This session will delve into the configuration and application of Microsoft security products, covering multiple platforms such as Defender, Intune, and Entra ID. We will provide detailed explanations on how to effectively configure and utilize these platforms to protect enterprises from common cyber threats and enhance overall cybersecurity resilience.
We will also share past attack cases, illustrating how Microsoft products and third-party tools can be leveraged for defense and investigation. For instance, enterprises often face phishing emails impersonating senior executives or multi-layer redirection phishing attacks exploiting open redirects on well-known websites. In these cases, we will analyze how Microsoft products perform in defending against such attacks, discussing their advantages, such as high integration and robust threat detection capabilities, while also acknowledging their shortcomings, including operational complexity and limited configuration flexibility.
TOPIC / TRACK
SecOps Forum
LOCATION
Taipei Nangang Exhibition Center, Hall 2
7F 701B
LEVEL
Intermediate Intermediate sessions focus on
cybersecurity
architecture, tools, and practical applications, ideal for
professionals with a basic understanding of
cybersecurity.
SESSION TYPE
Breakout Session
LANGUAGE
Chinese
SUBTOPIC
Advanced Threat Protection
Access Control
Enterprise Security
CYBERSEC 2025 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。