Will Advanced Threat Analytics help me with all operating systems?

Short answer is yes, but there is a qualifier.  The activity still needs to hit Active Directory (AD), whether by connecting to the network via AD, querying the DNS servers, or authenticating with AD.  All that activity is inspected for anomalous activities, regardless of the operating system.



Popular posts from this blog

Risk-based Conditional Access now in the new Azure portal

ILM 2007 Certificate Management Customizations