Not Today, Satan: Securing Your Network by Blocking Ad-Borne Malware
Apart from being annoying, advertisements can actually be used to deliver malware. This blog explains what "Malvertising" is and how to secure your network from these attacks.
Apart from being annoying, advertisements can actually be used to deliver malware. This blog explains what "Malvertising" is and how to secure your network from these attacks.
On this episode of the Practical 365 podcast, Rich and Paul talk about Microsoft 365 Copilot GA, The Experts Conference, Microsoft Ignite being sold out, and Exchange Web Services retiring soon.
Years ago, we worried about ex-employees taking PSTs full of email away when they left an organization. OneDrive for Business is a more current concern because of its ability to synchronize large quantities of information to local workstations.
Has the Microsoft Cloud Killed On-Premises Servers? Well... Thats up for debate! And that is exactly what Tony Redmond and Greg Taylor did at TEC 2023. This blog goes over main points from their debate, while providing some insights to help you decide if you should be moving to the cloud.
Migrating Power BI can be difficult and requires meticulous planning. This blog dives into a new conventional approach to migrating Power BI, based on a recent TEC session.
In order to protect your Azure and Microsoft 365 services, you need to know what tokens are, where they come from, how they can be used, and how to protect them. This column by Paul Robichaux will hopefully get you pointed in the right direction.
Although there is not a single definitive right answer on how to leverage Microsoft's solutions to support your cybersecurity strategy, there is much to be learned from how certain challenges are typically overcome by others. In this Blog, Michael Van Horenbeeck discusses the importance of a Well-Thought out Security Strategy with some helpful tips along the way!
In this blog, Becky Cross dives into the Lifecyle of a User Identity during a Migration and provides some useful tips along the way.
Many questions arose from the announcement of the Microsoft 365 multi-tenant organization (MTO) feature, In this article, I examine some practical aspects of multi-tenant organizations and examine why MTO does not replace the need for tenant-to-tenant migrations.
Sometimes simulation testing is the best way to see how your org would react to threats, but at what cost? Check out this article, and see what testing would best fit your org.
Microsoft has changed the way that the Search-UnifiedAuditLog cmdlet works without saying anything to Microsoft 365 customers. The results is that some scripts don't work and others won't return the expected results. This article explains what's happened and offers a workaround. Microsoft's actions are unexplainable, but it's the norm in this area where audit log changes happen without communication all the time.
A Multi-Forest Hybrid Exchange scenario is complicated and requires extensive planning. In this article, we discuss some good practices to help organizations prepare for a Hybrid Exchange Online sim in a multi-forest environment, including collapsing the ERF to create a simplified environment.