Leveling Up Privileged Identity Management with Approvals
In this blog, Brandon Colley reviews how to use PIM approvals to create a workflow that could stop attackers in their tracks, even if they have already compromised credentials.
In this blog, Brandon Colley reviews how to use PIM approvals to create a workflow that could stop attackers in their tracks, even if they have already compromised credentials.
In this blog, Sean Mcavinue reviews an update to his original Tenant-to-Tenant Migration Assessment, which is designed to gather key data to consider during the migration planning process.
Welcome to Practical Sentinel! In the introductory blog of this series, we review how Microsoft positions Sentinel, what capabilities the product includes, and what it does well.
Microsoft introduces Microsoft Security Exposure Management (MSEM)! In this blog, Paul discusses MSEM and offers some advice for things you can do before the tool is pushed to GA.
Active Directory is now 25 years old! In this blog, we embark on a journey through the history and enduring significance of Active Directory over its lifespan, including what's to come in the future.
In this blog, Thijs Lecomte reviews Exclusion for Microsoft Security Solutions, why they are important, and how to manage them.
In this edition of Practical Protection, we are talking about the new Microsoft Cloud PKI, reviewing the steps for deployment, and helping you decide if it is worthwhile for your organization.
In our second edition of Practical PowerShell, Michel De Rooij dives into Functions and Parameters, what they are, and how to use them properly.
On Season 4, Episode 15 it's a trio of MVPs, as Steve and Paul are joined by UK MVP Jon Jarvis to discuss Intune & the criticality of making sure you onboard devices. And a show wouldn't be complete with an mention of AI! We discuss a new feature that helps you restrict what Copilot can search and use from your SharePoint sites.
In this blog, we review the steps needed to migrate and properly decommission your old tenant during an M&A Consolidation.
Anecdotal evidence is that some spam originates from onmicrosoft.com domains. These are the domains used by Microsoft 365 tenants and the spam indicates that attackers sign up for 'disposable' tenants to send their malware. This article describes what onmicrosoft.com domains are and how to use a mail flow rule to control their traffic.
Microsoft released cumulative update 14 for Exchange Server 2019 on February 13, 2024. This update fixes several bugs, but more importantly, contains a fix for a serious security issue that is being exploited in the wild. This is your sign to enable Extended Protection, if you haven't already.