TEC Tips: Email Protection Basics
Email is a primary target for breaches, making it crucial to have a strong line of defense for your email security. In this blog, we go over some Email Protection basics to help keep your organization safe.
Email is a primary target for breaches, making it crucial to have a strong line of defense for your email security. In this blog, we go over some Email Protection basics to help keep your organization safe.
On June 27, 2024, Microsoft launched the preview of the Entra PowerShell module. Built on top of the Microsoft Graph PowerShell SDK, the new module helps organizations that still have PowerShell scripts based on the now-deprecated AzureAD and AzureADPreview modules. If you're in that situation, the Entra module might help. But I recommend using the Microsoft Graph PowerShell SDK instead.
TEC 2024 in Dallas (October 1-2) will once again feature the TEC PowerShell Script-Off where coders attempt to come up with the best solutions for challenges set by the judges. The challenges are all Microsoft 365 scenarios (Exchange Online, Entra ID, Teams, and SharePoint Online), so there's nothing unknown about what we'll ask people to code. Come along to TEC 2024 and compete to be the best coder in town!
On the Practical 365 podcast this week, Rich and Steve are joined by Quest Software's Julian Stephan to discuss Active Directory Modernization & Microsoft's role in the SolarWinds hack.
The arrival of new Teams audit events allows tenants to analyze data about Teams online meetings. However, the data available in the audit events is incomplete, and the only way to get a full picture is through the Graph APIs. This article explains how to find Teams Online meetings in user calendars, extract information about the meetings, and generate an HTML report.
With the rise of generative AI comes an increased risk of organizational data leakage. This article explores recommendations to secure Microsoft 365 data from unauthorized generative AI applications.
A new sensitivity label setting blocks access to content services for Office applications. In effect, this stops any feature that depends on the ability to send content to Microsoft for processing, including Copilot for Microsoft 365, DLP, text prediction, and so on. It's a precise item-level block that protects sensitive documents from being consumed and used by Copilot in the text that it generates.
Archival and removal of locations within SharePoint Online and Teams is a helpful addition to remove stale data from immediate access by users, but it can be confusing for tenant admins to understand the available options. In this article, we examine what options exist to archive data and why you would use each option.
Over time, it's likely that some of the groups in a Microsoft 365 tenant will fall into either the category of memberless groups or ownerless groups. Microsoft has a solution to manage ownerless Microsoft 365 groups, but not the other group types supports by the Graph. This article explains how to find and report memberless groups using the Get-MgGroup cmdlet.
Defender for Endpoint gathers system information to support operation and detection needs. We can then leverage that data to build a custom report to show the deployment status. This blog walks through that process using KQL.
Microsoft already announced two sets of pre-release changes to Microsoft Recall that address some of its security issues. And there will undoubtedly be more. In this blog, we review your options to protect your organization against Microsoft Recall.
On this week's show, Steve and Paul are joined by Microsoft's Karin Skapski to discuss automation, Copilot, TEC, and much more.