TTlogo250

Blog roll for M365 admins

Supporting IT Professionals is all we do

I'm proud to announce that our Defender XDR Learning Group is now open for registration. We have purposely scheduled this to accomodate the time zones in Australia and the USA in morning and afternoon sessions. And we welcome a professional Australian instructor to the mix. It'll be run just like the Intune Learning Group because the feedback was tremendous.

There was a lot to choose from this week, so I decided to focus on what Microsoft is doing for different industries. You might find something valuable there when talking to your clients. In the what to do this week section inspired by the car dealership debacle, we focus on recovery. 

And I'm introducing a sponsored section. We kick this off by featuring my good friend Susan Bradley's excellent newsletter, Ask Woody. They generate long form articles on home and business tech with a little finance and legislation thrown in from time to time. I'm a subscriber. There's a free and a plus version. You'll want plus.

Hope you enjoy and tell your friends to subscribe too. - Amy

June 2024

Tech and Medicine

This month, we’re sharing a progress note on the confluence of tech and medicine, detailing how certain solutions are delivering a shot in the arm for personal wellness – and for innovations across health care.

faviconwww.linkedin.com

Screenshot 2024-07-01 174553

Mining industry with AI

Mining companies are navigating the complex challenges reshaping industries worldwide. The global energy transition is at the forefront, with investors calling for sustainable practices and heightened accountability.

faviconwww.microsoft.com

Screenshot 2024-07-01 174842

Financial services cyber resilience 

The severity of cyberattacks has grown exponentially in the past decade, with nation-states and criminal organizations frequently targeting the financial services sector, sometimes to devastating effect.

faviconwww.microsoft.com

Screenshot 2024-07-01 175308

Central bank digital currencies

Cash is no longer king. In fact, most of the money in circulation today is in digital form, and for obvious reasons. The ease, flexibility, and convenience that come with digital payments. 

faviconwww.microsoft.com

Check out Ask Woody

FREE EDITION: Whom can you trust with your data? @ AskWoody

Whom can you trust with your data? @ AskWoody

ON SECURITY: Whom can you trust with your data?
PUBLIC DEFENDER: Google is declaring war on clickbait — but who’s winning?
SOFTWARE: Windows Live Photo Gallery
HARDWARE: Terabyte Update 2024

faviconwww.askwoody.com

Plus Membership @ AskWoody

Plus Membership @ AskWoody

Weekly, in-depth PC info and help from experts you trust, with clear explanations for all versions of Windows, Office, and beyond. AskWoody Plus Newsletter. Breaking Microsoft, industry, patch, and bug news via emailed AskWoody Plus Alerts. Downloadable reports, including freshly updated Patch Watch lists.

faviconwww.askwoody.com

From Third Tier

secta
Learning Defender XDR group

Learning Defender XDR group. A course like no other!

We’ll be meeting for 10 sessions to discuss chapter content, test configurations and deployments, and work in our lab tenant(s). The sessions will be recorded, and we may build some shared best practice guides and SOPs as an outgrowth of our work together. The instructors will facilitate the learning sessions and will provide supplemental resources to help us go deeper into the content. 

www.thirdtier.net

Four things to do this week
*Recover*

Detect suspicious processes running on hidden desktops

Detect suspicious processes running on hidden desktops

Learn more about "Hidden" Desktops and expand your investigation, hunting, and detection capabilities using a new "DesktopName" signal.

favicontechcommunity.microsoft.com

Effective strategies for conducting Mass Password Resets during cybersecurity incidents

Effective strategies for conducting Mass Password Resets during cybersecurity incidents

A mass password reset is not always required, but it is important to identify the circumstances under which it is.

favicontechcommunity.microsoft.com

Overview of attack paths in Microsoft Security Exposure Management - Microsoft Security Exposure Management

Overview of attack paths in Microsoft Security Exposure Management 

Attack paths help you to proactively identify and visualize potential routes that attackers can exploit using vulnerabilities, gaps, and misconfigurations. 

faviconlearn.microsoft.com

Restore data in Microsoft 365 Backup (Preview)

Restore data in Microsoft 365 Backup in Mass

Administrators can restore multiple OneDrive accounts, SharePoint sites, and Exchange mailbox content from specific prior points in time

faviconlearn.microsoft.com

Follow Us

Follow us to be the first to know about our newest products, upcoming events, and special offers.

                 

Contact Us

Third Tier 4107 Auburn Dr, Royal Oak, Mi 48073, United States amy@thirdtier.net

Sign up for this newsletter
Unsubscribe