Microsoft 365

Latest Articles

Using Microsoft Defender for Cloud Apps to Secure Access for Remote Workers

There are many ways to provide secure access for remote users working on a home network or personal device (such as VPNs or VDI environments) and they each bring their own levels of complexity. This article explores using Microsoft Defender for Cloud Apps as a solution that is easily deployed, and capable of expanding beyond Office 365 to bring a higher level of control and governance over third-party cloud apps that lack similar native controls.

January 27, 2022

Bridging the Gap Between Microsoft Teams and Email

Teams is mostly an internal communications platform while email connects billions of people around the world. Inside Microsoft 365 tenants, you might need to connect Teams and email together. In this article, we discuss the out-of-the-box features available to link the two and describe some of the positive and negative points of each. You can certainly bridge the gap between Teams and email, but maybe Microsoft could grease the connection just a little more...

January 25, 2022

How to Transition from Exchange Online Mailbox Retention Policies to Microsoft 365 Retention

Exchange Online has mailbox retention policies. Microsoft 365 has retention policies and retention labels. In this article, we explore how to move away from Exchange Online retention to use Microsoft 365 retention. The transition makes it possible to use the advanced retention capabilities Microsoft is developing that will never show up in Exchange Online, so it's a good long-term goal to have even if it's not on your immediate work list.

January 20, 2022

Why Separate Microsoft 365 Administrator Accounts are Critical to Security Posture

There’s a lot of debate around the need to separate Microsoft 365 administrator accounts, especially when controls such as Privileged Identity Management exist within an organization. However, even with PIM there are remaining security concerns which necessitate the operation of separate accounts. This article explains the importance of using separate accounts; details how to target different Conditional Access policies for admin and user accounts and highlights how this approach increases your security posture and limits potential attack vectors against administrator accounts.

January 18, 2022

Identifying Potential Unwanted Access by Your MSP/CSP Reseller

Over the past few years, there's been an escalation in supply chain attacks where an attack on a partner company (like Kaseya or Solarwinds) has a direct effect on customers. A strong security posture is more important than ever as these attacks increase in frequency and sophistication, and this applies to Microsoft partners as well. Lately The Microsoft Threat Intelligence Center has reported seeing a significant rise in the number of attacks targeting Microsoft partners with Delegated Admin Permissions (DAP). This article unpacks the major issues around DAP and provides alternative solutions that grant your partner the level of access they need, while still maintaining a strong security posture for your tenant.

January 14, 2022

How to Use Office 365 Audit Data with Microsoft Sentinel

Microsoft Sentinel is Microsoft's log aggregator. Along with other data, Sentinel can ingest events from the Office 365 audit log. Once ingested, we can visualize the data through workbooks. If you have an Azure subscription, it's surprisingly easy to take advantage of the 31-day trial to see if Sentinel can do a job for your organization. Follow our steps and you'll be visualizing quickly.

January 13, 2022

How to Manage Teams Apps Permissions and Policies

As Microsoft Teams continues to be rapidly adopted across the globe, the number of applications that integrate with Teams grows as well. So much that it's often difficult for decision-makers and administrators to determine what apps are beneficial to their organization and necessitate inclusion. Fortunately, the Microsoft Teams admin center provides the data around each app you need to decide. This article helps you navigate the Teams admin center; explores the various app types available; and provides detail around permission policies, setup policies, and things like Resource-specific consent you’ll want to familiarize yourself with so you can effectively manage Teams apps for your organization.

January 12, 2022

Deploying .exe Applications with Microsoft Endpoint Manager

With an increasing number of companies moving to Intune for endpoint management, more applications must be deployed via Intune to ensure users can access the applications they need to perform job functions. This article walks you through the steps to deploy a legacy application and guides you through converting an .exe installer into an import-ready format for Intune.

January 11, 2022