
Security
Stop MFA Registration Attacks on User Accounts
Worried about MFA registration attacks in Microsoft Entra ID? Explore 6 ways to stop MFA bypass, secure enrollments, and protect accounts.
10 min read
A browser privacy change in Chromium 141 introduces a new permission prompt that appears when public websites try to access a user’s local network. Chrome and Edge browsers will adopt this change by the end of September to protect users from malicious sites silently scanning or attacking devices on private networks. …
Troubleshooting Microsoft Teams client issues often requires collecting diagnostic logs from end-user devices. Traditionally, this process has been time-consuming, disruptive, and dependent on user cooperation. To simplify this, Microsoft started rolling out a new capability to remotely collect diagnostic logs from Teams clients on Windows and Mac, directly through the…
If your organization relies on Viva Engage for daily conversations and community engagement, here’s something you won’t want to miss. Microsoft has scheduled a series of planned maintenance that will temporarily limit what your organization can do in Viva Engage. Let’s delve into what will happen in Viva Engage and…
When it comes to managing a small or medium-sized organization, Microsoft 365 Business Premium provides a solid foundation for productivity and collaboration. However, even with Business Premium, advanced threats such as phishing, identity theft, and compliance risks can put your organization at risk. To address these challenges, Microsoft has introduced new security…
External access in Microsoft Teams has always been a key part of collaboration, allowing your organization to communicate with users outside your tenant. Until now, admins managed this access at the tenant-wide, either allowing all users to communicate externally or blocking all external interactions. Even with policy-level settings, admins could…
Zero Trust has become one of the most preferred security approaches for modern Microsoft 365 organizations. At its core, Zero Trust is a security model that shifts from the old assumption of “trust once inside the network” to a modern principle of “never trust, always verify.” Despite this clarity,…
Struggling to automate secure monitor manage M365?
Try AdminDroid for Free!Worried about MFA registration attacks in Microsoft Entra ID? Explore 6 ways to stop MFA bypass, secure enrollments, and protect accounts.
10 min read
Secure your Microsoft 365 with this external sharing security checklist to prevent data leaks and protect sensitive information.
11 min read
Step-by-step guide to create and configure Microsoft 365 retention policies to manage and protect your emails, files, and Teams data.
5 min read
Explore application usage analytics in Microsoft Entra to detect generative AI apps and monitor application activity to enhance security.
6 min read
Automate Microsoft 365 admin tasks with PowerShell, Power Automate, and tools to boost efficiency and reduce manual work.
7 min read
Learn how to monitor Direct Send email activities in Exchange Online to keep your organization safe from evolving phishing attacks.
4 min read
Learn how linkable identifiers in Entra ID simplify tracing Microsoft 365 activities and boost threat detection.
6 min read
Explore the key OneDrive for business security practices crucial for protecting sensitive data and preventing data loss in OneDrive.
6 min read
Learn how to manage object deletions in Microsoft Entra ID and use protected actions to prevent irreversible data loss.
5 min read
Discover how Sysadmins vs AI isn't a rivalry but a power-up. This SysAdmins Day 2025 blog explores how AI boosts Sysadmins to be faster.
5 min read
Learn how to manage the retirement of SharePoint Alerts and alternatives within Microsoft 365 to keep your team updated with notifications.
6 min read
Learn how to enable the Reject Direct Send feature in Exchange Online to keep your organization safe from evolving phishing attacks.
5 min read