Category: Azure
Welcome to the second section of my SC-200 study guide. In this section I will go through the following content: And didn’t have time (space) to include the following: And will be covering them in the next section, not to…
Welcome to the first part of my SC-200 study guide. In this section I will go through the following content: What benefits you get from Defender for Office 365? How to try out Defender? As an existing Microsoft 365 customer,…
Two upcoming changes coming to the tenant near you! Number matching will be enforced. Also SSPR and legacy MFA policies will be deprecated (phased). Don’t act too late on either of them. If you need to educate users, you can…
Have you seen Azure Chaos Studio? If not, soon you have. What is Chaos Studio? Chaos Studio is a managed service that employs chaos engineering to assist you in measuring, understanding, and improving the resilience of your cloud applications and…
The new Microsoft 365 Defender RBAC model makes it simple to migrate existing permissions from the individual supported RBAC models to the new RBAC model. All permissions listed within the Microsoft 365 Defender RBAC model align to permissions in the…
Well, finally it’s time for a new part to my study series for Microsoft Security certifications. I have published guides for SC-100 and SC-300 and now it’s times for the “little” ‘sis between. Hopefully you will find this helpful, giving…
Offline files This time I wanted to write about a little bit different headline and that headline is Offline files. Offline files in Windows allow users to access files stored on a network share even when they are not connected…
Microsoft’s Cross-tenant storyline Microsoft has a good road map so far on the Cross-tenant access features, no more External users or switching between Teams tenants when you need access to multiple ones and we all know we do need multiple…
What is IPv6? First time I was introduced to IPv6 was in a classroom training ages ago. The instructor said that IPv4 has IP-addresses the same amount as a wheelbarrow has grains of salt and IPv6 has the amount of…
Why? Like we all know Identity is a hot topic after the MFA fatigue methods or discovering and attacking our resources as external or internal entities but the often overlooked aspect of security is inside the data layer. You could…