Email Phishing Protection Guide – Part 18: Increase Security with Microsoft Secure Score

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture against phishing email attacks designed…


Email Phishing Protection Guide – Part 17: Control Application Consent Registrations in Microsoft Office 365 and Azure

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture against phishing email attacks designed…


Email Phishing Protection Guide – Part 16: Disable Office 365 Legacy Email Authentication Protocols

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture against phishing email attacks designed…


SPO Tidbit – Securing the Site Collection

Hello All, I will assume that you have set the permissions on your Site Collections correctly, but if that still leaves the security team uncomfortable we can always look to perform several other steps using Conditional Access and SharePoint admin. The Microsoft team approaches this by classifying 3 types of sites Baseline, Sensitive, and Highly…


Learn how to provide vital security service to your customers

Uncover the resources needed to assist your customers with threat, identity and information protection by exploring the offerings within Microsoft 365. This technical webinar is carefully planned and delivered by Microsoft Partner Technical Consultants, available to you as a Partner Network member at no cost. Introduction to Microsoft 365 Security and Compliance – Explore the…


Office 365 Weekly Digest | November 11 – 17, 2018

Welcome to the November 11 -17, 2018 edition of the Office 365 Weekly Digest. There were six additions to the Office 365 Roadmap last week, including a new simplified sync technology for Outlook on Android and iOS, and the ability to create an org-wide team (up to 2,500 users) in Microsoft Teams. There is one…


Keep your privileged access secure with Azure AD PIM and PAM in Office 365: Part 1

Edward Walton, Cloud Solution Architect In this month’s community call, we’ll be covering “just-in-time” identity management and administration in Microsoft Azure Active Directory (AD) Privileged Identity Management (PIM) and Privileged Access Management (PAM) for Office 365. We’ll show how it can help partners and their customers prevent account and access breaches associated with Global Administrators…


November 2018 Office Update Release

The November 2018 Public Update releases for Office are now available! This month, there are 29 security updates and 16 non-security updates. All of the security and non-security updates are listed in KB article 4469617. A new version of Office 2013 Click-To-Run is available: 15.0.5085.1000 A new version of Office 2010 Click-To-Run is available: 14.0.7224.5000


Microsoft Ignite | The Tour: Die Agenda aus IT-Pro-Sicht

Ob IT-Sicherheit, hybride IT-Umgebungen, High Performance Computing, Microsoft 365 oder aktuelle und kommende Technologien wie Windows Server 2019, Exchange Server 2019 oder SQL Server 2019 – derzeit eröffnen sich viele interessante Möglichkeiten für Infrastrukturexperten, IT-Professionals und Administratoren. Einen umfassenden Rundumblick dazu, Fachwissen aus erster Hand und einen interessanten Ausblick in die nahe Zukunft, bietet die folgende…


Holistic Approach to Enhance your Security Posture

This month the ISSA Journal released my article, which is called Holistic Approach to Enhance your Security Posture. In this article I cover some important capabilities that must be in place to enhance the overall security posture of your organization. This is a vendor neutral approach, that will give you the general considerations and rationale behind…