TEC Tips: Email Protection Basics
Email is a primary target for breaches, making it crucial to have a strong line of defense for your email security. In this blog, we go over some Email Protection basics to help keep your organization safe.
Email is a primary target for breaches, making it crucial to have a strong line of defense for your email security. In this blog, we go over some Email Protection basics to help keep your organization safe.
A new sensitivity label setting blocks access to content services for Office applications. In effect, this stops any feature that depends on the ability to send content to Microsoft for processing, including Copilot for Microsoft 365, DLP, text prediction, and so on. It's a precise item-level block that protects sensitive documents from being consumed and used by Copilot in the text that it generates.
Defender for Endpoint gathers system information to support operation and detection needs. We can then leverage that data to build a custom report to show the deployment status. This blog walks through that process using KQL.
Microsoft already announced two sets of pre-release changes to Microsoft Recall that address some of its security issues. And there will undoubtedly be more. In this blog, we review your options to protect your organization against Microsoft Recall.
In this article, Paul Robichaux walks through the process of setting up the new Entra ID Enterprise SSO Plug-in on macOS.
In this Episode of Practical Protection, we talk about BitLocker's new self-service recovery key access feature.
Microsoft recently released a memo from Security VP, Charlie Bell. In this blog, we recap the memo and discuss some of the new security initiatives Microsoft is working towards.
This Episode of Practical Protection is all about Passkeys, how they are different from other credential types, and how they could put an end to phishing.
In this edition of Practical Protection, Paul Robichaux dives into 5 steps you can take to protect yourself, and potentially your organization, from future breaches.
Microsoft recently released a revamped version of LAPS that can store the local admin password in Entra ID to work with cloud-managed endpoints. In this blog, we dive into deploying LAPS and how to use it to further enhance the security of Windows endpoints.
Microsoft introduces Microsoft Security Exposure Management (MSEM)! In this blog, Paul discusses MSEM and offers some advice for things you can do before the tool is pushed to GA.
In this blog, Thijs Lecomte reviews Exclusion for Microsoft Security Solutions, why they are important, and how to manage them.