Freshly brewed with Microsoft Azure and Microsoft 365

Category: Microsoft 365 Page 1 of 7

Are you looking for information about Microsoft 365? In this archive you will find all our posts about Microsoft 365.

Microsoft Defender Attack Simulation Training: Boosting Real-World Security Awareness

Phishing, malware, and social engineering remain among the most common entry points for cyberattacks. While technical safeguards play a crucial role in strengthening overall security, the human factor often remains a critical vulnerability. Attack simulation training, a feature of Microsoft Defender for Office 365, offers a practical way to enhance user security awareness and build a more resilient organizational security posture.

Securing Microsoft 365 Apps with Microsoft Entra Global Secure Access

Strengthening secure access to Microsoft 365: Microsoft Entra Global Secure Access provides encrypted access to Microsoft 365 services such as Exchange Online and SharePoint Online through the Microsoft traffic profile. All data traffic is routed through protected network paths, ensuring reliable protection against unauthorized access.

Microsoft Entra ID: QR Code Sign-In (Public Preview)

Microsoft Entra offers an innovative solution for fast and secure access: sign-in with QR code. This method simplifies the sign-in process while ensuring a high level of security. QR code sign-ins are ideal for employees in industries such as hospitality, production, logistics or healthcare who have to sign in to different devices several times a day.

Microsoft Defender for Identity: Getting Started

Microsoft Defender for Identity (MDI) secures the on-premises Active Directory (AD) against identity threats as a cloud-based security solution. By thoroughly analyzing user activities and detecting complex attack vectors, Microsoft Defender for Identity (MDI) ensures comprehensive protection against identity compromises.

Enhance Token Security with Microsoft Entra and Microsoft Intune

When an attacker steals a user’s token after a successful login, they gain the ability to impersonate the user and access protected resources without requiring a re-login. This method is becoming more commonly used to bypass security measures like Multi-Factor Authentication (MFA).

Page 1 of 7

Powered by WordPress & Theme by Anders Norén