According to a Microsoft presentation at TEC 2021, organizations moving to the cloud from on-premises infrastructures should pay attention to security weaknesses that could be introduced from on-premises accounts. It’s all too easy to allow a highly-permissioned on-premises account to evolve into one that has full access across a Microsoft 365 infrastructure, and that can lead to terrible consequences if attackers penetrate the on-premises infrastructure and compromise the accounts.
Find articles about securing identities, endpoints, and information for Office 365 and Azure.
In many organizations, Microsoft 365 is a significant investment. However, you get so much with Microsoft 365 E3 licenses that many organizations are unaware of, including beneficial features across Productivity, Compliance, Security, and Device management. Kat Greenan shares some of her secrets and the hidden gems that can be found in a Microsoft 365 E3 license.
This article examines the different components of Defender for Office 365, and how you can customize the configuration beyond the baselines to enhance the relevance and impact the policies have on your tenant. The most important aspects to review when modifying the configuration from baselines and the reasons to consider each configuration option are highlighted, but they don’t take you all the way. The items listed here are a subset of what’s available, but when combined with the baselines will help you to bring your Defender implementation to the next level.
Still in public preview, new application authentication method policies will help Microsoft 365 customers adhere to best practices for managing application credentials, while asserting pressure on ISVs to do the same. Going forward we can expect this to turn into a standard configuration, enforced across many organizations. To address the problem, Microsoft is ready to release a set of features to help. In this article, we introduce you to Azure AD application authentication method policies, one of the features in the set.
A new Exchange vulnerability has been disclosed this week known as ProxyToken that allows someone who can access an Exchange 2013, 2016 or 2019 server over HTTPS to perform configuration actions against mailboxes of their choosing, such as setting forwarding rules. Find out what you need to do to protect your organization.