Configuring Entra ID Cross-Tenant Synchronization
In this blog, James Yip reviews Microsoft's Entra ID Cross-Tenant Sync feature, and how it can make things a lot easier when deploying a M&A project.
In this blog, James Yip reviews Microsoft's Entra ID Cross-Tenant Sync feature, and how it can make things a lot easier when deploying a M&A project.
In this Blog, James Yip explains how to conduct sensitive file inventory and background labeling using the Purview Information Protection Scanner.
When it was first available, Microsoft 365 Data Loss Prevention (DLP) policies could only process Microsoft 365 data. Over the last few years, Microsoft expanded the scope for DLP to support these additional environments. In this article, we focus on implementation details around applying DLP to endpoint devices.
My team has recently worked on some projects featuring multi-tenant and multi-Exchange environments. A common requirement for all projects is the ability to share free/busy information across all environments. In this article, I will dive into using free/busy sharing with Exchange/Microsoft 365 in the worldwide cloud. Sharing Free/Busy Information Let’s start with the obvious issues: […]
Today, conditional access policies can restrict access to Microsoft 365 workloads but not to specific objects within a workload, such as individual mailboxes or SharePoint sites. In this article, James Yip explores using Authentication Context with conditional access polices to secure access to sensitive SharePoint content.
Defender for Cloud Apps includes several policies to address different scenarios related to information Leakage. In this article, James Yip discusses how to best use Defender for Cloud App to prevent information leakage.
Tips and Techniques to Avoid Common Issues In a previous post, I discussed how to leverage the Microsoft Tunnel solution to control access to your Microsoft 365 environment. In this article, I discuss deploying the Microsoft Tunnel VPN gateway in an enterprise environment. Basic Deployment The basic steps to deploy the Microsoft Tunnel VPN gateway […]
This article explains the importance of deploying Autodiscover correctly to ensure that all of Microsoft 365 works, including Exchange Online.
In this article, you will learn how to implement Conditional Access and Microsoft Tunnel to control and monitor all traffic that has access to Microsoft 356 within your organization.
Organizations used to use Intune MDM to manage apps, but with the increase in devices and apps, Intune MAM is the more appropriate vehicle. This article will give an overview of Intune app protection policy within MAM with specific policies I found particularly useful for protecting corporate data.
I used Microsoft Defender for Cloud Apps in a project with Microsoft 365 E5 licenses and realized it’s a handy and powerful tool at a reasonable price even if purchased as a standalone product. This post will outline practical use cases for using it to monitor and enforce restrictions on Microsoft 365 apps and some third-party apps to reduce the likelihood of information leakage.