Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Insights from the frontlines of real-world digital transformation
Stop Phishing Attacks with Mail Flow Rules in Exchange Online
Companies are more concerned than ever about email security. Targeted phishing attacks are becoming...
Date: 05/27/2017
Multi Factor Authentication in Challenging Environments (like no Internet access)
Your password probably starts with a capital letter and ends with either a number or exclamation...
Date: 04/24/2017
Implementing Conditional Access with Exchange Online (updated using Azure Portal)
Implementing Conditional Access with Exchange Online (updated using Azure Portal) I am updating this...
Date: 01/09/2017
Secure Productive Enterprise: 9 Modern Security & Productivity Pitfalls
Written by John Stasick (Microsoft) and Jake Mowrer (Microsoft) Introduction: A Critical Question, A...
Date: 12/19/2016
Implementing Conditional Access with Exchange Online
In this Blog Post, I will step through the process to enable the different features of Conditional...
Date: 12/13/2016
Mobile Devices and Modern Threats
I had a customer the other day look at my Android device and ask me “Why do you use Android when...
Date: 10/18/2016
Microsoft Cloud App Security - Part 1: Credit Card Numbers
Microsoft Cloud App Security (CAS)...
Date: 08/22/2016
The 3 Security Questions You Must Ask Every Quarter
Microsoft processes over a billion authentications per day and monitors tens of thousands of...
Date: 08/22/2016
Welcome to the SCD OoEP&S Blog!
Right about now you might be thinking: "Uh, great... more Microsoft acronyms? What the heck is SCD...
Date: 08/15/2016