Practical Protection: Incident Response
Incident Response is all about people, process, and technique. In this episode of Practical Protection, we review different issues that can arise during incident response.
Incident Response is all about people, process, and technique. In this episode of Practical Protection, we review different issues that can arise during incident response.
Don't miss your chance to meet and learn from your favorite Practical 365 Authors at TEC 2024. As a proud sponsor of TEC, we are offering BOGO discounts on exclusive pre-con workshops with authors Michel De Rooij, Jaap Wesselius, and more!
Microsoft recently released a memo from Security VP, Charlie Bell. In this blog, we recap the memo and discuss some of the new security initiatives Microsoft is working towards.
In this blog, Thijs Lecomte reviews Exclusion for Microsoft Security Solutions, why they are important, and how to manage them.
In this blog, we review the steps needed to migrate and properly decommission your old tenant during an M&A Consolidation.
Microsoft 365 Tenant-to-Tenant Migrations are more than just a data transfer! In this blog, Karin Skapski explores practical steps and scripts to establish cohesive visual branding in a Microsoft 365 tenant, ensuring a seamless transition for both your team and data.
In this Blog, Steve Goodman deep dives into how Copilot for Microsoft 365 works, exploring using Copilot with Documents, Microsoft 365 Search, Azure OpenAI, and more!
The Storm-0558 incident serves as a stark reminder of the potential threats that organizations face in today's digital landscape. In this blog, Rich Dean recaps the insider conversation around Storm-0558 that the Practical 365 Podcast team had with Alex Weinert, Microsoft's VP for Identity Security.
In this blog, Steve Goodman gives his first impressions of Microsoft 365 Copilot based on what was shown at Microsoft's Envision Conference in London.
Security is not a one-time thing. We must improve configurations as products evolve and new situations arise. In this blog, James Yip dives into his top five security topics for Microsoft 365 Projects.
Most think that the safe senders list does not override the anti-spam policies configured in Exchange Online, but the opposite is true. In this blog, we discuss how this happens and how to fix it with PowerShell.
While most organizations operate a single Microsoft 365 tenant, there are cases where multiple tenants need to work very closely together. In this article, Sean McAvinue explains five ways to make the cross-tenant collaboration experience easier for end users and when to use each.