
External Sharing Security Checklist in Microsoft 365
Secure your Microsoft 365 with this external sharing security checklist to prevent data leaks and protect sensitive information.
11 min read
Troubleshooting Microsoft Teams client issues often requires collecting diagnostic logs from end-user devices. Traditionally, this process has been time-consuming, disruptive, and dependent on user cooperation. To simplify this, Microsoft started rolling out a new capability to remotely collect diagnostic logs from Teams clients on Windows and Mac, directly through the…
If your organization relies on Viva Engage for daily conversations and community engagement, here’s something you won’t want to miss. Microsoft has scheduled a series of planned maintenance that will temporarily limit what your organization can do in Viva Engage. Let’s delve into what will happen in Viva Engage and…
When it comes to managing a small or medium-sized organization, Microsoft 365 Business Premium provides a solid foundation for productivity and collaboration. However, even with Business Premium, advanced threats such as phishing, identity theft, and compliance risks can put your organization at risk. To address these challenges, Microsoft has introduced new security…
External access in Microsoft Teams has always been a key part of collaboration, allowing your organization to communicate with users outside your tenant. Until now, admins managed this access at the tenant-wide, either allowing all users to communicate externally or blocking all external interactions. Even with policy-level settings, admins could…
Zero Trust has become one of the most preferred security approaches for modern Microsoft 365 organizations. At its core, Zero Trust is a security model that shifts from the old assumption of “trust once inside the network” to a modern principle of “never trust, always verify.” Despite this clarity,…
Microsoft Online Email Routing Address (MOERA) domains, like contoso.onmicrosoft.com, are designed to let organizations get started quickly and test a new tenant in Microsoft 365. They don’t reflect a brand’s identity and shouldn’t be used for regular email traffic. On top of that, spammers often exploit new onmicrosoft tenants to…
Struggling to automate secure monitor manage M365?
Try AdminDroid for Free!One stop place for comprehensive Microsoft 365 security checklists, covering all services.
Secure your Microsoft 365 with this external sharing security checklist to prevent data leaks and protect sensitive information.
11 min read
Automate Microsoft 365 admin tasks with PowerShell, Power Automate, and tools to boost efficiency and reduce manual work.
7 min read
Explore the key OneDrive for business security practices crucial for protecting sensitive data and preventing data loss in OneDrive.
6 min read
Learn how to enable the Reject Direct Send feature in Exchange Online to keep your organization safe from evolving phishing attacks.
5 min read
Discover 6 practical methods to optimize SharePoint storage that helps improving performance and lower costs without losing important data.
7 min read
Learn how to detect and defend against evolving identity attacks in Microsoft 365 such as Teams phishing, malicious app consent, and more.
6 min read
Learn how to detect, investigate, and secure compromised email account in Microsoft 365 in your organization.
10 min read
Ensure all users can complete multifactor authentication in Microsoft 365 to safeguard against account compromise.
5 min read
Learn how to configure break glass access application in Entra ID to recover admin accounts from the lockouts.
6 min read
Learn how to troubleshoot 12 common Microsoft Entra ID issues, including sign-in errors, MFA failures, brute force attacks, etc, with solutions.
10 min read
Run MS Graph scripts unattended in Azure using app-only authentication with Azure Automation for seamless, secure, and scalable execution.
9 min read
Learn how to organize your SharePoint Online documents to enhance accessibility, compliance, and searchability.
8 min read