Safe Attachment policies are a powerful feature in Defender for Office 365. They allow you to leverage a virtual sandbox to check attachments in inbound email message before they are delivered to the recipient. In addition, safe attachments also allow you to protect files in Teams, SharePoint, and OneDrive so that users aren’t inadvertently sharing malicious

In this article, I am going to be walking you through an introduction of Microsoft’s Defender for Office 365 which comes part of the Microsoft 365 Defender offerings. Defender for office 365 contains some of the following high level features: Real-Time Detection and Prevention against malware/phishing Automated Investigation and Response  Threat Hunting  Attack Simulation Training 

Microsoft has evolved the Microsoft 365 Defender products over time. The product line used to be known as Microsoft Defender Threat Protection and has since been rebranded. It is made up of the following offerings: Defender for Identity (hybrid identity security solution) Defender for Endpoint (EDR, AV) Defender for Office 365 (Anti-malware, anti-phishing) Cloud App

Microsoft recently announced that they are going to start to automatically redirect anyone going to the legacy “security and compliance admin center” to the newly rebranded Defender Security Center (located at Microsoft Defender is an integrated experience of Microsoft’s suite of security services spanning Defender for Identity, Defender for Endpoint, Defender for Office 365, and

Recently, Microsoft has announced a fork of the Defender for Endpoint offering into two plans. Defender for Endpoint has traditionally been an enterprise grade solution and only included in higher level plans such as E5. Over the past few years Microsoft has made this a standalone offering that could be bolted on to other plans

Over the years, Microsoft has evolved the enforcement of multi-factor authentication into various sections of the application. These changes are making it confusing as an admin to know where to go to see a report of MFA adoption. In this article, we will cover the various methods of MFA enrollment and provide a script that you can use to report

Having checklist for security is becoming more and more important as you onboard customers. In this article, I will provide a list of security tips to harden Azure AD Environments.  Enable MFA You should enable MFA for all of your user accounts because a breach of any of those accounts can lead to a breach

Microsoft Teams adoption has skyrocketed over the past year. This may seem like an obvious statement but I don’t just mean chat and video capabilities. Teams is becoming the central hub to interact with apps, share files, and perform daily tasks with members inside and outside the organization. Microsoft is putting the most development effort