Evaluating Privileged Identity Management Effectiveness
This article outlines how to get started with PIM, how to audit its use, and what workarounds could be circumventing your security controls.
This article outlines how to get started with PIM, how to audit its use, and what workarounds could be circumventing your security controls.
The deployment of intelligent versioning to SharePoint Online worldwide is proceeding. Intelligent versioning is all about reducing the amount of storage quota consumed by file edits. It's a great idea, but it has one downside for many Microsoft 365 tenants: retention policies and labels stop SharePoint removing unwanted versions. Read more here, including a script to interpret Microsoft file version data.
This week on the Practical 365 podcast, Rich & Steve sit down with Rod Trent, Senior Program Manager at Microsoft, to explore the game-changing potential of Microsoft Security Copilot.
In this article, we explain how to get started using PnP PowerShell, and review some practical examples of where the module can immediately add value for tenant administrators.
Microsoft is giving Purview eDiscovery a make-over to introduce a modernized UI and to simplify the solution into standard and premium variants. Content searches are going away, but the same functionality is available as a standard case. It's time to prepare the folks who work on compliance and run eDiscovery investigations for the changes coming at the end of 2024/2025.
Oversharing of information is a major concern in the AI era. This article describes how to write a script to report file sharing for OneDrive for Business accounts. The report details the files shared, the type of sharing link and access, and who can access the files. It's an example of using the Microsoft Graph PowerShell SDK to understand what's happening in a tenant.
This week on Practical Protection, we are talking about Password Policies, what NIST thinks, and offer some advice on staying secure.
The room mailbox statistics script has proven to be a popular script downloaded and used by many to analyze the usage patterns of room mailboxes. Recently, a reader pointed out that the Graph API request to fetch workspaces didn't work. Microsoft has changed the Places resource and the request now needed to run against the beta endpoint. All of which brought me to rewrite the script using the Graph SDK.
This episode of Practical Purview showcases some compliance controls that you should consider including in any provisioning solution. This is not an exhaustive list, but rather some key controls to consider.
Copying data from Windows endpoints to USB storage devices is one of the largest sources of data leakage. In this article, we discuss two simple solutions to avoid this problem.
In this episode of the Practical 365 Podcast, we are joined by TEC Speaker, Shinesa Cambric, to explore the parallels between AI adoption and the cloud revolution, get into the changing nature of identity in our digital world, and get a sneak peak into Shinesa's Keynote session.