Backup & Recovery for Entra ID | Architektur & Setup
Previously, the recovery of identity objects in Microsoft 365 was primarily limited to the 30-day recycle bin for soft-deleted users and groups. Configuration objects such as Cond…
Schlagwort #IT Security — 23 Treffer — Alle Beiträge, die mit diesem Schlagwort versehen wurden – praktisch für Serienthemen, Tools, Releases und How-to-Cluster.
Previously, the recovery of identity objects in Microsoft 365 was primarily limited to the 30-day recycle bin for soft-deleted users and groups. Configuration objects such as Cond…
The previous practice, in which AI note-takers and recording bots could slip into Microsoft Teams meetings almost unnoticed, ends in May 2026. With roadmap ID 558107, Microsoft is…
Classic DLP rules often fail in the face of reality: rigid blockades are frustrating, generic warnings are clicked away. The goal is context-sensitive user guidance that actively …
You've defined your Mail DLP strategy in the last guide "Exchange Online: Blocking, Encrypting & Approving" and the basic foundation of your rules is in place. Now let's focus on …
DLP Incident LifecycleAnyone who activates DLP policies but ignores the alerts is engaging in compliance theater. A DLP system is not a static shield, but a sensor network that re…
What began as an optional feature in 2024 is now deeply anchored in the system's core: the Copilot is omnipresent. On modern hardware (Copilot+ PCs), Windows Recall is also availa…
Email is the dinosaur of digital communication – and despite Teams or Slack, it's still the number one gateway for data loss. Whether it's a wrong recipient in the "Cc", a thought…
In the articles "Sensitivity Labels: Architecture & Practice" and "Automated Application of Sensitivity Labels", we looked at how you can classify data using sensitivity labels (t…
Security in the age of generative AI often resembles an endless hare and hedgehog race. As soon as the storage locations are secured, data finds new, creative ways into the models…
Your guide to security, compliance, and governanceHere you can find out how to configure your tenant not only productively, but also securely and GDPR-compliant. We'll walk you th…