We are working on deploying Windows Defender for Endpoint on our servers and VMware (Broadcom) VDI. This is a step towards enhancing our security posture and...
Continue reading...jayb
Staying Ahead of Insider Threats with Microsoft Insider Risk Management
Implementing Microsoft Insider Risk Management can help you proactively manage and mitigate risks from within your organization, ensuring better security and compliance. Take a look at...
Continue reading...How to use labels in o365
In Office 365 (Microsoft 365), tagging or labeling a document is done using Sensitivity Labels or Retention Labels. Here’s a brief guide on how to do...
Continue reading...Information protection policies
The page on Microsoft Defender for Cloud Apps information protection policies provides guidance on how to detect and prevent the external sharing of sensitive data, how...
Continue reading...Protecting Files on sharepoint and onedrive
I’m working through the deployment and policies for onedrive/sharepoint in our enviroment. Microsoft has a ton of options, and ways to collect and report on files,...
Continue reading...Windows Deployment with the Next Generation of Windows Autopilot
Microsoft’s latest update to Windows Autopilot brings significant enhancements to the deployment process of Windows devices, catering to the needs of modern IT environments. This next-generation...
Continue reading...Shrink PowerPoint files
Need to reduce the size of your PowerPoint file that contain a large number of pictures. Give this a try Compress pictures in your presentation Thanks...
Continue reading...Setting the exchange online max send and receive size
Quick post today around setting exchange online max send and receive size. It can be set using the GUI in mailbox properties. I prefer to use...
Continue reading...How to find your Microsoft Exchange build number
When documenting your environment, it’s important to keep track of the build number of your Exchange server. To get the correct build number installed on your...
Continue reading...Micrsoft Defender for Endpoints
We use Microsoft Defender for endpoints on our physical workstations. I’m now looking at it for our servers. The servers are currently using SCCM to configure,...
Continue reading...