Category: Auditing


Using Risk-based Multi-Factor Authentication – Reporting

In the last post: Using Risk-based Multi-Factor Authentication, I talked about setting up the risk-based policies, in this post we will look at the reporting and alerting mechanisms that are available. Within the Azure...


How secure is #Office365 against cyber-threats?

How secure is Office 365 against cyber-threats? One of the questions I get asked frequently is this. Even with Microsoft providing documentation, guidance and speaking at conference saying how secure it is, we still...