Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Wednesday, 25 August 2021

Automatic redirection from Office 365 Security and Compliance Center to Microsoft 365 Defender

 Users of the legacy Office 365 Security and () Compliance center will soon be routed to Microsoft 365 Defender; this will include all security workflows, including Alerts, Threat Management, and Reports.


Security-related items in the Office 365 Security and Compliance center will not be redirected to Microsoft 365 Defender. Compliance solutions will be redirected to Microsoft 365 Compliance Center (March 2021, MC244886).



Earlier this year, Microsoft started migrating security workflows to the Microsoft 365 Defender portal. 

 

For customers who have already enabled redirect as part of the previous communication during Microsoft's new homepage Defender for 365, the automatic redirect will now include alerts and redirect alert policies, in addition to any previously redirected.


For more information, please refer to this redirection support document.



Sunday, 11 July 2021

Know How to Protect Microsoft 365 from On-Premises threats and attacks

 A lot of organisations that use Microsoft Office 365 apply various protection methods to stop malware, spam, and viruses, but they are still vulnerable to sophisticated on-premises threats and attacks. These organisations need a defence system that is easy to use and cost-effective.

Organisations link their personal networks to Microsoft 365 so that their users, devices, and applications can have benefits. However, these private networks can be compromised, that may lead to dire consequences. And there are examples showing that on-premises compromise can spread to the cloud.

Now, because Microsoft 365 acts as the vital system for many companies, it is essential to protect it from compromised on-premises infrastructure- but how?

You can configure your systems to protect your Microsoft 365 cloud environment from on-premises compromise and for that take care of the threat vectors


Read More