tenant? Such Conditional Access Policies, Defender Endpoint Protection, EOP, Endpoint Manager Deploying Apps and configuring Windows Security Policies, Data Labelling and Classification, DLP , Internal & External Sharing policies, MFA and SSPr etc ... Please make a Playlist or couple of long videos on that Thank you

  • @nazerbor3i
    @nazerbor3i Před 8 měsíci

    You are the KING

  • @andreabovo5208
    @andreabovo5208 Před 8 měsíci

    Is it possible to test it on local? If not is going to be difficult to use in real scenarios. Maybe better use MSAL

  • @user-su8tw9nw5s
    @user-su8tw9nw5s Před 8 měsíci

    Great vedio, thank you for sharing the knowledge about DLP I'm looking to build the Power BI report through MPARR scripts, can u please help to me how to build the report.

  • @user-tx4cc8tm1s
    @user-tx4cc8tm1s Před 8 měsíci

    Very informative and very closer to real world situations..Thanks.

  • @user-tx4cc8tm1s
    @user-tx4cc8tm1s Před 8 měsíci

    Amazing explanation. Thanks for your efforts 👍

  • @KapKen
    @KapKen Před 8 měsíci

    Great video Doug. Very informative. You have a new subbie.

  • @cutebot3342
    @cutebot3342 Před 9 měsíci

    Any thoughts on how you connect this PowerBI template to your Purview data so it's using data in real-time?

    • @DougDoesTech
      @DougDoesTech Před 8 měsíci

      I wrote a script to export the data the other day using powershell. Try it out and let me know if it helps. github.com/dougsbaker/Public-Toolbox/blob/main/o365%20Tools/Compliance/Reports/Get-DLPReportData.ps1

  • @JamesProvinciali
    @JamesProvinciali Před 9 měsíci

    I'm confused, you deleted the supporting elements keyword list for both low accuracy patterns and the keywords still appeared for the first data set. For the 2nd data set with no keywords wouldn't the low accuracy patterns hit because you removed the key word list from them. Great video btw!

    • @DougDoesTech
      @DougDoesTech Před 9 měsíci

      For SSN each primary match MSFT has is slightly different. Ex: XXX XX XXXX vs XXXXXXXXX vs XXX-XX-XXXX. So if you want the no keyword you may need to remove it from each definition.

  • @ScalarRon
    @ScalarRon Před 10 měsíci

    I ran into all the same problems. The custom auth requirement definitely isn't straight forward. Thanks, Doug!