Read about the most insightful coverage of the Microsoft 365 ecosystem presented in practical articles which make a difference.
Latest Articles
In our 2024 review of Microsoft 365, we consider some of the major technical advances that occured in Microsoft's cloud ecosystem in 2024 together with some upcoming changes that have the potential to affect tenant operations. As always, our choice of what's important and what's not might not match yours, so feel free to comment and voice your opinion.
This article provides a step-by-step guide on how to use Power Automate Flow to create a workflow that sends a weekly digest email of Microsoft 365 Roadmap updates.
Minimizing disruption is key to any migration. In this blog, we discuss migrating SharePoint sites and data to SharePoint Online, reviewing common issues, and offering a few different approaches to reduce friction.
Starting in February 2025, Microsoft is going to enforce MFA for all access to the Microsoft 365 admin center—both for users and administrators. Let this episode of Practical Protection serve as a reminder to configure MFA for your tenant, if you haven’t already!
Welcome to Practical Power Apps! In this first installment, Rachel Irabor explores how to manage an approval process using Power Apps and Power Automate in a real-world scenario.
In this episode of Practical Protection, Paul Robichaux provides a practical approach to Conditional Access Management, combining both the Beas and Microsoft frameworks.
Many organizations still find it challenging to implement Conditional Access effectively. Luckily, there is a solution for this. In this blog, we share a new open-source framework, introducing 4 tools to help create and validate access policies and strategies, ensuring that security measures are effective and efficient.
It's that time of the year again! In this episode of Practical Protection, we review the 2024 Microsoft Digital Defense Report and offer our recommendations to protect against the emerging and current threat.
In this blog, Thijs Lecomte dives into how to protect you public-facing infrastructure with Microsoft Defender's External Attack Surface Management tool.
Dynamic watermarking is a new feature for sensitivity labels that's intended to provide a visual deterrent to screen captures of confidential documents. The feature works by using the email address of the signed-in user as a watermark. Everything works and the feature seems effective, but this isn't something to use with every sensitivity label.
In this episode of Practical Teams, we dive into meeting templates and sensitivity labels, exploring how labels and templates can be used to adhere to requirements, policies, and if necessary, enforce some applicable settings in meetings.
Sometimes sensitivity labels defined for use within a Microsoft 365 tenant turn out to be unnecessary. The question then is what to do with these unwanted sensitivity labels. The answer is to pause for thought, gather information, and then make an informed decision, all of which we discuss here.