Practical Protection: Sign-In Marking
Microsoft reported yet another nation-state attack, code-named Peach Sandstorm. In this blog, we discuss the threat actor and provide steps to defend against similar attacks.
Microsoft reported yet another nation-state attack, code-named Peach Sandstorm. In this blog, we discuss the threat actor and provide steps to defend against similar attacks.
Terminating employees is never fun, but it does happen. And when it happens, you need to know the necessary steps for removing their access. This blog serves as a checklist for removing employees with Microsoft 365 Accounts,
Microsoft Teams SIP gateway is an option to connect native SIP devices to the Microsoft Teams platform. In this blog, we review the SIP gateway and discuss some usage scenarios.
Microsoft already announced two sets of pre-release changes to Microsoft Recall that address some of its security issues. And there will undoubtedly be more. In this blog, we review your options to protect your organization against Microsoft Recall.
In this episode of Practical Sentinel, Thijs Lecomte discusses how to create some basic KQL queries to track MFA usage.
Microsoft recently released a memo from Security VP, Charlie Bell. In this blog, we recap the memo and discuss some of the new security initiatives Microsoft is working towards.
In this blog, Brandon Colley reviews how to use PIM approvals to create a workflow that could stop attackers in their tracks, even if they have already compromised credentials.
Microsoft has been forced to introduce restricted SharePoint search to allow customers to deploy Copilot for Microsoft 365 projects without worrying that Copilot will find and reuse information from across the entire tenant. It's a sad legacy of previous Microsoft collaboration strategies, notably the decision to allow users to create groups without hindrance.