Practical Protection: How to Score a Raise
Looking to score that raise? In this episode of Practical Protection, we dive into Microsoft 365 Secure score, how it works, and help you better secure your Microsoft cloud environments.
Looking to score that raise? In this episode of Practical Protection, we dive into Microsoft 365 Secure score, how it works, and help you better secure your Microsoft cloud environments.
Teams meeting transcripts can significantly enhance meeting productivity and accessibility, but their management involves careful consideration of data protection, privacy, and storage concerns. This article provides an overview of how to manage Teams meeting transcripts effectively, covering key topics such as storage changes, privacy controls, and strategies to ensure compliance while maximizing the benefits of transcription in your organization.
Incident Response is all about people, process, and technique. In this episode of Practical Protection, we review different issues that can arise during incident response.
Over the last year, Microsoft has released several new features to make management of inactive devices easier. In this blog, we review these features and build off our original blog post on "Handling Inactive Devices in Microsoft Defender for Endpoint."
Don't miss your chance to meet and learn from your favorite Practical 365 Authors at TEC 2024. As a proud sponsor of TEC, we are offering BOGO discounts on exclusive pre-con workshops with authors Michel De Rooij, Jaap Wesselius, and more!
In the wake of the recent CrowdStrike outage, Paul Robichaux dives into what you and your organization should do to prepare for the next unforeseen Microsoft outage.
This article explains how to use PowerShell to create a report listing the files from a OneDrive for Business account. Because so many Microsoft 365 apps store their files in OneDrive (and other apps too), OneDrive can become a form of dumping ground for data. Seeing file information in the report allows account owners to clean up their digital debris.
In this blog, Brandon Colley reviews how to use PIM approvals to create a workflow that could stop attackers in their tracks, even if they have already compromised credentials.
In this blog, Sean Mcavinue reviews an update to his original Tenant-to-Tenant Migration Assessment, which is designed to gather key data to consider during the migration planning process.
Welcome to Practical Sentinel! In the introductory blog of this series, we review how Microsoft positions Sentinel, what capabilities the product includes, and what it does well.
Microsoft introduces Microsoft Security Exposure Management (MSEM)! In this blog, Paul discusses MSEM and offers some advice for things you can do before the tool is pushed to GA.
Active Directory is now 25 years old! In this blog, we embark on a journey through the history and enduring significance of Active Directory over its lifespan, including what's to come in the future.