๐‡๐จ๐ฐ ๐ญ๐จ ๐œ๐ซ๐ž๐š๐ญ๐ž ๐š ๐–๐๐€3 ๐–๐ข-๐…๐ข ๐ฉ๐ซ๐จ๐Ÿ๐ข๐ฅ๐ž ๐Ÿ๐จ๐ซ ๐–๐ข๐ง๐๐จ๐ฐ๐ฌ ๐ข๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ˆ๐ง๐ญ๐ฎ๐ง๐ž

Microsoft Intune still cannot natively create a Wi-Fi profile with WPA3-Personal security at this time. Within the configuration templates, there is only Wi-Fi with WPA/WPA2 security, but WPA3 is missing.

If you have a Wi-Fi where WPA3 is enforced without hybrid mode with WPA2, then if you create a profile as WPA2, the device will not connect to it. So, if you have WPA3 enforced, you need to configure Wi-Fi using a custom profile and OMA-URI.

https://www.cswrld.com/2026/03/how-to-create-a-wpa3-wi-fi-profile-for-windows-in-microsoft-intune/

#cswrld #microsoft #intune #wifi #wpa3

๐‡๐จ๐ฐ ๐‚๐จ๐ง๐๐ข๐ญ๐ข๐จ๐ง๐š๐ฅ ๐€๐œ๐œ๐ž๐ฌ๐ฌ ๐๐จ๐ฅ๐ข๐œ๐ข๐ž๐ฌ ๐€๐ซ๐ž ๐„๐ฏ๐š๐ฅ๐ฎ๐š๐ญ๐ž๐ ๐ข๐ง ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐„๐ง๐ญ๐ซ๐š ๐ˆ๐ƒ

Understanding how Conditional Access policies are evaluated in Microsoft Entra ID is absolutely essential if you are involved in their creation or management.

I often encounter fundamental misunderstandings regarding how the evaluation of Conditional Access policies takes place. Many administrators are accustomed to systems like firewalls, where there is an order or priority for evaluating created rules. However, it does not work this way with Conditional Access policies in Microsoft Entra ID. Applying the same principle to Conditional Access policies will very likely lead to significant security risks.

Read my blog post bellow ๐Ÿ‘‡ ๐Ÿ‘‡
https://www.cswrld.com/2026/02/how-conditional-access-policies-are-evaluated-in-microsoft-entra-id/

#cswrld #entraid #securitytips #conditionalaccess

๐‡๐จ๐ฐ ๐ญ๐จ ๐ฎ๐ฌ๐ž ๐š๐œ๐œ๐ž๐ฌ๐ฌ ๐ฉ๐š๐œ๐ค๐š๐ ๐ž๐ฌ ๐ญ๐จ ๐ฆ๐š๐ง๐š๐ ๐ž ๐ ๐ซ๐จ๐ฎ๐ฉ ๐ฆ๐ž๐ฆ๐›๐ž๐ซ๐ฌ๐ก๐ข๐ฉ๐ฌ

Access packages allow you to dynamically manage group, Teams, application, and SharePoint site membership based on user requests.

It works by creating an access package and then publishing it to users โ€“ either all users or a select group of users. Users can then activate the package from the My Access portal after meeting defined conditions.

https://www.cswrld.com/2026/02/how-to-use-access-packages-to-manage-group-memberships/

#cswrld #entraid #entitlementmanagement #identitygovernance #accesspackage

๐‡๐จ๐ฐ ๐ญ๐จ ๐ ๐ž๐ญ ๐ฎ๐ง๐ฅ๐ข๐ฆ๐ข๐ญ๐ž๐ ๐ฆ๐š๐ข๐ฅ๐›๐จ๐ฑ ๐ฌ๐ข๐ณ๐ž ๐ข๐ง ๐„๐ฑ๐œ๐ก๐š๐ง๐ ๐ž ๐Ž๐ง๐ฅ๐ข๐ง๐ž

Exchange Online Plan 1 licenses generally have a primary mailbox capacity of 50 GB. Exchange Online Plan 2 licenses have a capacity of 100 GB. However, this capacity can be extended by using Online Archive. With Exchange Online Plan 2, this capacity is unlimited. Technically speaking, the capacity is limited to 1.5 TB.

An interesting fact is that Microsoft 365 Business Premium licenses, which by default include Exchange Online Plan 1, are also entitled to this feature.

https://www.cswrld.com/2026/01/how-to-enable-auto-expanding-archive-in-exchange-online-and-get-unlimited-mailbox-capacity/

#cswrld #exchangeonline #mailbox #archive

๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฎ๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ถ๐—ฐ๐—ฎ๐—น๐—น๐˜† ๐˜‚๐—ฝ๐—ฑ๐—ฎ๐˜๐—ฒ ๐—ฎ๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€ ๐—ผ๐—ป ๐—ฐ๐—ผ๐—บ๐—ฝ๐˜‚๐˜๐—ฒ๐—ฟ๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—œ๐—ป๐˜๐˜‚๐—ป๐—ฒ

Microsoft Intune does not have any built-in options for updating installed applications on Windows computers.

If you want to update applications on managed computers, you must manually create a new version of the given application and deploy it to all computers. However, this is quite a lot of manual work, and you also have to monitor the availability of new versions of installed applications, which is another lot of manual work.

Read more in the article on my blog ๐Ÿ‘‡ ๐Ÿ‘‡
https://www.cswrld.com/2025/08/how-to-update-applications-using-patch-my-pc/

#cswrld #cybersecurityworld #blog #intune #applicationmanagement #appupdates #patchmypc

๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฐ๐—ผ๐—น๐—น๐—ฒ๐—ฐ๐˜ ๐—ฐ๐˜‚๐˜€๐˜๐—ผ๐—บ ๐—ฒ๐˜ƒ๐—ฒ๐—ป๐˜ ๐—œ๐——๐˜€ ๐˜๐—ผ ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—ฆ๐—ฒ๐—ป๐˜๐—ถ๐—ป๐—ฒ๐—น

Microsoft Sentinel is Microsoft's SIEM/SOAR. It is used to collect and evaluate logs.

If you choose to collect security logs from Windows Server, Microsoft Sentinel can collect predefined log sets using the built-in settings. By default, you have the option to select from the predefined sets All Security Events, Common, or Minimal.

However, if you need to collect some custom Event IDs that do not belong to the above built-in categories, or simply want your own set of Event IDs to collect, you can define your own Event IDs using XPath queries.

XPath (XML Path Language) is a query language used for selecting nodes from an XML document. It allows you to navigate through elements and attributes in XML documents, making it a powerful tool for extracting specific pieces of information. XPath is commonly used in combination with XML parsers to filter and locate data based on complex conditions.

Read my blog post bellow ๐Ÿ‘‡ ๐Ÿ‘‡
https://www.cswrld.com/2025/06/how-to-collect-custom-event-ids-to-microsoft-sentinel/

#cswrld #sentinel #eventid #logcollection #custom

๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฑ๐—ถ๐˜€๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ฆ๐—ฒ๐—น๐—ณ-๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ ๐—ฃ๐—ฎ๐˜€๐˜€๐˜„๐—ผ๐—ฟ๐—ฑ ๐—ฅ๐—ฒ๐˜€๐—ฒ๐˜ ๐—ณ๐—ผ๐—ฟ ๐—ฎ๐—ฑ๐—บ๐—ถ๐—ป๐—ถ๐˜€๐˜๐—ฟ๐—ฎ๐˜๐—ผ๐—ฟ๐˜€ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—˜๐—ป๐˜๐—ฟ๐—ฎ ๐—œ๐——

Self-service password reset can be a useful feature that allows users to access their account in case they forget their password.

On the other hand, it is potentially risky, as a potential attacker may target the self-service password reset feature to gain access to the account. Especially for privileged accounts, this is very risky and therefore I would generally recommend disabling self-service password resets for privileged accounts.

๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
https://youtu.be/KIlRPx_9XRA

#cswrld #videotutorial #sspr #passwordreset #entraid #administrators

๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฏ๐—น๐—ผ๐—ฐ๐—ธ ๐—ฎ๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ถ๐—ฐ ๐—ฒ๐—บ๐—ฎ๐—ถ๐—น ๐—ณ๐—ผ๐—ฟ๐˜„๐—ฎ๐—ฟ๐—ฑ๐—ถ๐—ป๐—ด ๐—ถ๐—ป ๐—ข๐—ณ๐—ณ๐—ถ๐—ฐ๐—ฒ ๐Ÿฏ๐Ÿฒ๐Ÿฑ

Automatic email forwarding is very risky. First, it can lead to exfiltration of sensitive internal information outside the corporate environment. But it can also cause account compromise, for example through password reset whose code arrives at some external address that may be under the control of an attacker.

๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
https://youtu.be/sdjG-gl6Xxs

#cswrld #videotutorial #email #forwarding #office365 #exchangeonline

๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฏ๐—ฎ๐—ฐ๐—ธ๐˜‚๐—ฝ ๐—ข๐—ณ๐—ณ๐—ถ๐—ฐ๐—ฒ ๐Ÿฏ๐Ÿฒ๐Ÿฑ ๐—ฑ๐—ฎ๐˜๐—ฎ

Right off the bat, you might be wondering why I should back up data from Office 365 when it's a cloud service. Microsoft assures you of high data availability, but the service itself has no built-in backup mechanisms. And that's something to keep in mind.

Office 365 has two levels of recycle bins in it. The first level is user level, and data from this recycle bin can be restored directly by the user. The second level is admin and only an administrator can restore data from this level. You can have litigation hold and in-place hold set up, but that is not available in all plans, and you probably won't activate it on all mailboxes, SharePoint sites and teams in Teams.

๐Ÿ“บ Learn more how to backup Office 365 data in my today's video ๐Ÿ‘‡ ๐Ÿ‘‡
https://youtu.be/BBEjAKeaRCQ

#videotutorial #cswrld #backup #office365

๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฏ๐—น๐—ผ๐—ฐ๐—ธ ๐˜€๐—ฝ๐—ฒ๐—ฐ๐—ถ๐—ณ๐—ถ๐—ฐ ๐—ณ๐—ถ๐—น๐—ฒ ๐˜๐˜†๐—ฝ๐—ฒ๐˜€ ๐—ถ๐—ป ๐—ฒ๐—บ๐—ฎ๐—ถ๐—น ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ต๐—บ๐—ฒ๐—ป๐˜๐˜€

A very common source of infection is email. Everyone uses email and threat actors take advantage of it. Either in the form of phishing or in the form of malicious attachments.

There are very advanced protection options within Office 365. Whether it be within Exchange Online Protection, which is included in all Office 365 / Exchange Online plans, or within Safe Attachments, which is an extension within Microsoft Defender for Office 365.

But a very effective protection is the very simple blocking of unwanted file types within email attachments. You simply block what is unwanted, making it very easy and effective to block many potentially malicious files.

๐Ÿ“บ Watch my YouTube video bellow ๐Ÿ‘‡ ๐Ÿ‘‡
https://youtu.be/dFlD_CH5Kp8

#cswrld #videotutorial #email #attachments #filter #office365 #exchangeonline