Microsoft 365

LATEST

Using Microsoft 365 Defender Threat Analytics to Improve Security

In this article, I’m going to describe how to use Microsoft 365 Defender Threat Analytics to improve security in your organization. Over three Petri articles, we’ve dived into what Microsoft Defender for Endpoint (MDE) is, how you can migrate to it, and how it should be configured. Part 1: Understanding Microsoft Defender for Endpoint and…

View Article

How to Validate Applications Using Test Base for Microsoft 365

Test Base for Microsoft 365 is a platform which allows you to script and automate your application compatibility testing. Hosted in Azure, and based on Azure virtual machines, this service allows the easy onboarding of applications through a dedicated area of the Azure portal. To validate apps in Test Base, you should: Sign up for…

View Article

Microsoft Defender for Endpoint – Important Service and Endpoint Settings You Should Configure Right Now

Microsoft Defender for Endpoint (MDE) is much more than a traditional antivirus service. Now being offered in Plan 1 and Plan 2, the full offering you get with Plan 2 not only provides antivirus capabilities but also extended detection and response, attack surface reduction rules to harden the OS against common threat mechanisms, and threat…

View Article

Smooth Scrolling Comes to Excel for Windows

Have you ever been scrolling through a large Microsoft Excel spreadsheet and stopped because you came across some cells with important data and it whips right past you? Well, Microsoft Excel engineers have been working to enhance this aspect of Excel for a long time. When they set out to ‘put the idea to code’…

View Article

Microsoft Teams Desktop Client Gets Quoted Reply Feature for Chat

The Microsoft Teams desktop client is getting a long-awaited feature update that lets you send quoted replies to messages in chat. And it is rolling out now. It might sound like a first world problem, but when chats get long, it can be difficult to keep track of conversations without the ability to quote messages…

View Article

External Sharing and Guest User Access in Microsoft 365 and Teams

Sharing content with users external to your organization and managing guest user access in Microsoft 365 and Microsoft Teams can be confusing to understand and difficult to manage. If you would like to know more about this important aspect of cloud security, download this free eBook. AvePoint dives into policy considerations you need to make…

View Article

The New Microsoft Whiteboard App is Here

Yes, it’s new! And there are a LOT of new features in the new Microsoft Whiteboard app, which reached general availability at the end of September. For starters, Microsoft is rolling the new Whiteboard interface experience out to the web, Teams, and Android platforms. The last 18 months have seen the evolution of hybrid work…

View Article

Microsoft Announces New Collaborative Features for Teams Phone

Microsoft announced earlier this week several new features to Teams Phone to update the platform for modern cloud calling and to integrate calling better into people’s workflow. As many companies shift to hybrid work and more use collaboration solutions like Microsoft Teams, there has been a significant increase in phone use. To address this challenge,…

View Article

How to Customize Endpoint Security Settings in Microsoft Intune

In this article, I’m going to show you how to customize endpoint security settings in Microsoft Intune. Including how to change security baseline settings, how to make sure devices are running a specific operating system version (or later), and how to configure Windows and iOS disk encryption settings. Microsoft provides a series of recommended security…

View Article

Microsoft Viva Connections – Coming to Public Preview

Because of the ever-evolving shift of the workforce and the workplace from ‘in-house’ to hybridization, hybrid work is reshaping how we work. The shift to more remote work has been disrupting, to say the least, across a multitude of organizations and industries. The least of which is the pillar of Information Technology in all companies….

View Article
Go to page