Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.
|Lync 2013 and Skype for Business||4||23|
|Exchange 2013 - Adding BCC to every external email and redirect to server IP||6||31|
|Exchange 2010/2013 Admin audits||1||19|
|Export self-signed certificate (.pfx) for Exchange email sync?||2||16|
Join the community of 500,000 technology professionals and ask your questions.
Connect with top rated Experts
10 Experts available now in Live!