System administrator with 14 years of practical experience. Specializes in Microsoft products such as Exchange Server, Active Directory, Microsoft 365 and Azure.
Microsoft Exchange

Multi-Layered Defense: Enhance Exchange Server Security

Multi-Layered Defense: Enhance Exchange Server Security. Email systems are traditionally one of the main targets for cybercriminals. Mail system itself and end users are at risk. Protection of email servers, such as Microsoft Exchange Server, requires an integrated approach that includes many layers. Usage of firewalls for the network protection, spam filters to inspect the […]

Microsoft Exchange

Secure Email Communication with Microsoft Exchange Server

Secure Email Communication with Microsoft Exchange Server . Microsoft Exchange Server 2019 supports multiple ways to secure email communication. Most of them are enabled by default and don’t require any configuration from the IT personnel. For example, all the internal communications between email clients and Exchange Servers, between servers and between services within the server […]

Azure AD

Entra ID Auditing Insider Threats: Detect Anomalous User Behaviour

Entra ID Auditing Insider Threats: Detect Anomalous User Behaviour. What, if the user credentials were stolen and the malicious actors successfully pass authentication and authorization? In this case, all the data that is accessible by the compromised credentials are at risk of an Insider Threat. To protect against such threats, enterprises usually use Insider Threat […]

Azure AD

Detecting Security Incidents with Microsoft Entra ID Auditing

Detecting Security Incidents with Microsoft Entra ID Auditing. Understanding the core functions and potential threats related to Microsoft Entra ID environment is essential for maintaining robust security measures. One of the fundamental tools in this quest is the Audit log, a repository of historical records capturing user activities within the organization. This article shows aspects […]

Cybersecurity

Azure Security Monitoring and Alerting of Security Events

Azure Security Monitoring and Alerting of Security Events. Securing the Azure environment demands proactive measures and also an effective system for monitoring and responding to security events in real-time. Monitoring of Azure resources detects, analyses, and acts upon potential threats. This guide lays out the essential steps to configure a comprehensive security monitoring infrastructure within […]

Cybersecurity

IAM Best Practices for User Provisioning and Deprovisioning

IAM Best Practices for User Provisioning and Deprovisioning. In the rapidly evolving landscape of cybersecurity, effective Identity and Access Management (IAM) practices are integral for safeguarding organizations against potential threats and vulnerabilities. One crucial aspect of IAM is user provisioning and deprovisioning, which entails granting and revoking access to resources, respectively. For large enterprises, proper […]

Microsoft Exchange

Exchange Server 2019 Monitoring Best Practices

Exchange Server 2019 Monitoring Best Practices. Monitoring is the cornerstone of effective IT management, regardless of server location. Be it within a data center or in the cloud. While routine server performance and availability metrics remain essential, certain workloads like Exchange Server 2019 demand a specialized approach to monitoring for optimal functionality and reliability. In […]

Active Directory

Active Directory Auditing for Regulatory Compliance Best Practices

Active Directory Auditing for Regulatory Compliance Best Practices. In the realm of IT security and compliance, Active Directory (AD) stands as a pivotal component within organizations, centralizing user management and system configurations. Therefore, Active Directory configuration is a mandatory part of the cybersecurity audit. Maintaining the integrity, security, and compliance of AD is critical and […]

Office 365

How to – Office 365 to Office 365 Migration (Step by Step)

How to – Office 365 to Office 365 Migration (Step by Step). Moving from one Office 365 environment to another demands careful planning and execution to ensure a seamless transition without compromising data integrity. This comprehensive guide outlines the step-by-step process for an Office 365 cross-tenant mailbox migration, emphasizing essential stages. By following these detailed […]

Office 365

Secure Office 365 Email: Best Practices / Threat Prevention

Secure Office 365 Email: Best Practices / Threat Prevention. Attacking through email communications remains one of the most common types of cyber attacks, therefore securing email communication is one of the most important tasks for IT administrators. This article focuses on best practices and threat prevention strategies for securing Microsoft 365 email communication. From spam […]