Search for: practical protection

390 Results

Diving into the Details of Microsoft Teams Shared Channels

A year after announcing Teams shared channels, Microsoft is preparing to release the code into public preview in March 2022. The new collaboration mechanism uses Azure AD B2B Direct Connect instead of guest accounts, meaning that external members of shared channels use credentials issued by their home tenant to gain access. You'll need to configure a cross-tenant access policy to allow shared channels to work externally. Once that's done, the collaboration floodgates open.

Continue Reading Diving into the Details of Microsoft Teams Shared Channels

Threat Explorer and Investigations: Useful Microsoft Defender for Office 365 Features

Microsoft Defender for Office 365 (plan 2) contains the Threat Explorer feature. It's a useful way to investigate problematic messages which arrive in a tenant. The automated investigations feature can highlight messages containing malware by assembling evidence about warning signs in the message or its contents, and administrators can then action the recommendations up to and including the removal of messages already delivered to user mailboxes. Automating investigations is a good thing, if you afford Defender for Office 365 Plan 2.

Continue Reading Threat Explorer and Investigations: Useful Microsoft Defender for Office 365 Features

Ten Ways to Harden the Security of a Microsoft 365 Tenant

If there's one topic all administrators can agree on, it's that security is something every organization should work to improve in 2022. In this two-part article series, we explain ten different ways to improve tenant security that every administrator should consider. The first part reviews five ways to harden tenant security without the need for extra licenses, using controls that every organization can implement.

Continue Reading Ten Ways to Harden the Security of a Microsoft 365 Tenant

Why Using App Secrets in Production is a Bad Idea

As many organizations adapt legacy scripts to use app authentication instead of traditional service account credentials, security can be compromised if certain risks are overlooked. While app secrets can be great for testing code, there’s a reason they have an enforced expiry date - the longer a secret exists in production, the higher the risk it will become compromised. The methods described in this article will help build a good foundation for app authentication while keeping security top of mind when creating or updating automation scripts.

Continue Reading Why Using App Secrets in Production is a Bad Idea

New Features Galore in Microsoft 365, plus we chat VDI with Microsoft MVP Theresa Miller

Join myself and Paul Robichaux for this week's latest episode of the podcast to discuss a plethora of updates in Microsoft 365. Plus we're joined by Microsoft MVP Theresa Miller to discuss all things VDI with Microsoft 365. We chat about Azure Virtual Desktop, Citrix, VMware and much more, from the point of view of Microsoft 365 IT pros.

Continue Reading New Features Galore in Microsoft 365, plus we chat VDI with Microsoft MVP Theresa Miller

Exchange Online Launches Support for MTA-STS

Exchange Online now supports SMTP Strict Transport Security (MTA-STS), a mechanism to help defend SMTP communications between mail servers. Microsoft 365 tenants can decide if they want to enable MTA-STS for their domain by publishing a DNS record and an MTA-STS policy. You don't have to use MTA-STS, but it's a good idea to consider the option.

Continue Reading Exchange Online Launches Support for MTA-STS

Windows 11 Requirements & TPM: What Are the Real Benefits?

In June of 2021, Microsoft announced the requirements for Windows 11, which has a notable security hardware requirement: PC configurations must include version 2.0 of the Trusted Platform Module (TPM) to install Windows 1. This article reviews what TPMs are, outlines the benefits and use cases, and examines the extent to which the requirement will protect devices from the most common threats.

Continue Reading Windows 11 Requirements & TPM: What Are the Real Benefits?

Using Microsoft Defender for Cloud Apps to Secure Access for Remote Workers

There are many ways to provide secure access for remote users working on a home network or personal device (such as VPNs or VDI environments) and they each bring their own levels of complexity. This article explores using Microsoft Defender for Cloud Apps as a solution that is easily deployed, and capable of expanding beyond Office 365 to bring a higher level of control and governance over third-party cloud apps that lack similar native controls.

Continue Reading Using Microsoft Defender for Cloud Apps to Secure Access for Remote Workers