Remediation and Hardening Strategies for Microsoft 365 to Defend Against APT29

APT29 and other threat actors have used several methodologies to move laterally from on-premises networks to the cloud, specifically Microsoft 365.

Download this whitepaper to learn techniques used by APT29, and how to proactively harden and remediate environments where similar techniques have been observed.

Request Free!