fbpx

System administrator with 14 years of practical experience. Specializes in Microsoft products such as Exchange Server, Active Directory, Microsoft 365 and Azure.
Azure AD

Entra ID Auditing Insider Threats: Detect Anomalous User Behaviour

Entra ID Auditing Insider Threats: Detect Anomalous User Behaviour. What, if the user credentials were stolen and the malicious actors successfully pass authentication and authorization? In this case, all the data that is accessible by the compromised credentials are at risk of an Insider Threat. To protect against such threats, enterprises usually use Insider Threat […]

Azure AD

Detecting Security Incidents with Microsoft Entra ID Auditing

Detecting Security Incidents with Microsoft Entra ID Auditing. Understanding the core functions and potential threats related to Microsoft Entra ID environment is essential for maintaining robust security measures. One of the fundamental tools in this quest is the Audit log, a repository of historical records capturing user activities within the organization. This article shows aspects […]

Cybersecurity

Azure Security Monitoring and Alerting of Security Events

Azure Security Monitoring and Alerting of Security Events. Securing the Azure environment demands proactive measures and also an effective system for monitoring and responding to security events in real-time. Monitoring of Azure resources detects, analyses, and acts upon potential threats. This guide lays out the essential steps to configure a comprehensive security monitoring infrastructure within […]

Cybersecurity

IAM Best Practices for User Provisioning and Deprovisioning

IAM Best Practices for User Provisioning and Deprovisioning. In the rapidly evolving landscape of cybersecurity, effective Identity and Access Management (IAM) practices are integral for safeguarding organizations against potential threats and vulnerabilities. One crucial aspect of IAM is user provisioning and deprovisioning, which entails granting and revoking access to resources, respectively. For large enterprises, proper […]

Microsoft Exchange

Exchange Server 2019 Monitoring Best Practices

Exchange Server 2019 Monitoring Best Practices. Monitoring is the cornerstone of effective IT management, regardless of server location. Be it within a data center or in the cloud. While routine server performance and availability metrics remain essential, certain workloads like Exchange Server 2019 demand a specialized approach to monitoring for optimal functionality and reliability. In […]

Active Directory

Active Directory Auditing for Regulatory Compliance Best Practices

Active Directory Auditing for Regulatory Compliance Best Practices. In the realm of IT security and compliance, Active Directory (AD) stands as a pivotal component within organizations, centralizing user management and system configurations. Therefore, Active Directory configuration is a mandatory part of the cybersecurity audit. Maintaining the integrity, security, and compliance of AD is critical and […]

Office 365

How to – Office 365 to Office 365 Migration (Step by Step)

How to – Office 365 to Office 365 Migration (Step by Step). Moving from one Office 365 environment to another demands careful planning and execution to ensure a seamless transition without compromising data integrity. This comprehensive guide outlines the step-by-step process for an Office 365 cross-tenant mailbox migration, emphasizing essential stages. By following these detailed […]

Office 365

Secure Office 365 Email: Best Practices / Threat Prevention

Secure Office 365 Email: Best Practices / Threat Prevention. Attacking through email communications remains one of the most common types of cyber attacks, therefore securing email communication is one of the most important tasks for IT administrators. This article focuses on best practices and threat prevention strategies for securing Microsoft 365 email communication. From spam […]

Active Directory

Active Directory Disaster Recovery (Best Practices)

Active Directory Disaster Recovery (Best Practices). Active Directory (AD) plays a critical role in the infrastructure of many organizations, serving as the central repository for user accounts, permissions, and network configurations. However, unforeseen disasters such as fires, floods, malware attacks, or even misconfiguration disrupt the operation of AD, leading to data loss and downtime. To […]

Active Directory

Active Directory Backup Strategies and Tools (Best Practices)

Active Directory Backup Strategies and Tools (Best Practices). Active Directory stands as a cornerstone of enterprise IT infrastructure, serving as a robust LDAP solution that underpins crucial services like authentication and DNS. The seamless operation of these services is vital for business continuity, making the reliability of Active Directory a critical aspect of IT service […]

  • 1
  • 2