Using Device Control in Defender for Endpoint to Block USB Drives
Copying data from Windows endpoints to USB storage devices is one of the largest sources of data leakage. In this article, we discuss two simple solutions to avoid this problem.
Copying data from Windows endpoints to USB storage devices is one of the largest sources of data leakage. In this article, we discuss two simple solutions to avoid this problem.
In this episode of the Practical 365 Podcast, we are joined by TEC Speaker, Shinesa Cambric, to explore the parallels between AI adoption and the cloud revolution, get into the changing nature of identity in our digital world, and get a sneak peak into Shinesa's Keynote session.
In the first episode of Practical Teams Phone, Thorsten Pickhan reviews Teams Shared Calling, how it works, and some practical use cases.
Microsoft's big launch of Copilot Wave 2 featured many new capabilities, like a super-duper focused Inbox for Outlook (one that works this time), Python in Excel, and a profusion of agents for SharePoint Online. The idea behind agents is pretty good and should be valuable, even if IT might have some dark thoughts about how agents might allow people to access information that they shouldn't (this won't happen).
Microsoft reported yet another nation-state attack, code-named Peach Sandstorm. In this blog, we discuss the threat actor and provide steps to defend against similar attacks.
Three years ago, we described how to create organizational contacts in user mailboxes with Graph API requests. In this iteration, we read the contacts from a Microsoft list and use Microsoft Graph PowerShell SDK cmdlets to update user mailboxes. The techniques explained in the article can be used in many scenarios.
Microsoft recently stopped supporting Microsoft Entra Connect and introduced its successor, Microsoft Entra Cloud Sync. This blog reviews how to set up and configure Microsoft Entra Cloud Sync, with helpful tips along the way.
Microsoft plans a transition of the current Exchange Server licensing and support model to Exchange Server subscription edition (SE) starting in 2025. Organizations must prepare for the transition by upgrading servers to the latest cumulative updates of Exchange 2016 and Exchange 2019. The transition is unlikely to be seamless, but glitches can be avoided by good planning and careful monitoring of community discussions.
Microsoft Lists are a powerful tool for end users to store and manage data stored in SharePoint Online sites. The Microsoft Graph PowerShell SDK includes cmdlets to work with Microsoft Lists and this article explains how to use the cmdlets to add new lists, add items to lists, retrieve data from lists, and remove items from lists.
On this episode of Practical Protection, we are joined by Paul Thurrott to discuss AI and Microsoft, plus give a sneak peek into his session at TEC 2024.
In this blog, Thijs Lecomte dives into how to protect you public-facing infrastructure with Microsoft Defender's External Attack Surface Management tool.
Terminating employees is never fun, but it does happen. And when it happens, you need to know the necessary steps for removing their access. This blog serves as a checklist for removing employees with Microsoft 365 Accounts,