Unveiling the Landscape: Exploring Microsoft Solutions for Multi-Tenant Management in Microsoft 365
In this blog, Richard Dean Teases his TEC 2023 session and explores the complexities of Multi-Tenant Management using Microsoft solutions.
In this blog, Richard Dean Teases his TEC 2023 session and explores the complexities of Multi-Tenant Management using Microsoft solutions.
Misconfigured Conditional Access policies may introduce unnecessary risk to your tenant. That is why it is important to make sure these policies are properly configured. In this blog, Brandon Colley reviews the five most common Conditional Access misconfigurations.
It's time to armor up for battle with Microsoft's DMARC. In this article, Damian Scoles talks about new improvements to DMARC and how you can use them to protect against email attacks.
Recently, security researchers at JumpSec labs identified a vulnerability in Teams that allows malware delivery through Teams chat. Microsoft Acknowledged the vulnerability but didn't release any immediate remedies. In this blog, we will discuss two practical methods to avoiding malware delivery within Teams.
You can’t disrupt a chain if you can’t identify the links. In this blog, Paul Robichaux goes over some of the ways you can break a Kill Chain in your environment. And it all starts with asking yourself the right questions.
In this Blog, James Yip explains how to conduct sensitive file inventory and background labeling using the Purview Information Protection Scanner.
Recycling is not only good for the planet, but it's also good for the security of your organization. In this article, Paul Robichaux discusses how to properly dispose of your devices so that you stay protected.
This week, we’re bringing you the latest news from Microsoft’s Build conference; including the best of many Microsoft 365 copilot announcements, a peek into the underpinnings of Copilot itself via new Azure service, the return of Mesh for Teams and much more.
Join us as we continue our deep dive into the validation phase of a Microsoft 365 Exchange Online Domain Transfer. In this Blog, we discuss how to communicate a migration plan to stakeholders and end-users.
Many people use the Windows Task Scheduler to run PowerShell scripts. The Task Scheduler works, but it creates a dependency on a specific workstation and isn't as secure as you might like. Running Microsoft 365 PowerShell scripts in Azure Automation is a much better idea. It's time to dump the Task Scheduler!
When it was first available, Microsoft 365 Data Loss Prevention (DLP) policies could only process Microsoft 365 data. Over the last few years, Microsoft expanded the scope for DLP to support these additional environments. In this article, we focus on implementation details around applying DLP to endpoint devices.
Whether you like it or not, MFA is coming for you! You can either deploy and support MFA for your users, or Microsoft is going to do it for you. The choice is yours. Learn more about how Microsoft will be enforcing MFA in the future, and what you should do.