Table of Contents
- Ransomware Attack Vectors and the Threat Landscape
- Building a Secure Foundation
- Security Monitoring using Microsoft Sentinel and Defender
- Ransomware Countermeasures - Windows Endpoints, Identity, and SaaS
- Ransomware Countermeasures – Microsoft Azure Workloads
- Ransomware Countermeasures - Networking and Zero-Trust Access
- Protecting Information Using Azure Information Protection and Data Protection
- Ransomware Forensics
- Monitoring the Threat Landscape
- Best Practices for Protecting Windows from Ransomware Attacks

