Quantcast
Channel: Cloud Security | Office 365 | Azure | SharePoint
Browsing all 72 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Facebook advertising scam! Tips and tricks to recognize fake and fraudulent...

Nowadays it is very easy to buy/purchase a domain, create a website using a template and start selling products. I have noticed a lot of advertisements on Facebook and Youtube that tried to sell...

View Article


Image may be NSFW.
Clik here to view.

The user name or password is incorrect during Intune Autopilot enrollment

A month ago we encountered an issue for new devices enrolled using Intune AutoPilot. Users were able to authenticate during the Windows 10 installation steps but they receive the message “The user name...

View Article


Image may be NSFW.
Clik here to view.

Manage apps with Defender for Endpoint and Microsoft Cloud App Security

It’s easy to manage apps when you have a clear perimeter. There is only one option to access the internet and that’s through the company firewall. Now, with people working from home and bring your own...

View Article

Image may be NSFW.
Clik here to view.

Web content filtering with Defender for Endpoint

Content filters are used almost in every organization. The function of a content filter is to block websites or files. These sites or files may be malicious or it’s in the company policy to restrict...

View Article

Image may be NSFW.
Clik here to view.

Enable Tamper Protection with Defender for Endpoint

Tamper protection protects you from unwanted changes to Microsoft Defender Antivirus. Bad actors normally want to disable the firewall or antivirus in order to install additional malware. Disabling...

View Article


Image may be NSFW.
Clik here to view.

First contact safety tip in Defender for Office 365

Microsoft added the first contact safety tip in Defender for Office 365. This safety tip is shown when recipients first receive an email from a sender or do not often receive email from a sender....

View Article

Image may be NSFW.
Clik here to view.

Privileged access groups in Azure Privileged Identity Management

It was already possible to use Privileged Identity Management (PIM) to manage, control and monitor administrator roles in your organization. PIM provides time-based and approval-based role activation....

View Article

Image may be NSFW.
Clik here to view.

Building simple parent/child relationship grid in Azure Sentinel Workbook

There are many different visualizations in Azure Workbooks. A grid can be just a plain grid, or a grid with a parent/child relationship, or grouped by values in columns. This post will show you how to...

View Article


Image may be NSFW.
Clik here to view.

Provision a Team in Microsoft Teams using Power Apps and Power Automate

It’s best practice from a security point of view to disable users from creating security groups or Microsoft 365 groups. Users can create security groups in Azure portals, API or PowerShell by default....

View Article


Image may be NSFW.
Clik here to view.

Export & Import Office 365 and Azure configuration

In two weeks I’ll be starting at a new company as an Information Security specialist. In order to prepare for this new endeavor I’ll be updating my developer tenant for testing purposes. All best...

View Article

Image may be NSFW.
Clik here to view.

Export & Import Conditional Access policies and configuration using Graph API

Conditional access is the tool to enforce organizational policies. Access to resource is granted using if-then statements. You can for example enforce multi-factor authentication from untrusted...

View Article

Image may be NSFW.
Clik here to view.

Export & Import Intune policies and configuration using Graph API

Intune or Microsoft Endpoint Manager is to tool for Mobile Device Management (MDM) or Mobile Application Management (MAM). Device management was mostly focussed on devices like iOS and Android where...

View Article
Browsing all 72 articles
Browse latest View live