Analyzing Your Office 365 Data for Potential Vulnerabilities

Level: 400

Learning Credits: 1

Analyzing Your Office 365 Data for Potential Vulnerabilities


This session is a deep dive into the tools and monitoring capabilities that are available out of the box for Microsoft 365. This session can be used to show what works inside the default tool and also the limitations of the tools that are provided.

Key Takeaways:

  1. You will learn how to identify sensitive content.
  2. You will learn the technologies available to block sensitive content.
  3. You will learn the inbuilt tools available for protection and monitoring.
  4. Review the importance of assemments.

The speaker of this session is Liam Cleary who has been a Microsoft MVP for more than a decade and also the CEO of SharePlicity.

Sponsored Content

Read the Best Personal and Business Tech without Ads

Staying updated on what is happening in the technology sector is important to your career and your personal life but ads can make reading news, distracting. With Thurrott Premium, you can enjoy the best coverage in tech without the annoying ads.

Liam has worked within core infrastructure and security services, working with some of the largest companies in the world. He has worked with all organization types such as non-profit, association, financial, education, commercial, security, military, government, public sector, and even gets time to do chores at home.

Liam, is also a Microsoft Certified Trainer, with a core focus on delivering Microsoft 365 and Azure training.

If you want to connect with Liam, you can find him on Twitter and on LinkedIn.

Sponsored by  {}

Download this eBook!

External Sharing and Guest User Access in Microsoft 365 and Teams

his eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure. The eBook will also outline some of the major decision points across four general-purpose guest access policy scenarios for how an organization can set this up with standard licensing.

Download Now

Sponsored By