How to Use Microsoft 365 Defender and Sentinel to Defend Against Zero Day Threats: Part I
This article discusses the four main steps to mitigate a zero-day threat Using Microsoft 365 Defender and Sentinel.
This article discusses the four main steps to mitigate a zero-day threat Using Microsoft 365 Defender and Sentinel.
This week on Practical Protection, Paul discusses the history of passwords and the many problems they pose in the modern cloud-based world.
Kusto Query Language, or KQL for short, is omnipresent in the Microsoft world and is used in different product stacks. Like any language, KQL can be challenging to understand and know where to start. This article is intended to help newcomers to get started.
TEC is back -100% Virtual & Free - December 6-7! This article recaps the recent in-person TEC event and what to expect from virtual TEC.
In this week's Podcast, Paul and Steve discuss Microsoft Syntex, how everyone wants Exchange Server to die, the Metaverse, and much more!
A Wired article calls Exchange Server a security liability and it's hard to argue the case that the assertion is incorrect. Too many vulnerabilities, too many attacks, and an architecture that's creaking at the seams means that Exchange on-premises is at the end of its days.
We’ve developed a framework to guide a Power BI migration from one tenant to another. This blog provides a brief overview of the framework.
Every month, Microsoft generates a new version of the Graph PowerShell SDK. And if you use the SDK with Azure Automation, you must update automation accounts with the new modules. That's a pain to do manually, but easy to automate with PowerShell as we explain here.
This article is a recap of Bryan Patton's and Joe Sharmer's TEC session. This session focused on key challenges facing today’s Active Directory administrators during consolidation and divestiture projects.
Welcome to the first installment of Practical Protection with Paul Robichaux. Paul illustrates four general security principles and talks about how you can practically apply them to your Exchange environment.
The Office 365 audit log is a rich source of forensic information. This article explains how to use Azure Automation to search the log for high-priority events. We use the new support for managed identities in V3.0 of the Exchange Online management PowerShell module to search the audit log and end up sending a nice HTML-format message to administrators.