Managing Exclusions for Microsoft Security Solutions
In this blog, Thijs Lecomte reviews Exclusion for Microsoft Security Solutions, why they are important, and how to manage them.
In this blog, Thijs Lecomte reviews Exclusion for Microsoft Security Solutions, why they are important, and how to manage them.
In this edition of Practical Protection, we are talking about the new Microsoft Cloud PKI, reviewing the steps for deployment, and helping you decide if it is worthwhile for your organization.
In our second edition of Practical PowerShell, Michel De Rooij dives into Functions and Parameters, what they are, and how to use them properly.
On Season 4, Episode 15 it's a trio of MVPs, as Steve and Paul are joined by UK MVP Jon Jarvis to discuss Intune & the criticality of making sure you onboard devices. And a show wouldn't be complete with an mention of AI! We discuss a new feature that helps you restrict what Copilot can search and use from your SharePoint sites.
In this blog, we review the steps needed to migrate and properly decommission your old tenant during an M&A Consolidation.
Anecdotal evidence is that some spam originates from onmicrosoft.com domains. These are the domains used by Microsoft 365 tenants and the spam indicates that attackers sign up for 'disposable' tenants to send their malware. This article describes what onmicrosoft.com domains are and how to use a mail flow rule to control their traffic.
Microsoft released cumulative update 14 for Exchange Server 2019 on February 13, 2024. This update fixes several bugs, but more importantly, contains a fix for a serious security issue that is being exploited in the wild. This is your sign to enable Extended Protection, if you haven't already.
If you’re interested in protecting your SharePoint Online, OneDrive for Business, or Exchange Online data, it is useful to understand how Microsoft 365 Backup works and what the software can and cannot do. In this article, Paul Robichaux walks through how to set up and test the preview version of Microsoft 365 Backup.
User consent is a great example of the tension between improved security and user convenience. Users want to be able to consent to applications without requiring the help of IT, which also allows the potential for a breach. In this blog, Paul reviews your options to solving the user consent problem.
This blog reviews the Midnight Blizzard Attack, providing some hypothetical scenarios of what actually happened and how it could've been prevented.
This article describes how to include user license costs in a Microsoft 365 tenant licensing report created with the Microsoft Graph PowerShell SDK. The report includes annual costs for all licenses assigned to each user plus an overall licensing summary for the tenant. It even reports how effective the tenant is at assigning licenses!
In this article, Jaap Wesselius reviews the different types of Exchange Server certificates, their uses, and how to manage them.