At Ignite this year, Microsoft announced the release of the Office 365 ATP Recommended Configuration Analyzer, otherwise known as ‘ORCA’. Find out more in this article.
In the last part to this insightful series on account breaches, Tony Akers discusses how to remediate your Office 365 after an account breach.
In Part 3 of the Account Breaches series by security expert Tony Akers, he looks at using the Hawk PowerShell Module for investigating breaches.
In Part Two, of this four-part series on Office 365 account breaches, Tony Akers explores how to use Cloud App Security to investigate a breach.
In part one of this three part series on Office 365 account breaches, Tony Akers looks at detecting account breaches in Cloud App Security.
In the second and final part of this series, Tony outlines how to facilitate end-user reporting of suspicious emails.
Tony Akers explores creating activity alerts in Office 365 Security & Compliance Center which is essential for recognising changes in
Attackers can bypass your third-party gateway systems delivering spam and malicious content. Office 365 architect Tony Akers writes on how to fix this.