Practical Protection: Leveling up Conditional Access Policy Management
In this episode of Practical Protection, Paul Robichaux provides a practical approach to Conditional Access Management, combining both the Beas and Microsoft frameworks.
In this episode of Practical Protection, Paul Robichaux provides a practical approach to Conditional Access Management, combining both the Beas and Microsoft frameworks.
In this episode of Practical Endpoint, we explain two approaches to restricting Admin rights to corporate devices using Intune and Autopilot.
Every time Microsoft 365 Copilot interacts with a user, the Microsoft 365 substrate captures the Copilot interaction as a compliance record in the user's mailbox. By fetching and analyzing the compliance records, we can understand how the user interacts with Copilot. This article discusses how to retrieve and analyze the records with the Microsoft Graph PowerShell SDK.
Many organizations still find it challenging to implement Conditional Access effectively. Luckily, there is a solution for this. In this blog, we share a new open-source framework, introducing 4 tools to help create and validate access policies and strategies, ensuring that security measures are effective and efficient.
This installment of Practical Teams Phone covers how to deal with unassigned numbers and how the Teams Administrator can configure the unassigned number feature in the Teams Admin Center (TAC).
Sometimes Microsoft 365 tenants need to store specific data for objects like users and groups. The Graph provides several extensibility options. This article describes how to define and use schema extensions to store information about the container management labels assigned to Microsoft 365 Groups.
It's that time of the year again! In this episode of Practical Protection, we review the 2024 Microsoft Digital Defense Report and offer our recommendations to protect against the emerging and current threat.
In this episode of Practical PowerShell, we dive into the dark power of dynamic parameters, and how to use them within in functions and scripts.
Compliance search purge actions are Microsoft's search and purge tool. Today, a purge action is limited to removing 10 items per mailbox. Microsoft is increasing the limit to 100 as part of its eDiscovery modernization project. This article reviews the state of the art for using PowerShell to purge mailbox items and contemplates how purges might work after modernization finishes.
It's time to check recipient filters for dynamic distribution groups to ensure that you don't have any wildcard prefixes used with the -eq operator to find recipients based on their email addresses. A November 30 update will stop this kind of recipient filter working, and might have a knock-on effect on other processes.
This article outlines how to get started with PIM, how to audit its use, and what workarounds could be circumventing your security controls.
The deployment of intelligent versioning to SharePoint Online worldwide is proceeding. Intelligent versioning is all about reducing the amount of storage quota consumed by file edits. It's a great idea, but it has one downside for many Microsoft 365 tenants: retention policies and labels stop SharePoint removing unwanted versions. Read more here, including a script to interpret Microsoft file version data.