Blog posts, news and opinions about Microsoft’s Office 365 cloud services and applications.
Latest Articles
In the grand scheme of things, tracking your Office application updates may not seem of critical importance, but unpatched apps can turn into an attack surface. In this installment of Practical Protection, we highlight two free tools in the Microsoft 365 Apps admin center that help you track and manage Office updates.
In this article, Thorsten Pickhan covers how to add Direct Routing phone numbers to the internal Teams Phone Number database, how to remove phone numbers, and the benefits of doing so.
Many Teams users love to use group chats as a way to get work done. Group chats are effective, but the information shared in chats ends up in personal OneDrive accounts. To help switch people back to channel conversations, Teams has a new threaded layout to make conversations behave much like chats. The new layout works well for some channels but not for others.
In this article, we guide you through the process of using the Graph Activity Log and Kusto Query Language (KQL) to hunt for common indicators of mailbox compromise, with useful tips along the way.
In this episode of Practical Protection, we explore securing Power Platform environments, covering the basics of environment isolation, governance strategies, and lifecycle management.
Updating Defender for Endpoint is quite complex, as the process differs between each operating system, and not all updates are alike. In this blog, we explore how to manage updates effectively on each platform, with practical tips throughout.
There's a lot to learn about Copilot Studio, especially for hard-pressed Microsoft 365 tenant administrators who already have too much work to do. This article gives administrators the essential details that they should consider as Copilot agents become more interesting to their organization.
The new Purview eDiscovery implementation supports a Graph API. Where there's a Graph API, there are PowerShell cmdlets based on the API. This article explains how to use PowerShell to automate different aspects of eDiscovery cases. PowerShell can't review the items found by searches, but it can handle most of the other processing.
In this episode of Practical Protection, we dive into the basics of Threat Hunting, tools you can use, and even some DIY hunting advice.
In this episode, Steve Goodman and Bastiaan Verdonk interview Victor King from Quest Software, on best practices for Active Directory security. They discuss identifying misconfigurations, managing privileged access, and continuous environmental monitoring.
This article explains how to scope groups administration using apps and restricted administration units to make sure that only certain administrators can manage certain groups programmatically. Although this is probably not something that is needed for some tenants, it's a technique that could be used in many situations.
Microsoft recently announced a breaking change for all Android-based Teams devices. Teams Administrators must prepare some required policies in Microsoft Intune and also check and validate Conditional Access policies. If the changes aren’t made, Teams Android devices cannot log in after the automatic update installation.