Загрузка...

Essential 8: Controls : Microsoft Macros

In this video, we break down Essential Eight – Microsoft Office Macros, one of the most critical controls for reducing malware and ransomware risk.

You’ll learn:
What Microsoft Office macros are
Why macros are a major attack vector
How attackers abuse macros for malware delivery
What the ACSC Essential Eight requires
Best practices for blocking, restricting, or allowing macros safely
Real-world examples and common mistakes organisations make

This control plays a key role in preventing phishing-based attacks, credential theft, and initial access techniques used by threat actors.

Whether you’re a SOC analyst, security engineer, IT administrator, or preparing for Essential Eight maturity assessments, this video will help you understand both the why and the how behind macro controls.

👍 Like, share, and subscribe for more Essential Eight, SIEM, and cybersecurity content.

Видео Essential 8: Controls : Microsoft Macros канала Relative Security
Яндекс.Метрика
Все заметки Новая заметка Страницу в заметки
Страницу в закладки Мои закладки
На информационно-развлекательном портале SALDA.WS применяются cookie-файлы. Нажимая кнопку Принять, вы подтверждаете свое согласие на их использование.
О CookiesНапомнить позжеПринять