Track User Sign-ins Using Scenario Monitoring in Entra

Track User Sign-ins Using Scenario Monitoring in Entra

Microsoft Entra Health (preview) helps you monitor the Microsoft Entra tenant health efficiently. It includes a report of Service Level Agreement (SLA) attainment and the ability to review sign-in reporting scenarios using scenario monitoring. In an organization, monitoring user sign-ins is crucial to identify suspicious logins and prevent unauthorized access. There are usually many additional checks…

Manage Object Deletions in Microsoft Entra

Manage Object Deletions in Microsoft Entra

As we all know, Microsoft Entra ID empowers organizations with centralized identity and access management. However, amidst the convenience and efficiency it offers, Entra ID still carries the risk of human errors like accidental deletions, malicious attacks, etc. So, it becomes crucial for admins to learn the strategies for managing object deletions in Entra ID, ensuring…

How to Create High Volume Email in Exchange Online

How to Create High Volume Email in Exchange Online

For years, organizations using Microsoft 365 have surpassed the bulk email limits by using third-party solutions or on-premises servers. The reason? Using Exchange Online to send higher volumes of email often resulted in throttled user accounts, interrupting mail flow. Microsoft has made it clear that Exchange Online imposes outbound limits and is not designed for bulk emailing…

Configure Microsoft 365 Passkeys for Secure Logins

Configure Microsoft 365 Passkeys for Secure Logins

Microsoft report reveals that 4000 password attacks are happening every second (i.e., more than 300 million per day). How terrific!? Amidst all these attacks, going passwordless becomes a stronger solution. Ever imagined a world without passwords? Looks interesting, right? Thus, passwordless authentication is essential to prevent password attacks. Basically, there are four passwordless options integrated with Microsoft Entra…

How to Use Entra Workbooks in Microsoft 365 

How to Use Entra Workbooks in Microsoft 365 

Admins, on your checklist of must-dos, monitoring Microsoft 365 user activities, Entra ID sign-ins, and identity protection risk analysis top the charts. You might start by peeking into Microsoft 365 audit logs and sign-in data for improved identity and access management. But wait, here’s the twist! 🙄  ❌ Sorting through a heap of Microsoft 365 audit logs…

Enable Insider Risk in Conditional Access Policy

Enable Insider Risk in Conditional Access Policy

Traditionally, cybersecurity has focused on external threats like hackers, malware, and unseen dangers beyond digital defenses. However, internal threats can cause significant disruption to sensitive data and compromise security just as much as external attacks.  So, organizations need to prioritize insider risks and address these often-underestimated ones. Here’s where the Insider Risk in Conditional Access policy comes…

Minimize Insider Risks with Adaptive Protection in Microsoft Purview

Minimize Insider Risks with Adaptive Protection in Microsoft Purview

According to Microsoft, 93% of organizations are concerned about insider risks, with around 25% breaches happening yearly. These figures are indeed alarming!🚨 Implementing robust data security measures like Data Loss Prevention, Conditional Access, sensitivity labels is crucial. However, finding the right balance between security and productivity can be challenging. While strict policies may enhance security, they…

Retirement of RBAC Application Impersonation Role in Exchange Online

Retirement of RBAC Application Impersonation Role in Exchange Online

Microsoft’s announcement about the retirement of the application impersonation role in Exchange Online is the response to the Midnight Blizzard attack. Initially, the attackers got in using a password spray attack in a legacy test non-production system that lacks MFA configuration. Then, they compromised a test OAuth app with elevated access in the non-production tenant. Adding…

Follow us!