Microsoft 365
Are you looking for information about Microsoft 365? In this archive you will find all our posts about Microsoft 365.
-
Soft Delete in Microsoft Entra Conditional Access: Easily Restore Deleted Policies
Thanks to Soft Delete, a deleted policy in Microsoft Entra Conditional Access remains available for up to 30 days and can be fully restored during this retention period. This enables the complete recovery of deleted policies without significant effort, including all conditions, assignments, and access controls. A variety of scenarios can lead to policies being deleted: accidental removal, faulty automations, tenant clean-ups or malicious changes. Soft Delete ensures rapid recovery and prevents the permanent loss of critical access rules as well as time-consuming rebuilds.
-
Microsoft Intune Multi Admin Approval: Securing Device Actions such as Wipe, Retire and Delete
Multi Admin Approval (MAA) in Microsoft Intune is a security feature that requires a second user’s approval before critical changes can be executed. This four-eyes principle significantly increases security by ensuring that administrative actions are jointly performed by two users. Initially, the use of Multi Admin Approval in Microsoft Intune focused primarily on configuration objects such as app deployments or scripts. With the latest enhancement, Microsoft has significantly elevated the feature by extending the approval process to include device actions. This now covers highly sensitive operations such as Wipe, Retire and Delete, which have a direct impact on managed endpoints. Multi Admin Approval in Microsoft Intune actively protects against misconfigurations…
-
Microsoft Defender for Endpoint: Getting Started with Deployment Using Intune
Devices today are diverse, mobile and therefore exposed to a wide range of threats. Traditional antivirus solutions detect known patterns but leave gaps when facing new techniques and stealthy attacks. What is needed is a solution that provides visibility into activities, detects attacks early and enables centralized and largely automated response. One such approach is to deploy Microsoft Defender for Endpoint with Intune. Microsoft Defender for Endpoint (MDE) provides this coverage: the Endpoint Detection and Response (EDR) sensor collects device signals, Threat and Vulnerability Management (TVM) identifies vulnerabilities and misconfigurations, Attack Surface Reduction (ASR) rules minimize the attack surface, Web and Network Protection block risky connections and Automated Investigation and…
-
Protect Security Info Registration with Microsoft Entra Conditional Access and Microsoft Entra ID Protection
Registration of security information such as the Microsoft Authenticator app, FIDO2 security keys or OATH tokens is a critical component of modern identity security. To protect this sensitive process, Microsoft Entra Conditional Access is used in combination with Microsoft Entra ID Protection. If a user risk or sign-in risk is detected, the Conditional Access policy prevents registration under untrusted conditions. This ensures that security-relevant information is only registered in trusted scenarios. If registration takes place under untrusted conditions, there is a risk that an attacker may register alternative authentication methods. This could allow continued access to a compromised account even after the password has been changed. To mitigate this risk,…
-
Microsoft Defender Attack Simulation Training: Boosting Real-World Security Awareness
Phishing, malware, and social engineering remain among the most common entry points for cyberattacks. While technical safeguards play a crucial role in strengthening overall security, the human factor often remains a critical vulnerability. Attack simulation training, a feature of Microsoft Defender for Office 365, offers a practical way to enhance user security awareness and build a more resilient organizational security posture.