Jump to content

Featured Replies

Posted

Exchange Online security should start with securing your tenant using Privileged Identity Management (PIM). Follow the least privilege principle and don't have your administrative accounts granted persistent high permissions. In this session, we'll discuss how a large company implemented PIM for all Exchange admins and how to create custom roles to allow specific Exchange admins to grant admin consent for a subset of OAuth 2.0 permission scopes.

 

Continue reading...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...