Search for: practical protection

390 Results

How Microsoft is Using Copilot to Drive Customers to Microsoft 365

Microsoft 365 Copilot is only available for 4 Microsoft 365 SKUs. There's no technical reason why this is so. Instead, Microsoft is using Copilot as a selling point to convince customers to upgrade to Microsoft 365 E5 (preferably). All's fair in love and business, and this is just an example of product management for maximized profit.

Continue Reading How Microsoft is Using Copilot to Drive Customers to Microsoft 365

Exchange Online Enforces Sender DMARC Policy

From mid-August 2023, Exchange Online will enforce the action defined in the sender DMARC policy for inbound messages detected as spoof (by spoof intelligence). Tenants have the chance to amend their anti-phishing policy to decide what to do with these messages. I favor an outright rejection.

Continue Reading Exchange Online Enforces Sender DMARC Policy

Resolving the Five Most Common Conditional Access Misconfigurations

Misconfigured Conditional Access policies may introduce unnecessary risk to your tenant. That is why it is important to make sure these policies are properly configured. In this blog, Brandon Colley reviews the five most common Conditional Access misconfigurations.

Continue Reading Resolving the Five Most Common Conditional Access Misconfigurations

Exporting Mailbox Contents to PST with Exchange Online

With all the fuss about the new EAC, it's good to note features that still aren't available in the online version. Like how to export mailboxes to PST files. I don't normally like doing anything with PSTs, but sometimes you must grit your teeth and use what's available. In this article, we explain how to use a content search to export the contents of a user mailbox to a PST file.

Continue Reading Exporting Mailbox Contents to PST with Exchange Online

Using DLP with Defender for Endpoint

When it was first available, Microsoft 365 Data Loss Prevention (DLP) policies could only process Microsoft 365 data. Over the last few years, Microsoft expanded the scope for DLP to support these additional environments. In this article, we focus on implementation details around applying DLP to endpoint devices.

Continue Reading Using DLP with Defender for Endpoint