Guide icon
Guide

Business Productivity

Top Ways to Configure M365 to Improve Security

by Aaron Turner, IANS Faculty

Microsoft 365’s default settings are optimized for productivity and collaboration, not security. Unfortunately, improving the security posture of the tenant can significantly impact the user experience of services such as Teams and OneDrive. Before making changes, security teams must understand the micro and macro impacts of those settings on users and the overall organization.

This detailed guide explains the key considerations and recommends settings within five primary areas that will provide the best security return-on-investment (ROI) with the least user experience impacts.

 

Complete the form and we'll send a copy of the M365 configuration guide to your email.

Fill out the form to receive your content download.  
* Required Fields
 

Featured IANS Content

Quarterly Report icon
Quarterly Report

Regulations and Legislation

IANS Security, Privacy and Compliance Law Update: Q2 2021

by Rebecca Herold, IANS Faculty

In this robust quarterly report, IANS dives into some of the emerging international compliance laws and regulations that impact the information security and privacy communities, as well as related significant news to inform business leaders of actions that could affect how organizations approach and manage information security and privacy.

See Details
Guide icon
Guide

Cloud Network and Host Controls

Six Key Control Areas of Cloud Security

by Dave Shackleford, IANS Faculty

Completely locking down all your cloud workloads is a daunting endeavor. This piece explains how focusing on six key control areas can help ensure security teams get a solid head start in the cloud by adhering to foundational security practices.

See Details
Checklist icon
Checklist

Vendor and Partner Management

Third-Party Software Security Checklist

by Richard Seiersen, IANS Faculty

While always a focus for security teams, third-party software security garnered more focus and attention following the SolarWinds breach. This checklist offers four high-level best practices for securing third-party software, each with one or more technology solutions. Both commercial and open source solutions are included where available.

See Details