Practical Protection: Do You Need a Cybersecurity Reference Architecture?
In this Edition of Practical Protection, Paul Robichaux dives into Microsoft's Cybersecurity Reference Architecture and discusses if you really need it.
In this Edition of Practical Protection, Paul Robichaux dives into Microsoft's Cybersecurity Reference Architecture and discusses if you really need it.
With the end of the year in sight, we wanted to look back and see how Microsoft performed with security products in 2023, reviewing some of Microsoft’s biggest announcements and discussing if Microsoft's focus is leaning in the right direction.
Over time, Microsoft 365 tenants often grow and the number of devices and users increases. Instead of adding groups one by one whenever an additional user is added, dynamic groups will simplify your work. In this article, we explain some good reasons to use dynamic groups and some points to keep in mind when using them.
The Exchange Mailbox Folder Assistant (MFA) is responsible for processing retention policies against Exchange Server and Exchange Online mailboxes. In this article, we review details of how the MFA works and how administrators can gain an insight into what it does.
In this episode of the Practical 365 Podcast, Paul and Steve Dive talk about Copilot's new name, new additions to the Microsoft 365 Roadmap, and Microsoft's Luberth Morera joins us to Discuss the Retirement of Exchange Web Services (EWS).
In this Blog, Steve Goodman deep dives into how Copilot for Microsoft 365 works, exploring using Copilot with Documents, Microsoft 365 Search, Azure OpenAI, and more!
In this blog, Andy Scheider deep dives into GitHub Copilot and how it can be used to upgrade PowerShell Scripts to the Microsoft Graph PowerShell SDK.
A common question at conferences is how to start with Microsoft 365 PowerShell scripting. We all have our own approach. This article lays out a simple three-step method to write scripts to interact with Microsoft 365 objects.
The NSA and CISA released a joint bulletin titled “Top Ten Cybersecurity Misconfigurations.” In this blog, Paul Robichaux reviews a few of the most significant suggested mitigations from this bulletin.
The Invoke-HoldRemovalAction cmdlet is available in the compliance module. Its role is to remove obsolete eDiscovery holds from Exchange Online mailboxes and SharePoint Online sites. Old, lingering holds can prevent the removal of objects, so it's good to get rid of them.
In this blog, Thijs Lecomte reviews the new Web Sign-in feature for Windows 11 and its specific use cases.
On the show this week, Rich and Steve are joined by Distinguished Engineer & AI Security Evangelist, Mike Wilson to discuss Microsoft's focus on AI, AI Security, the new Microsoft Planner, and more!