
Explore our Blog Series
See all
All Posts
Microsoft 365 Community
Microsoft 365 News
Security
In-built M365 Reports
General
Best Practices
Quick M365 Updates
Struggling to automate secure monitor manage M365?
Try AdminDroid for Free!Learn how to request edit or review access in Word, Excel, and PowerPoint for the web when you have view-only permissions in Microsoft 365.
2 min read
Learn how to create targeted attack simulation training in Microsoft Defender with dynamic groups to simulate real-world phishing attacks.
8 min read
Auto-set users' work locations in Microsoft Teams based on their connection to the organization's Wi-Fi or peripherals.
1 min read
8 min read
5 min read
4 min read
10 min read
8 min read
5 min read
Understand the key differences between SMS sign-in and SMS MFA in Microsoft 365. Learn their pros, cons, and how to identify users for better security.
6 min read
Learn how to request edit or review access in Word, Excel, and PowerPoint for the web when you have view-only permissions in Microsoft 365.
2 min read
Learn how to create targeted attack simulation training in Microsoft Defender with dynamic groups to simulate real-world phishing attacks.
8 min read
Auto-set users' work locations in Microsoft Teams based on their connection to the organization's Wi-Fi or peripherals.
1 min read
Learn how to use mail merge in the new Outlook to send individual emails to multiple people without using Word or Excel.
5 min read
Block the creation of client secrets in Microsoft Entra applications to reduce authentication risks and prevent credential leaks.
6 min read
Learn how to detect and defend against evolving identity attacks in Microsoft 365 such as Teams phishing, malicious app consent, and more.
6 min read
Custom security attributes in Entra ID help extend user and app profiles with business-specific data. Learn how to configure them.
6 min read
Learn how to detect, investigate, and secure compromised email account in Microsoft 365 in your organization.
10 min read
Explore the new Graph-based Conditional Access What If tool to evaluate policies with accurate sign-in context using Graph API.
6 min read
Learn how the Identity Threat Detection and Response dashboard helps you assess your identity security and detect threats.
6 min read
Ensure all users can complete multifactor authentication in Microsoft 365 to safeguard against account compromise.
5 min read