Search for: conditional access policies

156 Results

What Now for Exchange 2013 Customers as End of Support Deadline Looms?

Exchange 2013 support ends on April 11, 2023. After that, Microsoft will not make fixes for security or functionality problems available to customers. It's time to make the decision to upgrade to Exchange 2019 or move to Exchange Online. Most organizations will find that Exchange Online is the right choice. Exchange 2019 is appropriate for organizations that have the right skills, experience, and investment to run a secure Exchange service.

Continue Reading What Now for Exchange 2013 Customers as End of Support Deadline Looms?

All About Microsoft Purview Sensitivity Labels (2023)

Microsoft has broadened and deepened the functionality available through sensitivity labels since their introduction in 2018. This article explains the basics of sensitivity labels and highlights some of the areas where important changes have occurred.

Continue Reading All About Microsoft Purview Sensitivity Labels (2023)

Top Ten PowerShell Tips for Microsoft 365 Management: Part Two

If you are stuck using your on-premises resources to manage a cloud infrastructure, it is an opportune time to change that with the availability of tools and functions that are now available. In this article, we focus on how to use PowerShell to manage Microsoft 365. In addition, we consider how to use cloud services to manage PowerShell code, testing, security controls, and more. 

Continue Reading Top Ten PowerShell Tips for Microsoft 365 Management: Part Two

Detecting and Protecting Entra ID from Password Spray Attacks

With the move to the cloud, many organizations synchronize identities to Azure Active Directory. This makes an attacker’s job easier as they have a single point where they can attempt to compromise accounts. In this article, Thijs Lecomte walks through the protection and detection mechanisms available to repel password spray attacks.

Continue Reading Detecting and Protecting Entra ID from Password Spray Attacks

Using Intune App Protection Policy to protect corporate data

Organizations used to use Intune MDM to manage apps, but with the increase in devices and apps, Intune MAM is the more appropriate vehicle. This article will give an overview of Intune app protection policy within MAM with specific policies I found particularly useful for protecting corporate data.

Continue Reading Using Intune App Protection Policy to protect corporate data