In this guide about Active Directory (AD) security, we’re going to detail five steps that IT admins need to follow to secure Active Directory environments in an organization. There are many best practices you’ll need to be familiar with to ensure Active Directory security, including restricting the use of privileged accounts, monitoring Windows Event Log...
Last Update: Jan 14, 2025
Microsoft has recently announced the public preview of its new Trusted Signing solution. This fully managed end-to-end signing service is designed to streamline processes, allowing developers to effortlessly build and distribute apps. “The service supports both public and private trust signing scenarios and includes a timestamping service. With Trusted Signing, users enjoy a productive, performant,…
Last Update: Jan 04, 2023
Organizations adopting Microsoft’s cloud services need to keep their employees safe, especially when employees need to access these cloud services while being outside of the organization’s network. In this guide, we’ll explain how organizations can set up Conditional Access policies to restrict how their users can access Office 365 and other Microsoft services. What are…
Content sprawl causes IT and security administrators many problems and complicates the management and control of information. However, Microsoft 365 provides tools to prevent content sprawl from happening. These tools are part of the Microsoft Purview eDiscovery services. In this article, we’ll explain how eDiscovery works within Microsoft 365. When working with Microsoft 365, content sprawl…
Microsoft has announced the general availability of its Entra Workload Identities service. The new solution is designed to manage identity and access for software workloads and Certificate-based Authentication. A workload identity is an identity that allows an application or service principles to access other services and resources. However, it’s a bit challenging to secure workload…
Last Update: Jul 01, 2022
Microsoft Defender has many layers and trying to understand all of the different components can be complex.
Last Update: Jun 13, 2022
Through Microsoft Purview Insider risk management in Microsoft 365, organizations can identify and mitigate insider risks quickly and effectively. Before you can manage and minimize risks in your organization, though, it is critical to understand the different types of internal risks you may encounter. This article will explore how Microsoft Purview Insider Risk Management can…
Microsoft has announced some improvements coming to the preset security policies in Defender for Office 365 solution this summer. These policy changes should help IT admins use Microsoft’s recommended settings. According to Microsoft, the preset security policies enable organizations to apply all recommended settings to Office 365 users. The list includes Strict protection, Standard protection,…
Last Update: Nov 19, 2024
Microsoft announced a significant revamp of its Azure Purview data-governance platform. The Redmond giant is rebranding the service as “Microsoft Purview” and also rolling out new Microsoft 365 compliance capabilities to the suite. The new Microsoft Purview suite provides customers with compliance tools that allow them to view all their data assets in one place….
Last Update: Sep 04, 2024
Amid this ongoing pandemic, many organizations across the world have required their employees to work from home using apps like Microsoft Teams, which generates more content than ever in Office 365. Microsoft Teams stores data in various places, making it more difficult for administrators to perform complete eDiscovery. In this article, we will explore what different…
Last Update: Nov 19, 2024
Microsoft has announced that its Office mobile apps now support co-authoring documents encrypted with sensitivity labels. This capability has been available on the Office desktop and web clients for a while now, and it’s finally making its way to the iOS and Android versions of the app. With the new co-authoring feature, the Microsoft Office…
Last Update: Sep 04, 2024
In this guide, we’re going to explain how IT admins can use adaptive scopes to make retention policies for Microsoft 365 more dynamic. Microsoft 365 provides retention capabilities to manage the data for your organization out of the box. These features allow you as an organization to control how long content is retained and then…