Practical Endpoint: Using PowerShell to Get a Report of Installed Apps
In this blog, James Yip reviews how to use PowerShell to examine details of managed devices and installed apps on endpoints.
In this blog, James Yip reviews how to use PowerShell to examine details of managed devices and installed apps on endpoints.
Microsoft has announced that Copilot for Security will become commercially available on April 1! In this blog, we discuss what that means for users, what it will actually help you do, and what to expect in terms of pricing.
On Season 4, Episode 15 it's a trio of MVPs, as Steve and Paul are joined by UK MVP Jon Jarvis to discuss Intune & the criticality of making sure you onboard devices. And a show wouldn't be complete with an mention of AI! We discuss a new feature that helps you restrict what Copilot can search and use from your SharePoint sites.
It can be difficult to decide who should get expensive Copilot for Microsoft 365 licenses. This article describes how to use PowerShell to extract and analyze Microsoft 365 usage reports to help make the decision. It's always best to make decisions based on data rather than emotions!
In this blog, Jaap Wesselius dives deep into TLS and explains what Extended Protection is, how it works in IIS, and how to configure extended protection for Exchange Server.
The fallout from the Midnight Blizzard attack against Microsoft continues as Microsoft takes action to harden the security of its own and customer tenants. One step is to retire the EWS Application Impersonation role. This will happen in February 2025 ahead of the retirement of Exchange Web Services in October 2026.
In this blog, we review the steps needed to migrate and properly decommission your old tenant during an M&A Consolidation.
Microsoft has a new approach to control private team discoverability. You can have all-in access by enabling discoverability through Teams policies or granular access by using sensitivity labels to control if private teams are discoverable or not. This article explains how both methods work.
In this episode of the Practical 365 Podcast, Steve and Rich are joined by Becky Cross to discuss Hybrid Identity Migration, new Exchange On-Premises cumulative updates, Azure OpenAI features, and more!
In this blog, we review a new organized phishing campaign impacting Azure Cloud environments and discuss what to do if your organization happens to fall victim.
This article examines how Copilot for Microsoft 365 handles protected content, including how it interacts with Microsoft Purview sensitivity labels. Hopefully, this information will help administrators to configure information protection controls and understand their impact in relation to Copilot for Microsoft 365.