Advertisement · 728 × 90

Posts by Ru Campbell

Post image

New webinar THIS WEDNESDAY. If you want to really know what really secures the (blank) out of Entra in an hour, here's how.

Big thanks to my marketing friends at @Threatscape for GenAI'ing me some hair back in this thumbnail too.

REGISTER: www.threatscape.com/...

2 months ago 2 0 0 1

Microsoft I need you to understand that as long as I'm breathing in and breathing out I will never want Outlook or Teams to open a SharePoint link in the browser ever just always give me the app.

2 months ago 4 0 0 0
Post image

Who wants to join my support group for losing sleep over token theft?

3 months ago 1 0 0 0

Immutable law of Entra: you don’t understand workload identities as well as you think you do, even when you know you don't understand them as well as you think you do.

3 months ago 2 0 0 0

Working theory. Scrolling LinkedIn, full of obvious AI slop, made me wonder if this is Dunning-Kruger for writing: bad writers and readers don’t see how obvious their slop is.

3 months ago 3 0 0 0

7. Defend against excessive privileges
8. Defend against hybrid identity attack paths
9. Defend against AI-driven threats
10. Defend against visibility gaps

It doesn't cover everything. But if you had to answer, "How do I understand Microsoft 365 security?", this is my attempt.

4 months ago 2 1 1 0

1. Defend against token theft and user compromise
2. Defend against unmanaged or risky devices
3. Defend against data exfiltration
4. Defend against business email compromise
5. Defend against app-to-app access and consent risk
6. Defend against endpoint risks

4 months ago 1 0 1 0
Advertisement

Inspired by other prioritisation and awareness frameworks such as the Australian Essential 8, this is my pragmatic collection of key considerations ("defences") organizations should prioritize to address Microsoft 365 security (that is, secure the platform, and sweat the tooling).

4 months ago 1 0 1 0

The latter can be used to achieve the former, as well as other platforms.

4 months ago 0 0 1 0
Preview
Microsoft 365: The Essential 10 Security Considerations - Ru Campbell MVP When we talk about Microsoft 365 security, we are talking about two things: The latter can be used to achieve the former, as well as other (non-Microsoft 365) platforms. For example, using Defender for Endpoint on a Linux server in AWS, or using Entra for single sign on to Salesforce. Given its omnipresence in enterprise IT, Microsoft 365 security’s vastness (and value) needs to be front-of-mind for all tenant administrators. The Essential 10 is…

New post: focusing on the key biggest Microsoft 365 security considerations.

READ: campbell.scot/micros...

When we talk about Microsoft 365 security, we are talking about two things: (a) securing Microsoft 365 the platform, (b) using Microsoft 365 security tooling.

4 months ago 5 3 1 0
Post image

Catching up with the AI Ignite news is like learning a new language.

"Microsoft Badaboop is part of Microsoft Zublebeep, which you can find in Microsoft Talahoo, the Microsoft Ziggledeep for AI."

(I do love it though.)

4 months ago 2 2 0 0
Post image

Join me, @WillTheFrenchie, and @WelkasWorld TONIGHT, 1800-2000 UTC for the latest Microsoft security news and two awesome speakers:

• @RyanJohnMurphy4 – The new Microsoft eDiscovery UI and UX
• @sfennah – The Oversharing Solution Blueprint

REGISTER: www.meetup.com/m365s...

4 months ago 0 0 0 0
Post image

Actual screenshot from the Ignite Book of News.

5 months ago 0 0 1 0
Post image

New video: 5 common Entra ID guests mistakes (Entra B2B)

• excessive directory visibility
• ignored cross-tenant defaults
• untrusted MFA & device states
• open SharePoint sharing
• no guest lifecycle

There's tons more! But here's a starter

WATCH: youtu.be/AXuj-U9p3jU

5 months ago 4 1 0 0
Advertisement
Post image

ICYMI: Microsoft Authenticator for iOS + Android will detect, prevent, then wipe Entra creds on rooted devices (MC1179154).

• Phase 1 (warn mode) begins February '26
• followed by Phase 2 (block mode)
• then Phase 3 (wipes Entra creds)
• expected to be completed ~April '26

5 months ago 2 1 0 0
Post image

The unified Defender for Identity sensor as part of Defender for Endpoint is now generally available :-)

Docs: learn.microsoft.com/...

5 months ago 4 0 0 0
Post image

Next M365 S&C UG - Oct 29, 18:00 UTC

- @JoanneCKlein & Anna Bordioug: Two Sides of the Data Coin: Data Protection vs. Data Retention in Practice
- @brand_gefahr: How Much is the Phish? An End-to-End Perspective on Phishing Operation

REGISTER: www.meetup.com/m365s...

5 months ago 1 0 0 0
Post image

New video: new Defender detections for jailbreaks + prompt injection in Microsoft 365 Copilot

• recap on what jailbreaks and prompt injections are (examples)
• how they show up in Defender for Cloud Apps/hunting and Purview

WATCH: youtu.be/iCRYJ32fwro

6 months ago 1 0 0 0
Post image

New video: deep dive on building Intune security baselines that actually work with legend of the game @SkipToEndpoint

• why so many baselines are just plain bad
• balancing security / usability
• when to customise
• how OIB makes it practical

WATCH: youtu.be/Xe32TzHgueA

6 months ago 4 1 1 0
Post image

Still time to sign up at aka.ms/EntraZeroTrust for the rest of the Entra Zero Trust Practitioner series. On 9 October, I'm joining @merill, @nathanmcnulty, and more for a live Q+A on everything Entra identity and network access.

6 months ago 1 0 0 0
Post image

Among others in the Microsoft 365 stack, there is a new Defender icon!

See them all: microsoft.design/art...

6 months ago 2 0 0 0
Advertisement
Post image

New video: deep dive into Entra ID Governance with MVP @MattChatt42.

• why identity is the front door
• sources of authority (HR vs AD)
• joiner/mover/leaver workflows
• PowerShell scripts vs governance at scale

WATCH: youtu.be/VVU2UhYaGzk

6 months ago 1 0 0 0
Post image

Running in-person only (Edinburgh) ‘Mastering Microsoft Entra ID Security’’ on 6 Nov.

2hr Entra security deep dive for blue teams.

Note this is exclusively for in-house security teams rather than other partners, MSSPs, etc.

REGISTER: www.eventbrite.ie/e/...

6 months ago 0 0 0 0

Big thanks to our sponsors @Threatscape, @appgovscore, and @PacktPublishing who help us run!

6 months ago 0 0 0 0
Post image

Folks, join us TONIGHT for the M365 Security & Compliance User Group

Two killer sessions and lots of prizes:

Denis Mutlu - Optimizing Log Management for Sentinel & MDXDR
@ThomasVrhydn - Proactive Exposure Hunting with Enterprise Exposure Graph

REGISTER: www.meetup.com/m365s...

6 months ago 0 0 1 0

One of the first things you realise when contending with Microsoft 365 security posture management (like @Threatscape Overwatch): you really need to fight hard the instinct to mark everything 'High Risk'. There are a lot of dominos/attack paths that even small gaps can open up!

6 months ago 0 0 0 0
Post image

New video: an honour to join @HeikeRitter's Virtual Ninja Show discussing MDE policy management and deploying at scale:

• personas + policy merge
• rings and “critical time delay”
• Live Response + RBAC
• Effective settings

WATCH: youtu.be/IvLNLcXRlrY

7 months ago 1 0 0 0
Post image

Your scientists were so preoccupied with whether or not they could, they didn't stop to think if they should.

7 months ago 3 0 0 0
Post image

Convenient reminder to stop what you’re doing and enforce browser extension allow listing.

7 months ago 4 2 0 0

With so many different ways of managing Microsoft 365 apps' updates and settings (Intune, config.office.com, third-party), what are YOU using, and what is currently the "most recommended" method?

7 months ago 0 0 0 0
Advertisement