KMartins Cloud Technology

Advice through experience in Office 365, Security, and Azure
KMartins Cloud Technology

KMartins Cloud Technology

Email DKIM Records: Importance and Proper Setup in Office 365

In my role at Microsoft I am talking daily to Microsoft Partners and customers throughout the United States. One of the more popular conversation topics is email spam and spoofing of their domain. There are several email related DNS records available that the majority of organizations are either unaware of …

Email Phishing Protection Guide – Part 20: Recommended Security and Anti-Phishing Training from Microsoft Ignite 2018

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture …

Email Phishing Protection Guide – Blog 19: Email Phishing Protection Security Checklist

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture …

Email Phishing Protection Guide – Part 18: Increase Security with Microsoft Secure Score

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture …

Email Phishing Protection Guide – Part 17: Control Application Consent Registrations in Microsoft Office 365 and Azure

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture …

Email Phishing Protection Guide – Part 16: Disable Office 365 Legacy Email Authentication Protocols

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture …

Email Phishing Protection Guide – Part 15: Implement the Microsoft Azure AD Password Protection Service (for On-Premises too!)

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture …

Email Phishing Protection Guide – Part 14: Prevent Brute Force and Spray Attacks in Office 365

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture …