Author: James Yip

Latest Articles

Using DLP with Defender for Endpoint

When it was first available, Microsoft 365 Data Loss Prevention (DLP) policies could only process Microsoft 365 data. Over the last few years, Microsoft expanded the scope for DLP to support these additional environments. In this article, we focus on implementation details around applying DLP to endpoint devices.

May 22, 2023

Free/Busy Sharing with Multiple Exchange Servers and Microsoft 365 Tenants

My team has recently worked on some projects featuring multi-tenant and multi-Exchange environments. A common requirement for all projects is the ability to share free/busy information across all environments. In this article, I will dive into using free/busy sharing with Exchange/Microsoft 365 in the worldwide cloud. Sharing Free/Busy Information Let’s start with the obvious issues: […]

March 6, 2023

Using Authentication Context with Azure AD Conditional Access Policies to Secure Access to Sensitive SharePoint Content

Today, conditional access policies can restrict access to Microsoft 365 workloads but not to specific objects within a workload, such as individual mailboxes or SharePoint sites. In this article, James Yip explores using Authentication Context with conditional access polices to secure access to sensitive SharePoint content.

February 13, 2023

Deploying the Microsoft Tunnel VPN Gateway in Enterprise Environments

Tips and Techniques to Avoid Common Issues In a previous post, I discussed how to leverage the Microsoft Tunnel solution to control access to your Microsoft 365 environment. In this article, I discuss deploying the Microsoft Tunnel VPN gateway in an enterprise environment. Basic Deployment The basic steps to deploy the Microsoft Tunnel VPN gateway […]

September 27, 2022

Using Microsoft Defender for Cloud Apps to Manage Third-Party Apps Better

I used Microsoft Defender for Cloud Apps in a project with Microsoft 365 E5 licenses and realized it’s a handy and powerful tool at a reasonable price even if purchased as a standalone product. This post will outline practical use cases for using it to monitor and enforce restrictions on Microsoft 365 apps and some third-party apps to reduce the likelihood of information leakage.

June 15, 2022