Tony Akers, Author at Practical 365 Practical Office 365 News, Tips, and Tutorials Mon, 31 Jul 2023 14:43:16 +0000 en-US hourly 1 https://wordpress.org/?v=6.3.2 https://practical365.com/wp-content/uploads/2022/06/favicon.png Tony Akers, Author at Practical 365 32 32 Introducing the Office 365 ATP Recommended Configuration Analyzer (ORCA) https://practical365.com/introducing-the-office-365-atp-recommended-configuration-analyzer-orca/ https://practical365.com/introducing-the-office-365-atp-recommended-configuration-analyzer-orca/#comments Tue, 26 Nov 2019 00:40:19 +0000 https://www.practical365.com/?p=46918 At Ignite this year, Microsoft announced the release of the Office 365 ATP Recommended Configuration Analyzer, otherwise known as ‘ORCA’. Find out more in this article.

The post Introducing the Office 365 ATP Recommended Configuration Analyzer (ORCA) appeared first on Practical 365.

]]>
https://practical365.com/introducing-the-office-365-atp-recommended-configuration-analyzer-orca/feed/ 6
Remediating Account Breaches in Office 365 https://practical365.com/remediating-account-breaches-in-office-365/ https://practical365.com/remediating-account-breaches-in-office-365/#comments Thu, 27 Jun 2019 22:01:51 +0000 https://www.practical365.com/?p=45932 In the last part to this insightful series on account breaches, Tony Akers discusses how to remediate your Office 365 after an account breach.

The post Remediating Account Breaches in Office 365 appeared first on Practical 365.

]]>
https://practical365.com/remediating-account-breaches-in-office-365/feed/ 7
How to install the Hawk PowerShell Module https://practical365.com/how-to-install-the-hawk-powershell-module/ https://practical365.com/how-to-install-the-hawk-powershell-module/#comments Tue, 11 Jun 2019 21:38:40 +0000 https://www.practical365.com/?p=45843 In Part 3 of the Account Breaches series by security expert Tony Akers, he looks at using the Hawk PowerShell Module for investigating breaches.

The post How to install the Hawk PowerShell Module appeared first on Practical 365.

]]>
https://practical365.com/how-to-install-the-hawk-powershell-module/feed/ 4
How to Investigate Account Breaches using Cloud App Security https://practical365.com/how-to-investigate-account-breaches-using-cloud-app-security/ https://practical365.com/how-to-investigate-account-breaches-using-cloud-app-security/#comments Tue, 04 Jun 2019 21:54:07 +0000 https://www.practical365.com/?p=45195 In Part Two, of this four-part series on Office 365 account breaches, Tony Akers explores how to use Cloud App Security to investigate a breach.

The post How to Investigate Account Breaches using Cloud App Security appeared first on Practical 365.

]]>
https://practical365.com/how-to-investigate-account-breaches-using-cloud-app-security/feed/ 1
O365 Account Breaches – Detection, Investigation & Remediation with Cloud App Security https://practical365.com/office-365-account-breaches-detection-investigation-remediation-with-cloud-app-security/ https://practical365.com/office-365-account-breaches-detection-investigation-remediation-with-cloud-app-security/#comments Fri, 22 Mar 2019 15:50:07 +0000 https://www.practical365.com/?p=45116 In part one of this three part series on Office 365 account breaches, Tony Akers looks at detecting account breaches in Cloud App Security.

The post O365 Account Breaches – Detection, Investigation & Remediation with Cloud App Security appeared first on Practical 365.

]]>
https://practical365.com/office-365-account-breaches-detection-investigation-remediation-with-cloud-app-security/feed/ 17
How to report on suspicious emails in Office 365 – Part Two https://practical365.com/how-to-report-on-suspicious-emails-in-office-365-part-two/ https://practical365.com/how-to-report-on-suspicious-emails-in-office-365-part-two/#comments Wed, 30 Jan 2019 00:33:04 +0000 https://www.practical365.com/?p=42535 In the second and final part of this series, Tony outlines how to facilitate end-user reporting of suspicious emails.

The post How to report on suspicious emails in Office 365 – Part Two appeared first on Practical 365.

]]>
https://practical365.com/how-to-report-on-suspicious-emails-in-office-365-part-two/feed/ 9
How to report on suspicious emails in Office 365 – Part 1 https://practical365.com/how-to-improve-reporting-of-phishing-attacks/ https://practical365.com/how-to-improve-reporting-of-phishing-attacks/#comments Fri, 25 Jan 2019 03:00:00 +0000 https://www.practical365.com/?p=41937 In part one of this two blog series, Tony Akers writes on how to improve the end-user reporting of phishing attacks and how to deploy the correct tools.

The post How to report on suspicious emails in Office 365 – Part 1 appeared first on Practical 365.

]]>
https://practical365.com/how-to-improve-reporting-of-phishing-attacks/feed/ 5
Creating Activity Alerts in Office 365 Security & Compliance Center https://practical365.com/creating-activity-alerts-in-office-365-security-compliance-center/ https://practical365.com/creating-activity-alerts-in-office-365-security-compliance-center/#comments Thu, 22 Nov 2018 21:18:20 +0000 https://www.practical365.com/?p=41828 Tony Akers explores creating activity alerts in Office 365 Security & Compliance Center which is essential for recognising changes in

The post Creating Activity Alerts in Office 365 Security & Compliance Center appeared first on Practical 365.

]]>
https://practical365.com/creating-activity-alerts-in-office-365-security-compliance-center/feed/ 11
How attackers bypass third-party mail filtering to Office 365 https://practical365.com/how-to-ensure-your-third-party-filtering-gateway-is-secure/ https://practical365.com/how-to-ensure-your-third-party-filtering-gateway-is-secure/#comments Sat, 17 Nov 2018 01:31:52 +0000 https://www.practical365.com/?p=41762 Attackers can bypass your third-party gateway systems delivering spam and malicious content. Office 365 architect Tony Akers writes on how to fix this.

The post How attackers bypass third-party mail filtering to Office 365 appeared first on Practical 365.

]]>
https://practical365.com/how-to-ensure-your-third-party-filtering-gateway-is-secure/feed/ 31