Author name: dom

Defense In-Depth Exchange Security MDO

Defender for Office 365 Dual Use / Defense In-Depth

This brief post highlights the differences in feature availability depending on how your MX records are configured—specifically, whether they point directly to Exchange Online Protection (EOP), which is the recommended setup, or if you’re routing mail through a third-party email filtering solution before Microsoft Defender for Office 365 (MDO). While this overview is intentionally concise, […]

Defender for Office 365 Dual Use / Defense In-Depth Read Post »

MTO Sentinel SIEM

Mastering Multi-Tenant Security: Microsoft Sentinel Strategies for Distributed and Centralized Setups

In today’s interconnected world, managing cybersecurity across multiple tenants is both a challenge and an opportunity. For organizations and Managed Service Providers (MSPs) working with countless customers—each with their own Azure and Microsoft 365 tenant—Microsoft Sentinel stands out as a powerful tool for ensuring robust security. Whether you’re scaling Sentinel deployments across distributed tenants or

Mastering Multi-Tenant Security: Microsoft Sentinel Strategies for Distributed and Centralized Setups Read Post »

Exchange Security

Exchange Online Security Best Practices – 10 Tips From The Field

This article contain security best practices to use when you’re designing, deploying, and managing your Exchange Online solution by using Microsoft 365. The best practices are intended to be a resource for IT pros. This might include designers, architects, developers, and testers who build and work with secure Exchange Online solutions.

Exchange Online Security Best Practices – 10 Tips From The Field Read Post »

Exchange Security

Exchange Hybrid Security Best Practices – 7 Tips From The Field

This article contain security best practices to use when you’re designing, deploying, and managing your Exchange Hybrid solution by using on-premises Exchange and Microsoft 365. The best practices are intended to be a resource for IT pros. This might include designers, architects, developers, and testers who build and work with secure Exchange Hybrid solutions.

Exchange Hybrid Security Best Practices – 7 Tips From The Field Read Post »

Scroll to Top