Use Microsoft365DSC and Export Microsoft 365 Settings Report
Mistakes can happen, and unintended adjustments to sensitive Microsoft 365 settings may lead to disruption in tenant security. It’s challenging to recall every detail when reassessing altered...
View ArticleRecall Email in New Outlook for Swift Email Corrections
Ever hit the send button on an email only to realize it’s incomplete or missing a crucial detail? We’ve all experienced that sinking feeling. Fingers crossed, we often turned to the classic recall...
View ArticleCompare Configurations of Microsoft 365 Tenants with Microsoft365DSC
Being a Microsoft 365 admin, I’m sure you’ve noticed that one of your M365 tenants gets targeted by cyberattacks a lot – while other stays safe, right? So, you decide to identify and rectify any...
View ArticleNew Microsoft Entra License Utilization Portal Now in Public Preview
Microsoft Entra ID is a pivotal cloud-based identity and access management service delivering a seamless end-user experience and improved visibility and control. However, optimizing its licenses has...
View ArticleAudit Microsoft 365 Setting Changes with Microsoft365DSC
Admins, do you think your prime responsibility ends up with just setting up the right configurations in your Microsoft 365 tenant? It’s not; it’s an endless quest! You’ve gotta keep your eyes peeled...
View ArticleHow to Clone Microsoft 365 Service Settings Using Microsoft365DSC
Are you the one who is planning to migrate to a new Microsoft 365 tenant? If so, this question is for you! During Microsoft 365 tenant-to-tenant migration, how will you replicate the same Microsoft...
View ArticleHow to Assign Microsoft 365 License to Bulk Users Using Microsoft365DSC
Microsoft 365 licenses serve as passports, granting access to the rich suite of Microsoft 365 services and apps. Assigning a Microsoft 365 license manually for limited users is quite an easy task. But...
View ArticleControl Authentication Flows Using Conditional Access Policy
In this digital world, we can access data from anywhere using any device. Consider accessing an application from your device that asks you to enter your credentials. Some devices have complex...
View ArticleMicrosoft Teams Security Guide for Meetings and Messaging
Microsoft Teams has been blowing up since everyone started working from home! It has over 280 million monthly active users, and it’s not slowing down. It is constantly updated with: New updates New...
View ArticleTop 5 Microsoft 365 Features Every Admin Wants to Disable
Microsoft is consistently introducing exciting new features, earning praise from both admins and users. However, not every feature finds universal acclaim. In fact, some have sparked intense...
View ArticleRetirement of RBAC Application Impersonation Role in Exchange Online
Microsoft’s announcement about the retirement of the application impersonation role in Exchange Online is the response to the Midnight Blizzard attack. Initially, the attackers got in using a password...
View ArticleMinimize Insider Risks with Adaptive Protection in Microsoft Purview
According to Microsoft, 93% of organizations are concerned about insider risks, with around 25% breaches happening yearly. These figures are indeed alarming! Implementing robust data security measures...
View ArticleEnable Insider Risk in Conditional Access Policy
Traditionally, cybersecurity has focused on external threats like hackers, malware, and unseen dangers beyond digital defenses. However, internal threats can cause significant disruption to sensitive...
View ArticleHow to Use Entra Workbooks in Microsoft 365
Admins, on your checklist of must-dos, monitoring Microsoft 365 user activities, Entra ID sign-ins, and identity protection risk analysis top the charts. You might start by peeking into Microsoft 365...
View ArticleConfigure Microsoft 365 Passkeys for Secure Logins
Microsoft report reveals that 4000 password attacks are happening every second (i.e., more than 300 million per day). How terrific!? Amidst all these attacks, going passwordless becomes a stronger...
View ArticleHow to Create High Volume Email in Exchange Online
For years, organizations using Microsoft 365 have surpassed the bulk email limits by using third-party solutions or on-premises servers. The reason? Using Exchange Online to send higher volumes of...
View ArticleManage Object Deletions in Microsoft Entra
As we all know, Microsoft Entra ID empowers organizations with centralized identity and access management. However, amidst the convenience and efficiency it offers, Entra ID still carries the risk of...
View ArticleHow to Create New Workbooks in Entra ID
Workbooks in Entra ID are known for their versatile visual display of complex Entra ID sign-in and audit logs in an understandable way. So far, we have completely learned how to use Entra workbooks in...
View ArticleAuthentication Prompts Analysis Workbook in Entra ID
MFA is a must, there is no doubt about it! But what matters in MFA is its frequency. Like how everything beyond a certain limit is dangerous, over-MFA prompting can also affect users’ productivity....
View ArticleTrack User Sign-ins Using Scenario Monitoring in Entra
Microsoft Entra Health (preview) helps you monitor the Microsoft Entra tenant health efficiently. It includes a report of Service Level Agreement (SLA) attainment and the ability to review sign-in...
View Article