Scanning Networks with Microsoft Defender External Attack Surface Management
In this blog, Thijs Lecomte dives into how to protect you public-facing infrastructure with Microsoft Defender's External Attack Surface Management tool.
Read about the most insightful coverage of the Microsoft 365 ecosystem presented in practical articles which make a difference.
In this blog, Thijs Lecomte dives into how to protect you public-facing infrastructure with Microsoft Defender's External Attack Surface Management tool.
Dynamic watermarking is a new feature for sensitivity labels that's intended to provide a visual deterrent to screen captures of confidential documents. The feature works by using the email address of the signed-in user as a watermark. Everything works and the feature seems effective, but this isn't something to use with every sensitivity label.
In this episode of Practical Teams, we dive into meeting templates and sensitivity labels, exploring how labels and templates can be used to adhere to requirements, policies, and if necessary, enforce some applicable settings in meetings.
Sometimes sensitivity labels defined for use within a Microsoft 365 tenant turn out to be unnecessary. The question then is what to do with these unwanted sensitivity labels. The answer is to pause for thought, gather information, and then make an informed decision, all of which we discuss here.
Looking to score that raise? In this episode of Practical Protection, we dive into Microsoft 365 Secure score, how it works, and help you better secure your Microsoft cloud environments.
Teams meeting transcripts can significantly enhance meeting productivity and accessibility, but their management involves careful consideration of data protection, privacy, and storage concerns. This article provides an overview of how to manage Teams meeting transcripts effectively, covering key topics such as storage changes, privacy controls, and strategies to ensure compliance while maximizing the benefits of transcription in your organization.
Incident Response is all about people, process, and technique. In this episode of Practical Protection, we review different issues that can arise during incident response.
Over the last year, Microsoft has released several new features to make management of inactive devices easier. In this blog, we review these features and build off our original blog post on "Handling Inactive Devices in Microsoft Defender for Endpoint."
Don't miss your chance to meet and learn from your favorite Practical 365 Authors at TEC 2024. As a proud sponsor of TEC, we are offering BOGO discounts on exclusive pre-con workshops with authors Michel De Rooij, Jaap Wesselius, and more!
In the wake of the recent CrowdStrike outage, Paul Robichaux dives into what you and your organization should do to prepare for the next unforeseen Microsoft outage.
This article explains how to use PowerShell to create a report listing the files from a OneDrive for Business account. Because so many Microsoft 365 apps store their files in OneDrive (and other apps too), OneDrive can become a form of dumping ground for data. Seeing file information in the report allows account owners to clean up their digital debris.
In this blog, Brandon Colley reviews how to use PIM approvals to create a workflow that could stop attackers in their tracks, even if they have already compromised credentials.