Office of Enterprise Productivity & Security, South Central Region

Insights from the frontlines of real-world digital transformation

Stop Phishing Attacks with Mail Flow Rules in Exchange Online

Companies are more concerned than ever about email security. Targeted phishing attacks are becoming...

Author: mawiley Date: 05/27/2017

Multi Factor Authentication in Challenging Environments (like no Internet access)

Your password probably starts with a capital letter and ends with either a number or exclamation...

Author: JDHurt Date: 04/24/2017

Implementing Conditional Access with Exchange Online (updated using Azure Portal)

Implementing Conditional Access with Exchange Online (updated using Azure Portal) I am updating this...

Author: Paul Jones (MSFT) Date: 01/09/2017

Secure Productive Enterprise: 9 Modern Security & Productivity Pitfalls

Written by John Stasick (Microsoft) and Jake Mowrer (Microsoft) Introduction: A Critical Question, A...

Author: Jake Mowrer [MSFT] Date: 12/19/2016

Implementing Conditional Access with Exchange Online

In this Blog Post, I will step through the process to enable the different features of Conditional...

Author: Paul Jones (MSFT) Date: 12/13/2016

Mobile Devices and Modern Threats

I had a customer the other day look at my Android device and ask me “Why do you use Android when...

Author: Jake Mowrer [MSFT] Date: 10/18/2016

Microsoft Cloud App Security - Part 1: Credit Card Numbers

Microsoft Cloud App Security (CAS)...

Author: Paul Jones (MSFT) Date: 08/22/2016

The 3 Security Questions You Must Ask Every Quarter

Microsoft processes over a billion authentications per day and monitors tens of thousands of...

Author: Stasick Date: 08/22/2016

Welcome to the SCD OoEP&S Blog!

Right about now you might be thinking: "Uh, great... more Microsoft acronyms? What the heck is SCD...

Author: Stasick Date: 08/15/2016