Latest Articles on Active Directory, M365, Azure and AVD

Complete Active Directory Security Assessment

Complete Active Directory Security Assessment

In this article we define a how to perform Complete Active Directory Security Assessment for an Active Directory system, and do you actually have the expertise reviewing Active Directory beyond using the default criteria that come with an Active Directory assessment tool? Complete Active Directory Security Assessment: Why Attackers are more interested in breaking into

Read More
Ensure that Collaboration Invitations in Microsoft 365 are sent to allowed domains only Using a PowerShell Script

Ensure that Collaboration Invitations in Microsoft 365 are sent to allowed domains only Using a PowerShell Script

One way to control invitations to B2B collaboration users from specific organizations is by using an allowlist or blocklist. For instance, if you wish to prevent invitations from personal email addresses, you could create a blocklist containing domains such as Gmail.com and Outlook.com. Alternatively, if your business only wants to invite partner organizations such as

Read More
Ensure third party integrated applications are not allowed in Office 365

Ensure third party integrated applications are not allowed in Office 365

When operating Office 365 and Azure Active Directory in a large enterprise, the security team may be hesitant to permit third-party applications to access enterprise data. For instance, enabling the “Users may add integrated applications” option in the “configure” tab of Azure AD’s “integrated applications” section could result in numerous applications appearing in the Azure

Read More
Ensure external file sharing in Teams is enabled for only approved cloud storage services

Ensure external file sharing in Teams is enabled for only approved cloud storage services

Effective and secure file and document sharing plays a vital role in the success of any organization. It is essential to ensure that the right individuals have access to files while preventing oversharing. This includes safeguarding confidential and sensitive data and sharing it safely with authorized personnel. Depending on your project and tasks assigned to

Read More
Translate »