Category: Azure
Azure
All Latest
How to Upgrade Veeam Backup for Microsoft 365 to v8
Veeam released a version of Veeam Backup for Microsoft 365 v8 on September 11, 2024, and includes Immutable backups with the ability to store on any object storage, Enterprise scale and efficiency delivered by Veeam Proxy Pools, Backup for private and shared Teams channels, and Linux-based backup proxies…
Read MoreEnabling Enterprise State Roaming in Entra ID
Introduction Enterprise State Roaming is a feature introduced in Windows 10 (1511) that allows...
Read MoreUnveiling S2D and Azure Stack HCI Monitoring with PowerShell
Hey Checkyourlogs Fans, Dave Kawula here, thrilled to share an invaluable insight into...
Read MoreHow to Configure Custom Safe Links Policies in Microsoft Defender for Office 365
Safe Links is a feature in Microsoft Defender for Office 365 (formerly known as Office 365 Advanced Threat Protection or ATP) that helps protect your organization from malicious hyperlinks in email messages. When an email contains a hyperlink, Safe Links checks the URL against a list of known malicious links. If the link is safe, the user can access the website normally. However, if the link is malicious, Safe Links blocks access to the website and alerts the user and administrators.
Read MoreHow to create custom Safe Attachments policies in Microsoft Defender for Office 365
In Microsoft Defender for Office 365, Safe Attachments is a feature that helps protect your organization from malicious email attachments. It automatically scans email attachments for potential threats, such as malware or viruses, before delivering them to recipients’ mailboxes.
Read MoreHow to create a Custom Quarantine Policy in Microsoft Deferent for Office 365
Creating a custom quarantine policy in Microsoft Defender for Office 365 involves configuring advanced threat protection settings to protect your organization’s email environment.
Read MoreHow to use the Microsoft Defender portal to assign Strict preset security policies to users
Strict preset security policies typically refer to predefined rules and guidelines designed to enhance security measures within an organization or system. These policies safeguard sensitive data, prevent unauthorized access, and mitigate potential security threats.
Read MoreHow to use the Microsoft Defender portal to assign Standard preset security policies to users
Microsoft Defender for Office 365 provides preset security policies to help organizations protect their Office 365 environment from various threats. These preset policies are designed to offer baseline protection and can be customized according to the organization’s specific requirements.
Read MoreMicrosoft Defender for Office 365-Configure trusted ARC sealers email authentication for Microsoft 365 Custom domains
Authenticated Received Chain (ARC) is a mechanism used in email authentication protocols to address the issues of message forwarding and intermediary handling of emails. It is designed to improve the reliability and security of email authentication systems like SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail).
Read MoreMicrosoft Defender for Office 365 – Configure DMARC email authentication for Microsoft 365 Custom Domains
Domain-based Message Authentication, Reporting, and Conformance (DMARC) builds upon SPF and DKIM to give domain owners greater control over how recipient servers handle their email messages. With DMARC, domain owners can specify policies instructing recipient servers on how to handle emails that fail SPF or DKIM checks. DMARC also enables domain owners to receive reports on email authentication results, allowing them to monitor and improve their email security posture.
Read MoreMicrosoft Defender for Office 365 – Configure DKIM email authentication for Microsoft 365 Custom domains
DomainKeys Identified Mail (DKIM) allows email senders to sign their outgoing emails digitally using cryptographic signatures. These signatures are stored as DKIM records in the domain’s DNS settings. Recipients’ mail servers can then use these signatures to verify that the email content has not been tampered with and originated from an authorized sender.
Read More