Practical Protection: Two Kinds of Bad
In this installment of practical protection, we dive into two kinds of crimes, and how you can practically apply that knowledge to securing your network and services within your organization.
In this installment of practical protection, we dive into two kinds of crimes, and how you can practically apply that knowledge to securing your network and services within your organization.
In this episode of Practical Sentinel, we dive into the MITRE ATT&CK framework and how to integrate it within your environment through Microsoft Sentinel & Defender XDR.
Purview Data Lifecycle management includes many ways to apply retention labels to SharePoint Online files, some of which require E5 licenses. Tools are available to show you what files have retention labels, but finding unlabeled SharePoint files is difficult because no out-of-the-box methods are available. Here we show how to use a content search to find unlabeled SharePoint files, and how to adjust the search results to have usable data for further processing.
Managing a wide variety of Entra Groups with multiple administrators and teams can be challenging. In this blog, Jasper Baes shares a helpful tool to help maintain control over group assignments, and how to implement it within your organization.
Often tenants create user sign-in reports based on the sign-in data held in user account properties. This article explains how to supplement that information with insights about the apps users sign into using sign-in audit logs. The combined information is more valuable than simply knowing when someone last successfully signed in.
With 2025 in full swing, it's time to do some reflecting! In this episode of practical protection, we look back at the major Microsoft security events in 2024 and how you can prepare yourself for what's to come in 2025.
In this week's episode, we dive deep into Microsoft's latest announcements and changes that will impact your organization in 2025 and beyond. We examine the reasoning behind the cloud.microsoft domain rollout, what the retirement of Viva Goals means for organizations invested in OKR solutions, and discuss the implications of the forced transition to the new Outlook for Windows by 2026.
In our 2024 review of Microsoft 365, we consider some of the major technical advances that occured in Microsoft's cloud ecosystem in 2024 together with some upcoming changes that have the potential to affect tenant operations. As always, our choice of what's important and what's not might not match yours, so feel free to comment and voice your opinion.
This article describes what happens when the Connect-MgGraph cmdlet runs in interactive and app-only sessions with the Microsoft Graph PowerShell SDK. A session is created and a context is established, and it's possible to use the session context to do real work.
This article provides a step-by-step guide on how to use Power Automate Flow to create a workflow that sends a weekly digest email of Microsoft 365 Roadmap updates.
Given the widespread use of guest accounts within Microsoft 365 to allow external sharing of resources, it’s almost inevitable that some unused guest accounts exist in any Microsoft 365 tenant. Identifying unused guest accounts is a good management practice. If the accounts serve no purpose, why keep them? This article explores how to find unused guest accounts. What you do with them later is up to you.
This episode of Practical Protection dives into connected experiences, what they are, and debunks some claims that were made regarding AI models using customer data via Connected Experiences.