| Blog roll for M365 admins |
|
|
---|
|
Supporting IT Professionals is all we do |
|
This week Microsoft clarified an important licensing concept for multi-domain tenants. One person - one license. This applies to many scenarios. MSP's and IT professionals need to skill up in AI and by that I mean to learn how to help thier customer use it effectively. This is the IT skill most in demand at the moment. Except for security. In the four things to do section, I've focused on preventing Token theft. It's critical.
Over at Third Tier, I'll be speaking at the Millionaire Mastermind event in Florida this week on Copilot and we'll open up registrations for our Defender XDR learning group this week too.
Hope you enjoy and tell your friends to subscribe too. - Amy |
|
|
|
---|
|
Microsoft Entra ID Governance licensing clarifications |
In the past few weeks, we've announced the general availability of Microsoft Entra External ID and Microsoft Entra ID multi-tenant collaboration. We've |
|
techcommunity.microsoft.com |
| Why AI sometimes gets it wrong - and big strides to address it |
The study led to a new way to reduce instances when large language models (LLMs) deviate from the data given to them. |
|
news.microsoft.com |
|
---|
|
10 more AI terms everyone should know |
Since generative AI catapulted into the mainstream at the end of 2022, most of us have gained a basic understanding of the technology and how it uses natural language to help us interact more easily with computers. Some of us can even throw around buzzwords like "prompts" and "machine learning" over coffee with friends. |
|
news.microsoft.com |
| New tools for innkeepers, weavers and florists: How AI is reaching the farthest edges of Ireland - Source EMEA |
On the remote western Irish isle of Inishbofin, islanders including an innkeeper, a weaver and a florist learned how they could use AI to help with everything from invoicing to better marketing pitches. |
|
news.microsoft.com |
|
---|
|
| How to prevent weak MFA session token theft |
Microsoft recently published an analysis of the techniques used by one popular phishing-as-a-service provider. We'll take that analysis and implement a solution based upon it |
|
|
|
---|
|
Four things to do this week *Break token theft chains* |
|
|
---|
|
| Configure Credential Guard - Windows Security |
Learn how to configure Credential Guard using MDM, Group Policy, or the registry. |
|
learn.microsoft.com |
|
---|
|
Token protection in Microsoft Entra Conditional Access |
Learn how to use token protection in Conditional Access policies. |
|
learn.microsoft.com |
| Learn to investigate, contain, and remediate token theft attacks in an organization. |
|
learn.microsoft.com |
|
---|
|
|
|