Part Two: How to use MCAS and PowerAutomate to prevent malicious activity when employees extract confidential corporate information from cloud repositories.
Find articles about securing identities, endpoints, and information for Office 365 and Azure.
Part One: How to use MCAS and PowerAutomate to prevent malicious activity when employees extract confidential corporate information from cloud repositories.
At Ignite this year, Microsoft announced the release of the Office 365 ATP Recommended Configuration Analyzer, otherwise known as ‘ORCA’. Find out more in this article.
In the last part to this insightful series on account breaches, Tony Akers discusses how to remediate your Office 365 after an account breach.
In Part 3 of the Account Breaches series by security expert Tony Akers, he looks at using the Hawk PowerShell Module for investigating breaches.
In Part Two, of this four-part series on Office 365 account breaches, Tony Akers explores how to use Cloud App Security to investigate a breach.
In this blog MVP Vasil Michev explores the new Supervision Review feature improvements which are now available in some Office 365 tenants.
MVP Vasil Michev takes a first look at the new Security and Compliance Centers released for public preview and shares his thoughts.
In the second and final part of this series, Tony outlines how to facilitate end-user reporting of suspicious emails.