Practical Protection: Sign-In Marking
Microsoft reported yet another nation-state attack, code-named Peach Sandstorm. In this blog, we discuss the threat actor and provide steps to defend against similar attacks.
Microsoft reported yet another nation-state attack, code-named Peach Sandstorm. In this blog, we discuss the threat actor and provide steps to defend against similar attacks.
Three years ago, we described how to create organizational contacts in user mailboxes with Graph API requests. In this iteration, we read the contacts from a Microsoft list and use Microsoft Graph PowerShell SDK cmdlets to update user mailboxes. The techniques explained in the article can be used in many scenarios.
Microsoft recently stopped supporting Microsoft Entra Connect and introduced its successor, Microsoft Entra Cloud Sync. This blog reviews how to set up and configure Microsoft Entra Cloud Sync, with helpful tips along the way.
Microsoft plans a transition of the current Exchange Server licensing and support model to Exchange Server subscription edition (SE) starting in 2025. Organizations must prepare for the transition by upgrading servers to the latest cumulative updates of Exchange 2016 and Exchange 2019. The transition is unlikely to be seamless, but glitches can be avoided by good planning and careful monitoring of community discussions.
Microsoft Lists are a powerful tool for end users to store and manage data stored in SharePoint Online sites. The Microsoft Graph PowerShell SDK includes cmdlets to work with Microsoft Lists and this article explains how to use the cmdlets to add new lists, add items to lists, retrieve data from lists, and remove items from lists.
On this episode of Practical Protection, we are joined by Paul Thurrott to discuss AI and Microsoft, plus give a sneak peek into his session at TEC 2024.
In this blog, Thijs Lecomte dives into how to protect you public-facing infrastructure with Microsoft Defender's External Attack Surface Management tool.
Terminating employees is never fun, but it does happen. And when it happens, you need to know the necessary steps for removing their access. This blog serves as a checklist for removing employees with Microsoft 365 Accounts,
No one likes spending money! In this episode of Practical Protection, we dive into imposing cost on attackers, hopefully deterring them from attacking in the first place.
Dynamic watermarking is a new feature for sensitivity labels that's intended to provide a visual deterrent to screen captures of confidential documents. The feature works by using the email address of the signed-in user as a watermark. Everything works and the feature seems effective, but this isn't something to use with every sensitivity label.
This week on the Podcast we are joined by Paul Robichaux - as a guest alongside MVPs Tony Redmond and Michel de Rooij to discuss The Experts Conference (TEC) 2024 in Dallas, Texas!
In this installment of the Practical PowerShell series, we discuss some of the most common options for output and adding custom logging to your script.