How to Add Active Directory Logs to Microsoft Sentinel
When setting up your SIEM, ingesting logs from Active Directory is essential. This blog dives into the two options for ingesting AD logs and compare their strengths and weaknesses.
When setting up your SIEM, ingesting logs from Active Directory is essential. This blog dives into the two options for ingesting AD logs and compare their strengths and weaknesses.
If you are stuck using your on-premises resources to manage a cloud infrastructure, it is an opportune time to change that with the availability of tools and functions that are now available. In this article, we focus on how to use PowerShell to manage Microsoft 365. In addition, we consider how to use cloud services to manage PowerShell code, testing, security controls, and more.
Microsoft is deploying a new version of the Teams webinar functionality to tenants. The new implementation is more functional and easier to use, and the impression is that this is a very simple but powerful implementation of a webinar management system.
Here’s to another year of practical advice on all things Microsoft! Practical 365 is wrapping up the year with a whopping 200+ articles, focusing on topics such as PowerShell, Exchange, Azure AD, Teams, and much more. This article shares 9 must-read posts, recommended by Steve Goodman, Tony Redmond, and Paul Robichaux.
Defender for Cloud Apps includes several policies to address different scenarios related to information Leakage. In this article, James Yip discusses how to best use Defender for Cloud App to prevent information leakage.
In this week's show - the final of 2022, we take a peek at the new Teams Premium licence add-on and discuss what value it brings. Exchange Online PowerShell v1 is on the way out - be warned - and a new Communities app - not Yammer - comes to Teams; plus much more
It Is known that Microsoft encrypts data both at rest and in transit, but is this enough protection for your documents? In this article, Paul Robichaux goes over adding an extra layer of protection through Double-Key and Customer Key Encryption.
Security researchers love to report software vulnerabilities that they find. That's their role and it's a valuable contribution to the technical community. However, some of the reports about Microsoft 365 flaws are over-hyped and under-considered, like a recent example covering the risk of phishing in the Exchange Online Direct Send feature.
Getting started with Source Control is an investment and can take some time to learn. In this article, Andy Schneider explains the Benefits of Source Control and getting started with Git.
Microsoft’s Windows 365 Cloud PC offering can be the perfect fit for organizations that require remote workers to log into a PC that can access their network without the need for a VPN. This article deep dives into Windows 365 and how to setup Windows 365 Enterprise for your organization.
On the show this week, Microsoft has just finished their big Microsoft Partner and MVP airlift for Microsoft 365 technologies, so as the year ends, there are fewer announcements. So, it's a shorter episode this week for news - which means we have time to ask the big questions and go into a deep dive on the podcast.
Adaptive retention policies are great, but they require high-end Office 365 or Microsoft 365 licenses. The solution is to build your own version using PowerShell and Azure Automation. The code is reasonably straightforward and is a practical example of how to replicate a Microsoft 365 feature in your own way.