AD-Based Attacks in 2023 – What We’ve Learned So Far
In this blog, Paul Robichaux covers a recent TEC Talk where he discusses AD-Based Attacks in 2023 and what we've learned so far.
In this blog, Paul Robichaux covers a recent TEC Talk where he discusses AD-Based Attacks in 2023 and what we've learned so far.
The Microsoft Graph PowerShell SDK uses a default enterprise app to hold its permissions. Over time, the SDK can accrue many permissions, so it's important to control interactive access to it. In this article, we review how to lock down the SDK app and how to create new registered apps for use with the Graph SDK.
This week we are joined on the show by Microsoft MVP and Practical 365 Editor, Tony Redmond. On this episode, Steve Picks Tony's brain on Copilot, On-premises, and his upcoming TEC session.
Active Directory modernization is a crucial step for organizations looking to transform and enhance their IAM capabilities. In this blog, Julian Stephan dives into an overview of some of the benefits and considerations of Active Directory modernization.
The announcement of Microsoft's Security Service Edge (SSE) Products has gained a lot of buzz in the space. In this blog, Thijs Lecomte breaks down these products and how well the market accepts Microsoft’s SSE initiative.
Microsoft 365 Copilot is only available for 4 Microsoft 365 SKUs. There's no technical reason why this is so. Instead, Microsoft is using Copilot as a selling point to convince customers to upgrade to Microsoft 365 E5 (preferably). All's fair in love and business, and this is just an example of product management for maximized profit.
Five years is way too long to leave a vulnerability unpatched. Unfortunately, forgetting to patch isn't uncommon and hackers love when you do... This blog discusses how to stay on top of patching and stop easily avoidable breaches.
AI is everywhere now, especially within the Microsoft 365 landscape. Therefore, it is time to start thinking about your strategy for implementing this into your organization. In this article, Mark Rackley dives into preparing and getting started with AI in Microsoft 365.
In this blog, Becky Cross reviews some key Takeaways and next steps from the recent TEC Talk: What to Do About Exchange On-Premises After Microsoft Starts to Block Messages.
In our first show in season four, new co-host Rich Dean joins Steve and Paul to discuss preparing your Active Directory against compromises, new Microsoft Teams features, and Greg Taylor joins to talk about his upcoming session at TEC.
Microsoft 365 makes it easy for administrators to get mail activity usage data for users. However, if you want to know which domains are sending most mail, you need to do some work. In this article, we cover how to use cmdlets from the Microsoft Graph PowerShell SDK to create reports about user mail activity over time and the traffic sent by different domains.
From mid-August 2023, Exchange Online will enforce the action defined in the sender DMARC policy for inbound messages detected as spoof (by spoof intelligence). Tenants have the chance to amend their anti-phishing policy to decide what to do with these messages. I favor an outright rejection.