Microsoft Teams Goes Through a Growth Spurt

Microsoft Teams Goes Through a Growth Spurt

Like any 1-year-old, Microsoft Teams is growing at a cracking pace. New features are popping up by the day—so many that most can only be discussed in amalgam. Accordingly, here are our top twelve recent and any-day-now updates for Microsoft Teams. Why twelve? Depending on your setup, any one of these updates could completely change [...]

Read More

New Traffic Analytics for Azure Generally Available

New Traffic Analytics for Azure Generally Available

Trafficking in Insight –  Microsoft’s Traffic Analytics for Azure recently became generally available, and it’s shaping up to be a valuable addition to IT’s network monitoring capabilities. The solution uses Network Watcher network security group (NSG) flow logs to create a comprehensive view of an organization’s traffic flows within Azure and to the broader internet. This [...]

Read More

Top 10 Current and Upcoming Outlook Updates

Top 10 Current and Upcoming Outlook Updates

A truckload of new Outlook updates are steadily rolling toward users on every platform from Android to Windows. Here’s the rundown on the ten most noteworthy of these changes, available in Outlook now or within the next few months, ranked accordingly: 1 – Bcc Warning You’ll be alerted you if you’re responding to a Bcc [...]

Read More

Play Well with Others with Azure AD B2B Collaboration

Play Well with Others with Azure AD B2B Collaboration

The Sign Reads “No Jerks (or Competitors) Allowed” – Over at Petri, Tony Redmond has been keeping an eye on Azure Active Directory’s business-to-business (B2B) collaboration feature. If you haven’t run across it before, Azure AD B2B collaboration allows guests from other (potentially not-running-Azure) organizations to work safely with your users and their files. Think of [...]

Read More

Security Intelligence Report Reveals Global Threat Trends

Security Intelligence Report Reveals Global Threat Trends

Growing Threats Microsoft’s 23rd volume of its annual Security Intelligence Report is now available for download. The report’s conclusions are based on the analysis of threat trends over the past year in both on-premise and cloud services, drawing from hundreds of thousands of attacks on over a billion devices. The release announcement highlights several prominent attack types.  Malware propagating through massive botnets continues to infect millions of devices and IP addresses worldwide. [...]

Read More

Attack Simulator for Office 365 Lets You Play the Hacker

Attack Simulator for Office 365 Lets You Play the Hacker

Tackling Security from Another Angle If you’ve ever wanted to throw digital darts at your end users in the name of good security, the time is now. Now in public preview, the Attack Simulator for Office 365 Threat Intelligence is designed to be a more direct tool for threat prevention.  As the name implies, the Attack Simulator is an add-on [...]

Read More

TLS 1.0 and 1.1 Become the Walking Dead this Halloween

TLS 1.0 and 1.1 Become the Walking Dead this Halloween

Don’t Leave Your Environment Vulnerable This Halloween, you should flee in terror from rotting, decrepit…versions of TLS. As of October 31st this year, Office 365 will no longer support TLS 1.0 and 1.1.  The deadline was initially March 1st of this year; the extension to October 31st means a brief reprieve for anyone struggling to shift to TLS 1.2, the most recent version.  In their announcement, Microsoft [...]

Read More

Microsoft Office 365 Secure Score Explained in 4 Minutes

Microsoft Office 365’s Secure Score tool analyzes your Office 365 security profile, generating a cumulative score reflecting the strength of your security. But while the score itself is a useful metric, the tool is limited in the remediation of large numbers of users in an enterprise setting.

Read More

Building Office 365 Client Access Policies

Tuning Tenant Security and Compliance A major feature of Office 365 lies in how it allows users to access it from practically any device with an internet connection. Compliance with governmental or internal regulations, however, can oftentimes require stricter security policies than what default Office 365 supplies. With attention and a Client Access Policy, you can customize who can access which Office 365 services, from where and from what devices. The why [...]

Read More