Office of Enterprise Productivity & Security, South Central Region
Insights from the frontlines of real-world digital transformation
Stop Phishing Attacks with Mail Flow Rules in Exchange Online
Companies are more concerned than ever about email security. Targeted phishing attacks are becoming...
Date: 05/27/2017
Multi Factor Authentication in Challenging Environments (like no Internet access)
Your password probably starts with a capital letter and ends with either a number or exclamation...
Date: 04/24/2017
Implementing Conditional Access with Exchange Online (updated using Azure Portal)
Implementing Conditional Access with Exchange Online (updated using Azure Portal) I am updating this...
Date: 01/09/2017
Secure Productive Enterprise: 9 Modern Security & Productivity Pitfalls
Written by John Stasick (Microsoft) and Jake Mowrer (Microsoft) Introduction: A Critical Question, A...
Date: 12/19/2016
Implementing Conditional Access with Exchange Online
In this Blog Post, I will step through the process to enable the different features of Conditional...
Date: 12/13/2016
Mobile Devices and Modern Threats
I had a customer the other day look at my Android device and ask me “Why do you use Android when...
Date: 10/18/2016
Microsoft Cloud App Security - Part 1: Credit Card Numbers
Microsoft Cloud App Security (CAS)...
Date: 08/22/2016
The 3 Security Questions You Must Ask Every Quarter
Microsoft processes over a billion authentications per day and monitors tens of thousands of...
Date: 08/22/2016
Welcome to the SCD OoEP&S Blog!
Right about now you might be thinking: "Uh, great... more Microsoft acronyms? What the heck is SCD...
Date: 08/15/2016