Cryptojacking Azure, Storm-0558, Microsoft 365 Copilot News & Prerequisites: The Practical 365 Podcast S4 E4
On the show this week, Steve Goodman and Paul Robichaux discuss Storm-0558, TEC 2023, new Azure costs, Copilot news, and more!
On the show this week, Steve Goodman and Paul Robichaux discuss Storm-0558, TEC 2023, new Azure costs, Copilot news, and more!
At the TEC 2023 conference in Atlanta, Greg Taylor (Microsoft) analyzed the four-year project he led to remove basic authentication from Exchange Online. Microsoft will reuse the methods and tools developed for this project when it removes other features from Microsoft 365.
In this blog, James Yip explains how to Configure Enterprise SSO in Apple Devices when conducting a macOS deployment.
A beta version of a Graph API to delete Teams chat threads allows administrators to remove unwanted chats. This article reviews how the API requests work to delete, list, and undo deleted chat threads using cmdlets from the Microsoft Graph PowerShell SDK. The first step is to find chats to remove, so we wrote a script to report all the chat threads for the signed-in user.
We hope that you never have to perform a full AD forest recovery in production, but it is something that you’ll want to be well prepared for. Check out this blog and learn what you should be including in your AD recovery plan.
Although there is not a single definitive right answer on how to leverage Microsoft's solutions to support your cybersecurity strategy, there is much to be learned from how certain challenges are typically overcome by others. In this Blog, Michael Van Horenbeeck discusses the importance of a Well-Thought out Security Strategy with some helpful tips along the way!
In this blog, Becky Cross dives into the Lifecyle of a User Identity during a Migration and provides some useful tips along the way.
Many questions arose from the announcement of the Microsoft 365 multi-tenant organization (MTO) feature, In this article, I examine some practical aspects of multi-tenant organizations and examine why MTO does not replace the need for tenant-to-tenant migrations.
Sometimes simulation testing is the best way to see how your org would react to threats, but at what cost? Check out this article, and see what testing would best fit your org.
Storm-0558 is a China-originated attack against sensitive Exchange Online mailboxes. The attack exposed several flaws in Microsoft's processing of data. Microsoft says that the holes are now closed, but it's still a good idea to check that your tenant is not being attacked in the same way.
On the show this week, we're talking about Microsoft unbundling Microsoft Teams in response to Slack, new features coming to Teams that are long awaited, plus Justin Kohler from SpecterOps joins us on the show to talk about his TEC session.
In this article, Damian Scoles discusses what DNS records should be in place for Exchange Online, why these records are needed, and how to validate that DNS is properly configured.