Search for: conditional access policies

167 Results

Storm-0558: Understanding How Microsoft Failed to Protect Itself

Storm-0558 is a China-originated attack against sensitive Exchange Online mailboxes. The attack exposed several flaws in Microsoft's processing of data. Microsoft says that the holes are now closed, but it's still a good idea to check that your tenant is not being attacked in the same way.

Continue Reading Storm-0558: Understanding How Microsoft Failed to Protect Itself

How Microsoft is Using Copilot to Drive Customers to Microsoft 365

Microsoft 365 Copilot is only available for 4 Microsoft 365 SKUs. There's no technical reason why this is so. Instead, Microsoft is using Copilot as a selling point to convince customers to upgrade to Microsoft 365 E5 (preferably). All's fair in love and business, and this is just an example of product management for maximized profit.

Continue Reading How Microsoft is Using Copilot to Drive Customers to Microsoft 365

GPT in Power Platform & Teams, New Azure AD features to secure & collaborate, plus we’re joined by Mary Jo Foley: The Practical 365 Podcast S3 E29

On this week’s show, Paul and I are joined by industry veteran Mary Jo Foley, to talk about her keynote session at this year’s TEC conference this coming September – learn her view on how your priorities and Microsoft’s intersect and what value Microsoft 365 needs to deliver. Plus we’re talking new Power Platform and Teams AI-driven features plus there’s a plethora of new Azure AD & Entra features that help secure your environment and make it easier for complex organizations to work seamlessly together.

Continue Reading GPT in Power Platform & Teams, New Azure AD features to secure & collaborate, plus we’re joined by Mary Jo Foley: The Practical 365 Podcast S3 E29

TEC European Roadshow 2023 – London, Paris, and Frankfurt: Identity and Microsoft 365 Security Tips

At the end of March, Practical 365 traveled with the TEC European roadshow, traveling between three cities in Europe over a week, listening to experts talking primarily about security-focused topics aimed at improving your Microsoft 365, Azure AD and Active Directory. Read our whistle-stop tour of the most important points made by expert speakers.

Continue Reading TEC European Roadshow 2023 – London, Paris, and Frankfurt: Identity and Microsoft 365 Security Tips

Stop Using Phone-Based Responses for Multifactor Authentication

While some methods for MFA responses have security issues, people often overlook their practical advantages. Not everyone is ready to dump a valid authentication method. In this article, we take the journey to removing phone-based responses from your tenant while considering some practical implications.

Continue Reading Stop Using Phone-Based Responses for Multifactor Authentication

Practical Protection: Limiting the Damage from Local Admin Accounts

Because of the way the Windows security model works, it’s not currently possible to eliminate the use of passwords for local administrator accounts. Given that fact, the next best solution is to remediate the biggest problems with passwords for these local accounts, including weakness, reuse, and tenure. In this article, we discuss how the Local Administrator Password Solution (LAPS) helps with all of those!

Continue Reading Practical Protection: Limiting the Damage from Local Admin Accounts

Using Microsoft 365 Auditing and Alerts to Monitor Email Forwarding

Microsoft 365 auditing makes lots of data available to administrators to help them understand what happens in a tenant. When attackers try to compromise accounts, they can leave fingerprints behind in audit data. Being aware of what you might find in the data helps suppress BEC attacks.

Continue Reading Using Microsoft 365 Auditing and Alerts to Monitor Email Forwarding