Microsoft Copilot – Outlook vs Bing Enterprise Chat
For this comparison I'm going to ask each to improve an email I wrote with my own brain.
For this comparison I'm going to ask each to improve an email I wrote with my own brain.
This year at Third Tier we'll be offering in-depth courses. Our first will be Intune
In this session, I reviewed the very most important parts to start with when setting up your XDR. That doesn't mean, skip the rest. It means start here and then go back through and configure everything.
It was my pleasure to introduce peer groups to Third Tier. In 2024, we're introducing focused learning groups for Defender, Intune, Public speaking and more
Create a news source that is focused on helping Microsoft 365 IT businesses by providing them with curated and summarized information, published by Microsoft and their MVP community
I'm writing an on-going series on AI for businesspeople. What is AI? How does it work? How do you use it?
Criminals of the world would love to know that they don't have to deal with MFA if they phish you while you're in the office. Now we've taken that option away
Despite criminal masterminds and "security researchers" always coming up with the next greatest tool for causing financial damage to our businesses and economy, there are patterns.
Defense implies a reactionary approach. Prevention set the scene where ransomware can't get you in the first place.
Many vendors call this Endpoint Detection and Response (EDR) or Extended Detection and Response (XDR). Microsoft calls it Defender for Business.
It's one of the least known and used portal in the entire Microsoft 365 suite. Too bad, because it contains some configuration and automation gems. Let's see how we use it to automate Office updates.
Fortunately, Defender protects against this when configured correctly. In addition to the Defender for Endpoint sensor installation, Attack Surface Reduction rules and certain anti-virus configurations should also be deployed