What's Trending

Subscribe

Latest Posts

Planning for Azure AD Conditional Access Policies

Conditional Access policies provide many security benefits, from the implementation of MFA in a user-friendly way, to the controls that can limit what data users access or download. However, the process of setting up CA policies is daunting to some at first. This article provides some thought processes and best practices to make this security initiative more manageable.

February 10, 2022

Microsoft 365 Tech Blogging, Vlogging and Podcasting Kit – Top Choices for 2022

Creating content to share with your fellow IT professionals is time-consuming, and getting the right setup and equipment for tech blogging, vlogging and podcasts is important. However, it can be difficult to know what the best kit for your budget is. In this article you'll find exactly what you need, from Microsoft 365 environments, microphone, cameras, green-screens to software for recording or streaming your next tech discovery in the Microsoft Cloud.

February 4, 2022

Exchange Online Launches Support for MTA-STS

Exchange Online now supports SMTP Strict Transport Security (MTA-STS), a mechanism to help defend SMTP communications between mail servers. Microsoft 365 tenants can decide if they want to enable MTA-STS for their domain by publishing a DNS record and an MTA-STS policy. You don't have to use MTA-STS, but it's a good idea to consider the option.

February 4, 2022

Secure Access for Remote Workers without Microsoft Defender for Cloud Apps

In the second article of this 2-part series, we describe the alternatives that exist to help secure access for remote workers, exploring the worthy features that don’t require MDCA. The features detailed in this article are available for any tenant with Azure AD Premium licensing and offer a more generic set of controls for tenants where MDCA licensing is not available.

February 3, 2022

Windows 11 Requirements & TPM: What Are the Real Benefits?

In June of 2021, Microsoft announced the requirements for Windows 11, which has a notable security hardware requirement: PC configurations must include version 2.0 of the Trusted Platform Module (TPM) to install Windows 1. This article reviews what TPMs are, outlines the benefits and use cases, and examines the extent to which the requirement will protect devices from the most common threats.

January 31, 2022

Using Microsoft Defender for Cloud Apps to Secure Access for Remote Workers

There are many ways to provide secure access for remote users working on a home network or personal device (such as VPNs or VDI environments) and they each bring their own levels of complexity. This article explores using Microsoft Defender for Cloud Apps as a solution that is easily deployed, and capable of expanding beyond Office 365 to bring a higher level of control and governance over third-party cloud apps that lack similar native controls.

January 27, 2022