Tenant Consolidation and Turning Off the Lights
In this blog, we review the steps needed to migrate and properly decommission your old tenant during an M&A Consolidation.
In this blog, we review the steps needed to migrate and properly decommission your old tenant during an M&A Consolidation.
Microsoft has a new approach to control private team discoverability. You can have all-in access by enabling discoverability through Teams policies or granular access by using sensitivity labels to control if private teams are discoverable or not. This article explains how both methods work.
In this episode of the Practical 365 Podcast, Steve and Rich are joined by Becky Cross to discuss Hybrid Identity Migration, new Exchange On-Premises cumulative updates, Azure OpenAI features, and more!
In this blog, we review a new organized phishing campaign impacting Azure Cloud environments and discuss what to do if your organization happens to fall victim.
This article examines how Copilot for Microsoft 365 handles protected content, including how it interacts with Microsoft Purview sensitivity labels. Hopefully, this information will help administrators to configure information protection controls and understand their impact in relation to Copilot for Microsoft 365.
Anecdotal evidence is that some spam originates from onmicrosoft.com domains. These are the domains used by Microsoft 365 tenants and the spam indicates that attackers sign up for 'disposable' tenants to send their malware. This article describes what onmicrosoft.com domains are and how to use a mail flow rule to control their traffic.
Microsoft released cumulative update 14 for Exchange Server 2019 on February 13, 2024. This update fixes several bugs, but more importantly, contains a fix for a serious security issue that is being exploited in the wild. This is your sign to enable Extended Protection, if you haven't already.
In this blog, Jon Jarvis reviews the importance of integrating devices with Intune, and the risks that can arise from poorly managed devices.
If you’re interested in protecting your SharePoint Online, OneDrive for Business, or Exchange Online data, it is useful to understand how Microsoft 365 Backup works and what the software can and cannot do. In this article, Paul Robichaux walks through how to set up and test the preview version of Microsoft 365 Backup.
In a February 12, 2024 tweet, Microsoft revealed that the percentage of Entra ID multifactor authentication by user accounts has reached 38%. In this article, we show how to use sign-in records to figure out if people use MFA and calculate the percentage of user accounts protected by MFA in a tenant.
User consent is a great example of the tension between improved security and user convenience. Users want to be able to consent to applications without requiring the help of IT, which also allows the potential for a breach. In this blog, Paul reviews your options to solving the user consent problem.
This blog reviews the Midnight Blizzard Attack, providing some hypothetical scenarios of what actually happened and how it could've been prevented.