Compliance

1725491972 Security Hero

5 Steps to Secure Active Directory

In this guide about Active Directory (AD) security, we’re going to detail five steps that IT admins need to follow to secure Active Directory environments in an organization. There are many best practices you’ll need to be familiar with to ensure Active Directory security, including restricting the use of privileged accounts, monitoring Windows Event Log...

Last Update: Jan 14, 2025

LATEST

Cloud Computing and Security

Microsoft Introduces Trusted Signing Solution: Simplifying App Development for Developers

Microsoft has recently announced the public preview of its new Trusted Signing solution. This fully managed end-to-end signing service is designed to streamline processes, allowing developers to effortlessly build and distribute apps. “The service supports both public and private trust signing scenarios and includes a timestamping service. With Trusted Signing, users enjoy a productive, performant,…

View Article
Microsoft 365 Apps

Why You Should Restrict Access to Office 365 Using Microsoft Conditional Access Policies

Last Update: Jan 04, 2023

Organizations adopting Microsoft’s cloud services need to keep their employees safe, especially when employees need to access these cloud services while being outside of the organization’s network. In this guide, we’ll explain how organizations can set up Conditional Access policies to restrict how their users can access Office 365 and other Microsoft services. What are…

View Article
Microsoft 365 Apps

How Does eDiscovery Work Within Microsoft 365?

Content sprawl causes IT and security administrators many problems and complicates the management and control of information. However, Microsoft 365 provides tools to prevent content sprawl from happening. These tools are part of the Microsoft Purview eDiscovery services. In this article, we’ll explain how eDiscovery works within Microsoft 365. When working with Microsoft 365, content sprawl…

View Article
Cloud Computing and Security

Microsoft Entra Workload Identities Service is Now Generally Available

Microsoft has announced the general availability of its Entra Workload Identities service. The new solution is designed to manage identity and access for software workloads and Certificate-based Authentication. A workload identity is an identity that allows an application or service principles to access other services and resources. However, it’s a bit challenging to secure workload…

View Article
Security

Understanding Microsoft Defender and its Many Layers

Last Update: Jul 01, 2022

Microsoft Defender has many layers and trying to understand all of the different components can be complex.

View Article
Microsoft 365 Apps

Reduce Data Theft with Microsoft Purview Insider Risk Management

Last Update: Jun 13, 2022

Through Microsoft Purview Insider risk management in Microsoft 365, organizations can identify and mitigate insider risks quickly and effectively. Before you can manage and minimize risks in your organization, though, it is critical to understand the different types of internal risks you may encounter. This article will explore how Microsoft Purview Insider Risk Management can…

View Article
Network Security

Microsoft Defender for Office 365 to Get Preset Security Policy Improvements In June

Microsoft has announced some improvements coming to the preset security policies in Defender for Office 365 solution this summer. These policy changes should help IT admins use Microsoft’s recommended settings. According to Microsoft, the preset security policies enable organizations to apply all recommended settings to Office 365 users. The list includes Strict protection, Standard protection,…

View Article
Datacenter networking servers

Microsoft Renames Data Governance and Compliance Products to “Microsoft Purview”

Last Update: Nov 19, 2024

Microsoft announced a significant revamp of its Azure Purview data-governance platform. The Redmond giant is rebranding the service as “Microsoft Purview” and also rolling out new Microsoft 365 compliance capabilities to the suite. The new Microsoft Purview suite provides customers with compliance tools that allow them to view all their data assets in one place….

View Article
Microsoft 365 Hero 1 1280x720 1

The Ultimate Guide to Microsoft Teams eDiscovery

Last Update: Sep 04, 2024

Amid this ongoing pandemic, many organizations across the world have required their employees to work from home using apps like Microsoft Teams, which generates more content than ever in Office 365. Microsoft Teams stores data in various places, making it more difficult for administrators to perform complete eDiscovery. In this article, we will explore what different…

View Article

Microsoft Office Mobile Apps Now Support Co-Authoring Encrypted Documents

Last Update: Nov 19, 2024

Microsoft has announced that its Office mobile apps now support co-authoring documents encrypted with sensitivity labels. This capability has been available on the Office desktop and web clients for a while now, and it’s finally making its way to the iOS and Android versions of the app. With the new co-authoring feature, the Microsoft Office…

View Article

How to Use Adaptive Scopes for Retention Within Microsoft 365

Last Update: Sep 04, 2024

In this guide, we’re going to explain how IT admins can use adaptive scopes to make retention policies for Microsoft 365 more dynamic. Microsoft 365 provides retention capabilities to manage the data for your organization out of the box. These features allow you as an organization to control how long content is retained and then…

View Article
Go to page