In the second and final part of this series, Tony outlines how to facilitate end-user reporting of suspicious emails.
Find articles about securing identities, endpoints, and information for Office 365 and Azure.
Tony Akers explores creating activity alerts in Office 365 Security & Compliance Center which is essential for recognising changes in
Attackers can bypass your third-party gateway systems delivering spam and malicious content. Office 365 architect Tony Akers writes on how to fix this.
Part two of MVP Vasil Michev’s investigative blog series takes the recently released Privileged Access Management feature for a spin!
In this two-part blog, MVP Vasil Michev does a deep-dive into Privileged Access Management in Office 365 and a guide on how to practice this effectively.
We’re looking for experienced IT professionals to join us in our Practical 365 community. Write about your practical experience with all things Microsoft.
Brian Reid discusses the challenges with password protection and management, exploring one of the useful features available within Azure AD: Common Passwords.
How the Azure Active Directory baseline security policy enforces multi-factor authentication for privileged administrator accounts in Office 365 and Azure AD.
How to use Azure Active Directory conditional access policies to block legacy applications such as POP, IMAP, and basic authentication from connecting to Office 365.