In this easy Ask an Admin, learn to create fine-grained password policies using PowerShell in Windows Server 2012.
We all know that Windows Active Directory (AD) Group Policy is very powerful. It can apply policies on the PCs in your Windows AD domain. However, the list of policies is limited as are the scheduling and reporting of those policies. While you might be able to run a Powershell script or VB script on…
Office 365 makes it easy to collaborate with external users through Office 365 Groups and Teams, both of which use Azure B2B Collaboration. In fact, collaboration is so easy that users might be carried away and share with all and sundry, including your competitors. Which is why it’s nice to have a policy to control sharing with certain domains that works for applications like Groups, Teams, and Planner.
In this guide, we’re going to explain how IT admins can use adaptive scopes to make retention policies for Microsoft 365 more dynamic. Microsoft 365 provides retention capabilities to manage the data for your organization out of the box. These features allow you as an organization to control how long content is retained and then…
Last Update: Feb 01, 2024
For any modern enterprise that uses Azure Active Directory (now Microsoft Entra ID) to manage user and service access to cloud resources, it’s hard to escape the term Zero Trust (ZT), which implies that your organization must have a layered approach to security. In this article, you’ll learn about five Microsoft Zero Trust tactics for…
To make things easier for Office 365 tenant administrators, Microsoft has released four new administrative role for Teams. You can now assign these roles to other people and have them take care of areas like Teams general admin or the more complicated area of voice and audio meetings and calling. It’s a sign of increased maturity in the Teams product.
Security is an ever increasing concern in almost every area of society today and computers are no exception. A detailed computer security plan should not only include policies and procedures to ensure that proper access rights are configured for all users, it must also include methods for verifying that these rights are effectively deployed throughout…
Microsoft has updated Yammer so that new groups use the Office 365 Groups service to manage the identity and membership of the groups. There are far too many “groups” in that last sentence, which kind of illustrates how a surplus of groups might be building up within Office 365.
Microsoft Defender for Endpoint (MDE) is much more than a traditional antivirus service. Now being offered in Plan 1 and Plan 2, the full offering you get with Plan 2 not only provides antivirus capabilities but also extended detection and response, attack surface reduction rules to harden the OS against common threat mechanisms, and threat…
Service accounts configured for unconstrained delegation make it easy to compromise servers and Active Directory.