Security Content

To Try Out Microsoft Defender: Sign Up With the 90-day Free Microsoft 365 E5 Developer Program

- 5 min read-Thilak Kumar Singh
What's the best way to try out Microsoft Defender before your organization considers buying it? It might be the Microsoft 365 E5 Developer Program. Odd huh? Use a test developer license to test an admin feature. In this article, Thilak explains how you can sign up for the 90-day free Microsoft E5 Developer program or subscription and try the Microsoft Defender for Office Plan 2 for free. It explains how you can provide your personal details, create your Microsoft E5 sandbox, and verify your Microsoft account.

Delegation and Least Privilege in Entra ID, Part 2

- 1 min read-Mahdi Tehrani
In this video I use the main concepts that I discussed to implement a delegation model in Entra ID. This implementation includes Dynamic Groups, Dynamic Administrative Units, Custom Roles and putting them all together to create the model.

Delegation and Least Privilege in Entra ID, Part 1

- 1 min read-Mahdi Tehrani
Least Privilege plays a crucial role in designing a security model in an environment and eventually moving to a Zero Trust approach. The previous video series (Designing a Delegation Model in Active Directory), we discussed Delegation in Active Directory and how to design a delegation model based on the concept of least privilege. However, Entra ID as a trending Identity Provider, needs to be treated the same way. So, in this video we discuss the main concepts like role, permissions, scopes, administrative unit and prepare ourselves for real implementation of the delegation model in Entra ID coming in next video.

Enhancing Microsoft 365 Security with Conditional Access and Multifactor Authentication

- 10 min read-Liam Cleary
Businesses face challenges in maintaining data integrity and protecting sensitive information. Microsoft 365's advanced security features, Multifactor authentication (MFA), and Conditional Access are crucial components of a comprehensive security strategy. Multifactor Authentication requires multiple forms of user verification before granting access, while Conditional Access enables granular access controls. Together, they create a dynamic security fabric that anticipates modern cybersecurity threats and ensures rigorous safeguarding of data and applications.

Strategies for Securing Sensitive Information in Microsoft Teams

- 6 min read-Liam Cleary
The role of Microsoft Teams has grown significantly over the past few years. Its seamless integration of chat, video conferencing, file sharing, and various productivity tools has become a popular platform for companies of all sizes. However, this increased usage also means a higher risk of exposing sensitive data.

Catch the Recording of AI Threats All M365 Admins Should Know

- 2 min read-Erik Ruthruff
Well that was enlightening to be sure. If you sometimes wear the hat of a Microsoft 365 admin at your organization, or you work with someone in IT who does, I encourage you to watch the recording of the March 7 webinar that TekkiGurus presented with Mimecast. It's free, funny at times, educational, and you, like me, will learn some actionable steps to improve the computer security for you and your organization.

5 Advantages to Using Azure Firewall Over Azure Network Security Groups

- 9 min read-Denny Cherry
Network security in Microsoft Azure can be handled either by Network Security Groups, which is free, or Azure Firewall, which is a paid feature. Azure Firewall is often worth it for its ability to more granularly manage network traffic. In this article, I cover the advantages of Azure Firewall to help you decide whether it’s worth the investment for your organization.

Designing a Delegation Model in Active Directory, Part 4

- 1 min read-Mahdi Tehrani
This is part 4 of “Designing a delegation model in Active Directory”. In this video, Mahdi explains how to proceed to perform the mirroring of Access Control Lists (ACLs) using the newly created groups. By mirroring ACL, we mean to assign the same delegation the users had but this time instead of relying on old groups or using the direct delegation, it is done using the created groups we created in part 3 of this series. Mahdi also explains that the cleanup needs to be done in order to remove the old unwanted ACLs.

The Attack That Got Us to This Point and the Next One Coming

- 5 min read-Erik Ruthruff
I vividly remember working for a company when we had a ransomware attack and everything shifted. We weren't one of those big companies you read about in the news, but wow did it feel significant at the time. "Those companies" that failed to be secure became "us." Years later, I find myself in the role of an M365 Admin and we have everything in the cloud, and I realize AI tools could aid in making something like that happen again. I'll make an effort to learn to prevent it by attending this webinar. Join me, won't you?

Designing a Delegation Model in Active Directory: Part 3

- 1 min read-Mahdi Tehrani
This is part 3 of “Designing a Delegation Model in Active Directory”. If you watched part 1 and part 2, you have studied the environment and you know what needs to be done. In this video the actual stuff is happening. The groups will be created and based on this groups, the actual delegation will be done on Active Directory. This delegation is done by using PowerShell scripts.

Designing a Delegation Model in Active Directory: Part 2

- 1 min read-Mahdi Tehrani
This is part 2 of “Designing a delegation model in Active Directory”. In Part 1, Mahdi discussed the general concepts of delegation and why even delegation based on least privilege is a must in Active Directory. In this part, he explains the different methods of applying delegation in Active Directory and suggests a framework based on the concepts of least privilege. This framework can be expanded to include other areas of infrastructure. For example, the same concepts can be used to implement the least privilege delegation to manage the VMware solution or Azure Resources. However, the focus here is Active Directory.

Introduction to Microsoft 365 Backup and Archive Functionality

- 5 min read-Brian Alderman
Microsoft is developing and testing Microsoft 365 Backup and Microsoft 365 Archive, which currently in Preview mode and expected to be in General Availability (GA) in 2024. Using Microsoft 365 Backup, persons with Microsoft 365 admin roles can create and manage backups using Microsoft 365 Backup for OneDrive, SharePoint, and Exchange. Microsoft 365 Archive will provide a cost-effective solution for securing inactive data within SharePoint. Microsoft 365 Archive offers benefits and partner integrations.