
Best Practices
                Essential Best Practices for Protecting Employee Personal Data
Explore key strategies to safeguard employee personal data across apps, devices, and cloud services in modern hybrid workplaces.
8 min read
Phishing links often look completely harmless. They might come from a familiar name, use a known URL, or mention an urgent task. In the rush of a busy workday, users may click links in Microsoft Teams without a second thought. Quick chats, mobile notifications, and constant pings can make even…
Ever tried scrolling endlessly through a Microsoft Teams chat just to find one image someone shared last week? Those days are over. Microsoft Teams now lets you search for images directly within your chats and channels. Whether it’s a project whiteboard photo, a meeting screenshot, or a design draft, you…
Day 3 of the Microsoft Entra Practitioner Series transitioned from building the foundational setup for unified identity and network access to a real hands-on deployment experience through the Microsoft Entra Suite Workshop. In case you missed the earlier sessions, here’s a quick recap: On Day 3, all the speakers focused on the Microsoft Entra Suite Workshop,…
Updated (17/10/2025): Microsoft has revised the Auto-Archiving feature based on user feedback. We’ve updated the blog to reflect these changes and new timelines. Key updates include an increased trigger threshold from 90% to 96%, new PowerShell options to disable and adjust the threshold level. Managing mailbox storage in Exchange Online has…
Day 1 of the Microsoft Entra Practitioner Series sets the stage with a powerful realization — the future of secure access lies in uniting identity and network access under one cohesive framework. Missed it? No worries! here’s your complete catch-up! Day1: Unify Identity and Network Access for Zero Trust Security On Day 2, Merill Fernando dove from why into the how, breaking down the foundational steps…
Employee offboarding in Microsoft 365 often challenges admins to keep former employees’ files both accessible and secure. With Microsoft’s latest OneDrive enhancement, admins can now transfer files to managers or secondary owners seamlessly—without the usual hassle. Now, let’s explore how this update simplifies file transfers for departing employees and keeps collaboration…
Struggling to automate secure monitor manage M365?
Try AdminDroid for Free!
Explore key strategies to safeguard employee personal data across apps, devices, and cloud services in modern hybrid workplaces.
8 min read

Discover how Virtual Private Networks protect data, why they fall short, and how Zero Trust models like ZTNA, SD-WAN, and SASE secure access.
11 min read

Local admin accounts can make or break security. Learn all risks and practical steps to secure local admins and protect devices from privilege abuse.
7 min read

Learn how to restrict remote PowerShell access for non-admins to allow only admins to connect computers or servers within your organization.
11 min read

Protect your remote work environment by implementing 11 remote desktop access best practices to prevent data leaks caused by unauthorized access.
8 min read

Explore methods to securely store passwords for PowerShell script to avoid unauthorized access, credential leaks, and ensure safe automation.
9 min read

Learn how to defend against Microsoft hybrid identity attacks such as Entra Connect compromise, Pass-the-PRT, and more.
10 min read

Learn how to configure phishing-resistant passwordless authentication in a hybrid domain with Microsoft Entra Kerberos and improve security.
9 min read

Explore 10 best practices to secure admin accounts in a hybrid environment to reduce the attack surface & safeguard against evolving threats.
7 min read

Explore Active Directory vs Microsoft 365 security features to understand native capabilities and manage hybrid environments efficiently.
14 min read

Learn how to prevent users from adding computers to Active Directory. Prevent unauthorized workstation joins and secure your AD environment.
5 min read

Learn how to deploy honeypot accounts in Active Directory to observe password spray attacks and more malicious activity aimed at your domain.
7 min read