
Best Practices
External Sharing Security Checklist in Microsoft 365
Secure your Microsoft 365 with this external sharing security checklist to prevent data leaks and protect sensitive information.
11 min read
A browser privacy change in Chromium 141 introduces a new permission prompt that appears when public websites try to access a user’s local network. Chrome and Edge browsers will adopt this change by the end of September to protect users from malicious sites silently scanning or attacking devices on private networks. …
Troubleshooting Microsoft Teams client issues often requires collecting diagnostic logs from end-user devices. Traditionally, this process has been time-consuming, disruptive, and dependent on user cooperation. To simplify this, Microsoft started rolling out a new capability to remotely collect diagnostic logs from Teams clients on Windows and Mac, directly through the…
If your organization relies on Viva Engage for daily conversations and community engagement, here’s something you won’t want to miss. Microsoft has scheduled a series of planned maintenance that will temporarily limit what your organization can do in Viva Engage. Let’s delve into what will happen in Viva Engage and…
When it comes to managing a small or medium-sized organization, Microsoft 365 Business Premium provides a solid foundation for productivity and collaboration. However, even with Business Premium, advanced threats such as phishing, identity theft, and compliance risks can put your organization at risk. To address these challenges, Microsoft has introduced new security…
External access in Microsoft Teams has always been a key part of collaboration, allowing your organization to communicate with users outside your tenant. Until now, admins managed this access at the tenant-wide, either allowing all users to communicate externally or blocking all external interactions. Even with policy-level settings, admins could…
Zero Trust has become one of the most preferred security approaches for modern Microsoft 365 organizations. At its core, Zero Trust is a security model that shifts from the old assumption of “trust once inside the network” to a modern principle of “never trust, always verify.” Despite this clarity,…
Struggling to automate secure monitor manage M365?
Try AdminDroid for Free!Secure your Microsoft 365 with this external sharing security checklist to prevent data leaks and protect sensitive information.
11 min read
Step-by-step guide to create and configure Microsoft 365 retention policies to manage and protect your emails, files, and Teams data.
5 min read
Learn how to manage object deletions in Microsoft Entra ID and use protected actions to prevent irreversible data loss.
5 min read
Conditional Access Optimization Agent identifies gaps in your policies and offers one-click fixes to strengthen access controls.
6 min read
Learn how to troubleshoot 12 common Microsoft Entra ID issues, including sign-in errors, MFA failures, brute force attacks, etc, with solutions.
10 min read
Discover how the new Exchange Online Tenant Outbound External Email Limits work, when emails expire from the 24-hour window, and when your limit resets.
4 min read
Microsoft Entra ID now supports Bulk user edit (Preview), allowing admins to modify multiple user attributes at once.
3 min read
Learn how to manage unlicensed OneDrive accounts, understand the archiving process, and ensure data preservation with retention policies.
8 min read
Discover the top Microsoft 365 admin blogs of 2024, featuring the latest tips and best practices to help you manage your M365 environment.
11 min read
Automate manual processes with workflows in Microsoft Teams, boosting efficiency and streamlining collaboration.
6 min read
Learn how to set up content approval in SharePoint Online to manage visibility and streamline content control for lists and libraries.
7 min read
Discover how organization charts in Microsoft 365 can simplify navigating your company’s structure and improve team collaboration.
8 min read