Practical Protection: Banning Apps with Intune
In this in episode of Practical Protection, we dive into some recent IT incidents involving applications, and how Intune can be used to block them from your devices.
In this in episode of Practical Protection, we dive into some recent IT incidents involving applications, and how Intune can be used to block them from your devices.
Most Microsoft 365 tenants have a collection of Entra ID apps to manage. One task might be to control access to Entra ID apps, so the question is how best to do this. Assignments for users and groups control the ability to use apps while custom app roles are there for developers to determine what a user can done when they run an app.
In previous Practical PowerShell articles, Michel discussed using parameters in advanced functions and utilizing dynamic parameters. In this article, we will dive in a bit deeper on a topic we touched on lightly in those articles, which is ways to validate parameter input.
Transport Layer Security (TLS) is used to setup secure connections between clients and servers. In this blog, we review TLS 1.3, its changes and advantages, and compare it to its predecessor, TLS 1.2.
Join Steve Goodman and Rich Dean for Rich's final episode of the Practical 365 Podcast, where they reflect on memorable guests and insights from past episodes. Plus, meet new co-host Bastiaan Verdonk, a cybersecurity expert with over 28 years of industry experience, as they discuss AI developments and the future of technology.
The Microsoft Graph API offers great access to SharePoint Online site content, but sometimes the need exists to resist app access to SharePoint Online sites. That's where the Sites.Selected Graph permission comes in by allowing administrators to dictate exactly which sites an app can access. Practice the Principle of Least Permission!
Integrating Microsoft Forms with SQL Server through Power Automate provides a structured way to store form submissions. In this blog, we review how to implement this process and provide a real-world use case, including important security considerations.
In this episode of Practical Protection, Paul Robichaux dives into CISA's Microsoft Expanded Cloud Logs Implementation Playbook, its prerequisites, and applying this advice into your organization.
When at least one user has a Teams Premium license assigned within an organization, several new features and settings are activated. In this article, we provide guidance to Teams administrators on which settings to monitor, features that are enabled by default or require specific configurations to work, and help identify who needs a Teams Premium license to access and use these various features.
Everyone's very excited about the potential goodness of Copilot agents, but how Microsoft 365 tenants will manage potentially thousands of agents in the future is something that isn't clear. Some administrative capabilities are in the Microsoft 365 admin center, but are these sufficient? We don't think so, and this article explains why and what we'd do about the problem.
Securing applications in an Entra tenant is crucial, especially after recent attacks like Midnight Blizzard. This article reviews how to use PowerShell to help identify privileged applications, their permissions, as well as client Secrets.
Microsoft 365 Copilot licensing costs a lot of money. At $360 annually, it's important to make sure that everyone with a license makes full use of Copilot to become more productive and efficient. Usage data is available in the Graph, and some PowerShell can reveal who's using Copilot and who's not. With that data, you can decide whether to remove licenses for reassignment to other users.