Category Security & Compliance

Safeguarding Your Business: Combating EvilGinx and MFA Bypass with Conditional Access Phishing Resistance

In an era dominated by technological advancements, the rise of cyber threats poses a substantial risk to businesses and individuals alike. One such threat is EvilGinx, a sophisticated man-in-the-middle software…

Read More

Mastering Microsoft’s SC-400 Exam: Your Ultimate Guide

If you're looking to prove your expertise in securing and protecting Microsoft 365 workloads, passing the SC-400 exam is your key to success. Microsoft's SC-400, “Administering Information Protection and Compliance…

Read More

Purview – eDiscovery, and Investigations – How to guide

Create a Case - eDiscovery (Standard) - Microsoft Purview You will require the role eDiscovery Manager or eDiscovery Administrator Assign eDiscovery permissions in the Microsoft Purview compliance portal - Microsoft…

Read More

Microsoft SC-200 Security Operations Analyst – Study Notes

Defender for Identity entity tags in Microsoft 365 Defender https://docs.microsoft.com/en-us/defender-for-identity/manage-sensitive-honeytoken-accounts Using role-based access control (RBAC) https://docs.microsoft.com/en-us/learn/modules/deploy-microsoft-defender-for-endpoints-environment/4-manage-access Manage portal access using role-based access control https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/rbac?view=o365-worldwide Safe Attachments policies in Microsoft Defender…

Read More

Block Access From Unmanaged Devices To SharePoint or Specific Sites

Get started with the SharePoint Online Management Shell | Microsoft Docs Learn about sensitivity labels - Microsoft 365 Compliance | Microsoft Docs Control access from unmanaged devices - SharePoint in…

Read More

How to Enable “Security Defaults” in Azure and Office 365

Security Defaults in Azure Portal. IMPORTANT, SECURITY DEFAULTS IS NOT ALWAYS ENABLED BY DEFAULT. YOU MUST CHECK YOUR SETTINGS What does Security Defaults give you? Security Defaults when enabled provide…

Read More

MS365 – Azure AD – Dynamic Groups and Expiration Settings

Maintain groups in Azure AD with dynamic groups and set expiration settings. Example scenario : Controlling remote access to sub contractors working on a short term project. The project owner…

Read More

Office 365 Security and Compliance – Alert When A Specific File Is Accessed

When a very important file stored in OneDrive needs to be monitored. This is how to create an alert on file activity. We specifically want to monitor and alert on…

Read More

Content Search – Security And Compliance – Search A Mailbox For Specific Content And Then Export Results

If you’re doing some compliance investigation work, you may need to search a user’s mailbox for specific words. This is how To Search Email Content in Office 365 Security &…

Read More