What roles should I add for GDAP?
If you have been following along with my blog, you know I have written a few articles on Granular Delegated Admin Privileges or GDAP. If you are unfamiliar with what…
If you have been following along with my blog, you know I have written a few articles on Granular Delegated Admin Privileges or GDAP. If you are unfamiliar with what…
This month, Microsoft had a technical release of GDAP or Granular Delegated Admin Privileges for M365 workloads (Azure coming later this year). If you checked out my previous article, you…
Traditionally, both distributors (Microsoft Indirect Providers/CSP Tier 1s) and MSPs (Indirect Resellers) have established Delegated Admin Privileges (DAP) with all downstream customers. This allows distributors to license customer tenants and…
Recently, Microsoft has announced the introduction of granular delegated admin privileges, or GDAP, coming early 2022. These changes are coming to address supply chain attacks (like Nobelium). Traditionally, both distributors…
Recently, Microsoft has announced a fork of the Defender for Endpoint offering into two plans. Defender for Endpoint has traditionally been an enterprise grade solution and only included in higher…
Uploading 52% Purpose The purpose of this article is to explain Security Defaults and end of life for baseline policies. I give you recommended actions to take to replace these…
We can leverage logic apps in Azure to build workflows across our 365 customers. This allows us to create triggers that cause other actions to take place. Recently, Microsoft introduced…
Uploading 52% The purpose of this guide is to lay out the steps for configuring security alerts in a Microsoft Teams channel which is supported through the Microsoft Security Graph…
To comply with business standards and industry regulations, organizations need to protect sensitive information and prevent its inadvertent disclosure. Examples of sensitive information that you might want to prevent from…
Office 365’s Advanced Threat Protection helps protect your organization from malicious attacks. This tool can be used to harden your 365 environment and decrease the likelihood of spam and phishing…