Search for: practical protection

390 Results

Microsoft Enters the Backup Business with a New Syntex Service

Microsoft plans to launch a Pay As You Go backup and restore service for Exchange Online and SharePoint Online as part of its Syntex content management suite. This is new ground for Microsoft as they've never offered a backup service for Microsoft 365 before. How will Syntex compare to ISV backup services? Time will tell!

Continue Reading Microsoft Enters the Backup Business with a New Syntex Service

Detecting and Protecting Entra ID from Password Spray Attacks

With the move to the cloud, many organizations synchronize identities to Azure Active Directory. This makes an attacker’s job easier as they have a single point where they can attempt to compromise accounts. In this article, Thijs Lecomte walks through the protection and detection mechanisms available to repel password spray attacks.

Continue Reading Detecting and Protecting Entra ID from Password Spray Attacks

Giving Sensitivity Labels a Splash of Color

Microsoft 365 tenants can assign colors to the sensitivity labels used to mark files and messages. However, the set of colors chosen by Microsoft is frankly a bit weird. You can use PowerShell to assign different colors to labels and in this article, we show you how to use a traffic light color scheme.

Continue Reading Giving Sensitivity Labels a Splash of Color

It Really is Time to Say Goodbye to On-Premises Exchange

A Wired article calls Exchange Server a security liability and it's hard to argue the case that the assertion is incorrect. Too many vulnerabilities, too many attacks, and an architecture that's creaking at the seams means that Exchange on-premises is at the end of its days.

Continue Reading It Really is Time to Say Goodbye to On-Premises Exchange

Two Zero-Day Vulnerabilities Hit Exchange Server

The bad news is that Exchange Server has two more day-zero vulnerabilities to cope with. The good is that Microsoft has figured out some mitigations. The ongoing problem remains that attackers like to go after Exchange Server because so many servers are in a poor state of maintenance.

Continue Reading Two Zero-Day Vulnerabilities Hit Exchange Server

Explaining Azure AD External Identities

Guest access for your company should be planned and understood by all stakeholders, documented in the company’s Security Policy, and then implemented and reviewed to maintain a clean Azure AD environment.

Continue Reading Explaining Azure AD External Identities