How To Navigate Microsoft 365 Audit Logs
From tracking down where users are logging in from, to monitoring your DLP policies, the unified audit log in Microsoft 365 is a powerful tool to have in your repertoire as a Micro...
Read MoreTop 18 Tips to Secure SSH on Linux
SSH, or Secure Shell, is widely used to connect to Linux servers — but like any popular service or protocol, it’s also a common attack vector. Since SSH allows you to establ...
Read MoreOffice 365 Audit Log Retention: Why It Matters and Best Practices
Microsoft 365 is used by organizations around the world for email and the Office productivity suite. This is a cloud-based product suite by Microsoft and has many options for monit...
Read MoreA Guide To Microsoft Azure Security Logging
Azure is an attractive option for organizations that use Microsoft 365 and other related Microsoft products, due to the various integrations with Azure and Azure Active Directory (...
Read More