
Explore our Blog Series
See all
All Posts
Microsoft 365 Community
Microsoft 365 News
Security
In-built M365 Reports
General
Best Practices
Quick M365 Updates
Struggling to automate secure monitor manage M365?
Try AdminDroid for Free!Understand the key differences between SMS sign-in and SMS MFA in Microsoft 365. Learn their pros, cons, and how to identify users for better security.
6 min read
Learn how to request edit or review access in Word, Excel, and PowerPoint for the web when you have view-only permissions in Microsoft 365.
2 min read
Learn how to create targeted attack simulation training in Microsoft Defender with dynamic groups to simulate real-world phishing attacks.
8 min read
8 min read
5 min read
4 min read
10 min read
8 min read
5 min read
Microsoft Entra is updating access package visibility rules. Find out what’s changing and what you need to do.
2 min read
Understand the key differences between SMS sign-in and SMS MFA in Microsoft 365. Learn their pros, cons, and how to identify users for better security.
6 min read
Learn how to request edit or review access in Word, Excel, and PowerPoint for the web when you have view-only permissions in Microsoft 365.
2 min read
Learn how to create targeted attack simulation training in Microsoft Defender with dynamic groups to simulate real-world phishing attacks.
8 min read
Auto-set users' work locations in Microsoft Teams based on their connection to the organization's Wi-Fi or peripherals.
1 min read
Learn how to use mail merge in the new Outlook to send individual emails to multiple people without using Word or Excel.
5 min read
Block the creation of client secrets in Microsoft Entra applications to reduce authentication risks and prevent credential leaks.
6 min read
Learn how to detect and defend against evolving identity attacks in Microsoft 365 such as Teams phishing, malicious app consent, and more.
6 min read
Custom security attributes in Entra ID help extend user and app profiles with business-specific data. Learn how to configure them.
6 min read
Learn how to detect, investigate, and secure compromised email account in Microsoft 365 in your organization.
10 min read
Explore the new Graph-based Conditional Access What If tool to evaluate policies with accurate sign-in context using Graph API.
6 min read
Learn how the Identity Threat Detection and Response dashboard helps you assess your identity security and detect threats.
6 min read