Skip to content

Category: Microsoft 365

Accessing Threat Intelligence Data from Defender for XDR Portal: A Comprehensive Guide

Accessing Threat Intelligence Data from Defender for XDR Portal: A Comprehensive Guide Navigating the complexities of cybersecurity requires a strategic approach, and key to that strategy is leveraging the right tools and data. Microsoft’s Defender for XDR stands out as a comprehensive solution, offering not just a defense mechanism but also a wealth of threat…

Leave a Comment

Elevating Security Posture with Microsoft Defender for Threat Intelligence

Organizations are on a constant quest for advanced solutions to enhance their security posture in the face of an ever-changing threat environment. Microsoft Defender for Threat Intelligence stands out as a critical tool in this endeavor, providing a robust array of capabilities for proactive threat identification, assessment, and neutralization. This suite leverages the latest in…

Comments closed

Step-by-Step Guide: Enforcing Password History in Intune

Step-by-Step Guide: Enforcing Password History in Intune Keeping your organization’s data secure is paramount in today’s digital age. One key aspect of this is ensuring that passwords are not reused too quickly, which can be a significant vulnerability. In this guide, we’ll walk you through the steps to enforce a password history of 24 or…

Leave a Comment

SharePoint: Microsoft 365 Archive for Sites – Revolutionizing Data Management

SharePoint: Microsoft 365 Archive for Sites – Revolutionizing Data Management In the digital era, where data grows exponentially, organizations face the challenge of managing inactive data without incurring prohibitive costs or compromising on compliance and security. Microsoft’s innovative solution, Microsoft 365 Archive, now in preview, offers a paradigm shift in managing SharePoint Online sites, aligning…

Leave a Comment

How to Deploy a PowerShell Script via Intune to Remove AnyDesk from Devices

How to Deploy a PowerShell Script via Intune to Remove AnyDesk from Devices In light of recent security concerns, it’s become increasingly important for IT administrators to be able to quickly respond and mitigate potential threats. One such measure could involve the removal of potentially compromised software, like AnyDesk, from all managed devices. This blog…

Leave a Comment

Ensuring Organizational Security through Proactive KQL Monitoring of Remote Access Tools

Ensuring Organizational Security through Proactive KQL Monitoring of Remote Access Tools In light of recent cybersecurity incidents, including a notable attack on the AnyDesk platform, organizations worldwide are re-evaluating their security posture with an increased focus on the tools and software installed on their endpoint devices. Remote access tools like AnyDesk and TeamViewer, while invaluable…

Comments closed

Identifying Public vs. Private Microsoft 365 Groups

Introduction In the realm of enterprise security, understanding the visibility and access controls of your organization’s resources is paramount. This is especially true for Microsoft 365 Groups, which play a crucial role in collaboration across various Microsoft services. In this post, we’ll explore a PowerShell script I’ve developed to distinguish between public and private Microsoft…

Leave a Comment

How to Enable Microsoft 365 Backup Using the Admin Portal

How to Enable Microsoft 365 Backup Using the Admin Portal Introduction: Microsoft 365 offers a suite of powerful productivity tools, but data loss can still happen. To ensure the safety of your critical business data, it’s essential to set up regular backups. In this blog post, we will walk you through the process of enabling…

Leave a Comment

Empowering Your Workforce: The Critical Role of Upskilling in Cybersecurity

Introduction In the ever-evolving landscape of cybersecurity, one of the most effective shields against cyber threats is an informed and vigilant workforce. As cyber threats become increasingly sophisticated, the importance of upskilling internal staff cannot be overstated. Microsoft 365, with its array of built-in capabilities, offers a robust platform for enhancing cybersecurity awareness and skills…

Leave a Comment

Move Known Folders to OneDrive and Silently sign-in users to OneDrive with Windows Credentials using Intune.

Move Known Folders to OneDrive and Silently sign-in users to OneDrive with Windows Credentials using Intune. In this post, we will look at creating an Intune Device Configuration policy to do the following: Silently Sign-in to OneDrive using Windows Credentials Move Known Folders to OneDrive This post comes at the back of a request from…

Leave a Comment

Prevent Microsoft Teams Meeting recording from expiring.

Prevent Microsoft Teams Meeting recording from expiring. Recently Microsoft introduced a new feature which will expire Microsoft Teams Meeting recordings. All new recordings will auto expire in 60 days after the recorded and no action was taken. Admins in the organization will have to update these policies if they want retain recordings for longer of…

Leave a Comment

Microsoft Compliance Configuration Analyzer

Microsoft Compliance Configuration Analyzer In this short post, we will look at MCCA (Microsoft Compliance Configuration Analyzer). MCCA is a PowerShell-based tool that exports your current Microsoft 365Complaince configuration and validates them against Microsoft 365’s recommended best practices. Some of the controls which forms part of the best practices include regulations and standards for data…

Leave a Comment