Microsoft 365 Security Basics: Password Protection

Weak and easily guessable passwords 🗝️ have been a common pain for an organization's security. We all have tried to add password complexity, but users just think of easy ways to bypass it with things like CompanyName1! 😝 Or worse helpdesk uses passwords like the common Winter2023! or Fall2019! 🤢 Well in this video I ... Read More

Build a website using Azure Static Web Apps and Authenticate with AAD

Docusarus, Azure Static Web Apps, Github and Azure Active Directory, Oh MY! In this video, I'll introduce you to some exciting new technologies for building and hosting your own website for documentation. We'll start by creating a local site using Node JS and Docusaurus, followed by deploying it on Azure Static Web Apps. To enable ... Read More

Practical Conditional Access: The Secure Endpoint

In this final video on Practical Conditional Access, we'll be sharing our favorite set of policies designed to ensure secure access to your organization's environment. Specifically, we'll be focusing on the "The Secure Endpoint" policy, which is a customizable template that addresses a variety of scenarios. The main goal of which is to limit access ... Read More

Create a Conditional Access Policy Design: The Castle Bypass

In the second video in our series on Practical Conditional Access, we are talking about requiring MFA except when you are in a trusted location. This type of policy is common but increases an organization's risk due to the bypass. So in this video, we will walk through a design called "The Castle Bypass" which ... Read More

Create a Conditional Access Policy Design: The Baseline

Creating a set of Conditional Access policies on your own without ever seeing how other orgs do it can be hard. In this series, we will be showcasing different policy designs and providing examples of practical deployments to meet various organizational requirements. These policies are designed to be templates that can be easily customized to ... Read More

Microsoft 365 Security Basics: Exchange Online

In this video, we'll cover some key points you need to know to secure your Exchange Online environment. We'll discuss topics such as disabling legacy authentication, identifying risky email overrides, enabling audit logging, blocking outbound forwarding, help users quickly identify external emails, and enabling an easy way for your users to report phishing attacks. By ... Read More

Microsoft Purview DLP report Using Power Bi

The Built-in reporting engine for Purview DLP is pretty limited. However, with Power Bi, we can create custom reports that really help extend the functionality of our reporting. In this video, I do my best impression of a Power Bi Report designer and show how you can get started with PowerBi reporting. L I N ... Read More