Signing into a Windows Device Using the Web
In this blog, Thijs Lecomte reviews the new Web Sign-in feature for Windows 11 and its specific use cases.
In this blog, Thijs Lecomte reviews the new Web Sign-in feature for Windows 11 and its specific use cases.
On the show this week, Rich and Steve are joined by Distinguished Engineer & AI Security Evangelist, Mike Wilson to discuss Microsoft's focus on AI, AI Security, the new Microsoft Planner, and more!
Just over two weeks ago at Ignite 2023, Microsoft confirmed features that made the cut for Microsoft 365 Copilot, and what features are coming further down the line. With full access to the GA version of Microsoft 365 Copilot, Steve Goodman takes a look at how well it works in the real world, and how it interacts with data in your Microsoft 365 tenant.
In this article, Karin Skapski explores some best practices for Teams Meeting recordings Governance, while also considering a few out-of-the-box Teams meeting policies and premium features in Microsoft Purview Data Lifecycle Management.
Ready or not, here Copilot comes! With that said, it's time to start thinking of the practical security aspects of these deployments. And that's exactly what's discussed in this edition of Practical Protection with Paul Robichaux.
In this article, Ingo Gegenwarth shows you how to develop an interface for end-users using Microsoft PowerApps for interacting and rendering data from Exchange Online.
On the show this week, we talk about Microsoft Ignite 2023, US Government's new AI rules, and we're joined by special guest and cybersecurity expert, Alex Crowther.
A key aspect of a well-managed Microsoft 365 environment is to ensure that SharePoint sites are removed when they are no longer needed. In this blog, Sean McAvinue explores how to combine relatively basic PowerShell and Azure Automation skills with Power Automate to create a clean, robust way to manage the lifecycle of SharePoint sites in your Microsoft 365 tenant.
Shared mailboxes are widely used in Exchange and their permissions are relatively simple to set and manage. In this blog, Jaap Wesselius deep dives into understanding Exchange shared mailbox permissions and walks you through how to grant permissions in different Exchange environments.
The Storm-0558 incident serves as a stark reminder of the potential threats that organizations face in today's digital landscape. In this blog, Rich Dean recaps the insider conversation around Storm-0558 that the Practical 365 Podcast team had with Alex Weinert, Microsoft's VP for Identity Security.
In this blog, Paul Robichaux reviews how to add additional protection to Microsoft Admin Portal Apps through MFA.
In this blog, Steve Goodman gives his first impressions of Microsoft 365 Copilot based on what was shown at Microsoft's Envision Conference in London.