Practical Sentinel: Auditing Multifactor Authentication with Sentinel
In this episode of Practical Sentinel, Thijs Lecomte discusses how to create some basic KQL queries to track MFA usage.
In this episode of Practical Sentinel, Thijs Lecomte discusses how to create some basic KQL queries to track MFA usage.
In this Episode of Practical Protection, we talk about BitLocker's new self-service recovery key access feature.
This article explains how to use PowerShell to create a report listing the files from a OneDrive for Business account. Because so many Microsoft 365 apps store their files in OneDrive (and other apps too), OneDrive can become a form of dumping ground for data. Seeing file information in the report allows account owners to clean up their digital debris.
In this week's episode of the Practical 365 podcast, Steve Goodman and Rich Dean are joined by Microsoft's Andy Jaw, a senior security specialist with a fascinating background spanning the military, law enforcement, and now as a cyber security expert.
In this episode of Practical PowerShell, we continue the conversation around another essential part of flow control: Branching.
The TEC 2024 Keynotes will feature compelling sessions on identity, security, and the future of Windows. Delivered by speakers with strong opinions, these sessions are definitely not to be missed. Join the Practical365 crew at TEC 2024 in Dallas, Oct 1-2.
In this blog, we take a look at the Unified Security Operations Platform, review what is available right now, discuss what Microsoft is building, and ask whether you need this functionality.
Microsoft 365 Archive is a solution to move SharePoint Online sites from hot to cold (less expensive) storage. It works well, and it comes with an added benefit in that archived sites are inaccessible to Copilot. In other words, you can make sure that Copilot doesn't process old and obsolete material by archiving sites that contain this type of content. Seems like a no-brainer.
Microsoft recently released a memo from Security VP, Charlie Bell. In this blog, we recap the memo and discuss some of the new security initiatives Microsoft is working towards.
In this blog, Brandon Colley reviews how to use PIM approvals to create a workflow that could stop attackers in their tracks, even if they have already compromised credentials.
On this week's episode, Paul and Steve cover several major Microsoft announcements impacting the future of AI, Exchange Server, and identity solutions.