Search for: conditional access policies

167 Results

Microsoft Launches Security Copilot

Microsoft's announcement of Security Copilot is more interesting in some respects than Microsoft 365 Copilot because it promises to help organizations defend themselves better. Of course, we don't know much yet about how Security Copilot will work in the real world, but if Microsoft delivers what it says, Security Copilot could be quite a tool in the battle against the bad guys.

Continue Reading Microsoft Launches Security Copilot

Practical Protection: Dr. Jekyll and Mrs. Hybrid

Hybrid work is really a mixed blessing—while it offers a lot of fantastic benefits for people who are able to take advantage of it, it can introduce some new and unpleasant security issues that you need to be prepared to deal with. This article dives into these new risks and how you can avoid them.

Continue Reading Practical Protection: Dr. Jekyll and Mrs. Hybrid

What Now for Exchange 2013 Customers as End of Support Deadline Looms?

Exchange 2013 support ends on April 11, 2023. After that, Microsoft will not make fixes for security or functionality problems available to customers. It's time to make the decision to upgrade to Exchange 2019 or move to Exchange Online. Most organizations will find that Exchange Online is the right choice. Exchange 2019 is appropriate for organizations that have the right skills, experience, and investment to run a secure Exchange service.

Continue Reading What Now for Exchange 2013 Customers as End of Support Deadline Looms?

All About Microsoft Purview Sensitivity Labels (2023)

Microsoft has broadened and deepened the functionality available through sensitivity labels since their introduction in 2018. This article explains the basics of sensitivity labels and highlights some of the areas where important changes have occurred.

Continue Reading All About Microsoft Purview Sensitivity Labels (2023)

Top Ten PowerShell Tips for Microsoft 365 Management: Part Two

If you are stuck using your on-premises resources to manage a cloud infrastructure, it is an opportune time to change that with the availability of tools and functions that are now available. In this article, we focus on how to use PowerShell to manage Microsoft 365. In addition, we consider how to use cloud services to manage PowerShell code, testing, security controls, and more. 

Continue Reading Top Ten PowerShell Tips for Microsoft 365 Management: Part Two

Detecting and Protecting Entra ID from Password Spray Attacks

With the move to the cloud, many organizations synchronize identities to Azure Active Directory. This makes an attacker’s job easier as they have a single point where they can attempt to compromise accounts. In this article, Thijs Lecomte walks through the protection and detection mechanisms available to repel password spray attacks.

Continue Reading Detecting and Protecting Entra ID from Password Spray Attacks