Do these SIX configuration checks TODAY in your MICROSOFT 365 subscription

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 ส.ค. 2024
  • If you're running a small, medium or large business, you're probably too busy to worry about the security in your email, document and file sharing applications, but that's just not good enough.
    If you're using Microsoft 365 as an administrator or as a business owner, here are six configuration checks you should do on your Microsoft 365 tenant today to make sure you have some of the very easily security configuration settings in places.
    Socials:
    LinkedIn: / eliasatie
    Insta: / eliasatie0
    TikTok: / eliasatiecc

ความคิดเห็น • 9

  • @Fahds87
    @Fahds87 2 ปีที่แล้ว +1

    Awesome. Please produce more of these types of videos.

    • @CloudContext
      @CloudContext  2 ปีที่แล้ว +1

      Thank you for your feedback Fayas. Will do!

    • @Fahds87
      @Fahds87 2 ปีที่แล้ว +1

      @@CloudContext Thanks for your response. I am planning my Azure Cloud Architect path after I complete my ITIL certification, wish me luck. When are you uploading the next video on the home lab extension series?? 😁

    • @CloudContext
      @CloudContext  2 ปีที่แล้ว +1

      @@Fahds87 Good luck! I'm glad you asked - hopefully in the next week or so!

  • @rendellgiles1362
    @rendellgiles1362 2 ปีที่แล้ว +1

    6 for 6 👍

  • @Mkt6040
    @Mkt6040 2 ปีที่แล้ว +1

    Least permissive for sharing does more harm than good in my experience. Users would resort to 3rd party apps (Dropbox, google sheets, google drive), move corporate data into them and share externally. As an MSP this is not ideal as you’ll lose control of where data is stored and consumed(fragmentation). Instead, a more practical way is to set default sharing as only share inside the Org and they can manually change it to anyone with the link every time they want to send externally. This also means that you can extract a monthly report of files with such links and that would be a more accurate indication of files shared externally.

    • @CloudContext
      @CloudContext  2 ปีที่แล้ว +1

      Agreed. I'd add that it should be assessed case by case as well. A lot of the time we use a list of allowed domains which works well too.

  • @AnchormanMazdaXBL
    @AnchormanMazdaXBL 2 ปีที่แล้ว +1

    Are there any risks that the tools available to pick up insecure or risky networks can be circumvented? So hackers and the like can get around their checks?

    • @CloudContext
      @CloudContext  2 ปีที่แล้ว +1

      That is a good question. Attackers definitely have ways to spoof their location but you'd hope that they would be detected somewhere down the line.