User Profile
Tim67
Brass Contributor
Joined 8 years ago
User Widgets
Recent Discussions
Re: eDiscovery hold vs Litigation hold
@Roy Here's what happens when you create a Litigation Hold. Items that are permanently deleted by the user are retained in the Recoverable Items folder in the user's mailbox for the duration of the hold. Items that are purged from the Recoverable Items folder by the user are retained for the duration of the hold. The storage quota for the Recoverable Items folder is increased from 30 GB to 110 GB. Items in the user's primary and the archive mailboxes are retained You can use a Core eDiscovery case to create holds to preserve content that might be relevant to the case. You can place a hold on the Exchange mailboxes and OneDrive for Business accounts of people you're investigating in the case. You can also place a hold on the mailboxes and sites that are associated with Microsoft Teams, Office 365 Groups, and Yammer Groups. When you place content locations on hold, content is preserved until you remove the hold from the content location or until you delete the hold. After you create an eDiscovery hold, it may take up to 24 hours for the hold to take effect. When you create a hold, you have the following options to scope the content that is preserved in the specified content locations: You create an infinite hold where all content in the specified locations is placed on hold. Alternatively, you can create a query-based hold where only the content in the specified locations that matches a search query is placed on hold. You can specify a date range to preserve only the content that was sent, received, or created within that date range. Alternatively, you can hold all content in specified locations regardless of when it was sent, received, or created. _tim22KViews1like0CommentsRe: Unable to deploy via whiteglove/autopilot
trebelow one of the best Intune tutorials for free https://www.youtube.com/channel/UCfmMlhX5TW8cicxHw6ExYVA and if you try first to disable the "white-glove" option, use with a few as pilot computers first no apps just image reset. If that works you can deploy apps later. Check the video above where you have every single step explained in detail. Regards Tim2.2KViews0likes0CommentsRe: Detect compromised passwords
Huw_W1 you have quite a few options. https://docs.microsoft.com/en-us/cloud-app-security/getting-started-with-cloud-app-security https://docs.microsoft.com/en-us/cloud-app-security/getting-started-with-cloud-app-security from there you will be able to automate rules and receive notifications via email Azure AD Sentinel https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-risky-sign-ins more difficult and you have to learn how to use this tool O365 ATP with E5 licence https://docs.microsoft.com/en-us/microsoft-365/compliance/alert-policies?view=o365-worldwide A very informative place to start looking if you have E5 license in addition with E5 you can also configure "safe links" https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-atp-safe-links-policies?view=o365-worldwide and of course third party tool like Mimecast 🙂 Regards _tim12KViews0likes0Comments
Recent Blog Articles
No content to show