Category: Security and Compliance

Three Ways to Prevent An Okta-Like Breach in Azure Active Directory
Introduction: We have seen in the latest news how vendor and supplier attacks have penetrated large companies like Okta. This has prompted many customers [···]

Microsoft Defender for Endpoint & EDR: How can It Help Secure Your Endpoints & Organization– Part 1
Introduction: After a major security product re-brand and feature/functionality enhancements, the Defender Suite takes shape: Defender Branding Updates New Name Old Name Microsoft 365 [···]

How to Switch ServiceNow from OKTA to Azure Active Directory
Introduction: Building a fortress around your company’s mission-critical data is the ultimate goal for any mild-mannered IT executive. But who is playing the role [···]

Microsoft 365 Modern Workplace & Security Management Essentials
Introduction: As enterprises embrace the opportunities presented by cloud and mobile computing to connect with customers and optimize operations, they take on new risks. [···]

Microsoft Endpoint Manager (MEM) – What Is It & How Can It Help Secure Your Endpoints?
Introduction: After a swift product shuffle and re-branding we find Microsoft Endpoint Manager emerging to rise up the Gartner ranks to become the leader [···]

Why Do Many Digital Rights Management Projects Fail After POC?
Introduction: The globe is littered with opportunists with sticky fingers – and it’s never been more prevalent than in today’s digital landscape. Whether it’s [···]

Part III : Security Assessment and Solutioning with Microsoft 365 Security and Compliance Center
Introduction: In Blog 1 of this series, Security Assessment and Solutioning with Microsoft 365 Security and Compliance Center- Part 1, we went through in [···]

Part II : Security Assessment and Solutioning with Microsoft 365 Security and Compliance Center
Introduction: We hope you had the chance to read our previous blog on the subject, Security Assessment and Solutioning with Microsoft 365 Security and [···]

[Updated] Microsoft Information Protection Best Practices- Part 2
Summary: As the COVID-19 pandemic has been dramatically altering typical business strategies, the coming decade will be marked by significant transformation worldwide. Data protection [···]

Setting up Azure API Management Service
This article is about utilizing Azure API Management Service being used in a context and need was felt when a situation was experienced while [···]

Four Reasons to Migrate Okta to Azure Active Directory
Organizations around the world have accelerated digital transformation efforts to rapidly enable a remote workforce. As more and more employees access applications using their [···]

Using Azure Key Vault and Secrets in Custom Application
Introduction: In an integrated Azure world, applications need to interact with each other often with highly empowered credentials that cannot be compromised at any [···]

How to Avoid Throttling or Getting Blocked in SharePoint Online using SharePoint App Authentication
Overview Throttling in SharePoint Online is annoying, as it not only delays the process, but also SharePoint Online may completely block the process if [···]

Security & Compliance – Microsoft Teams Retention & eDiscovery – Part 2
In this part 2, I will take you through creating the minimum retention policies to cover your organization’s Microsoft Teams data. Remember Teams is [···]

Part I : Security Assessment and Solutioning with Microsoft 365 Security and Compliance Center
Introduction This is a deep dive into Microsoft 365 Security and Compliance center OOTB reports and more importantly what potential solutions may be evolved [···]

AIP Error Part III – Issues with Relabelling of Documents in SharePoint/ OneDrive using App Authentication
Introduction Remember we spoke about the incompleteness of the “Sensitivity” column while dealing with labelling of files in an MIP integrated SPO/OneDrive document library? [···]

Security & Compliance – Microsoft Teams Retention & eDiscovery – Part 1
Microsoft Teams has an astonishingly steep take-up/adoption curve with the current remote workers situation. Teams is referred to a “The Hub of Office 365” [···]

AIP Error Part II-Template Based Label remains sticky in Sensitivity Column
Introduction I found more to this “Sensitivity” column beyond what I discussed last time. There, we talked about how the sensitivity column does not [···]