M365 implementations are common among organisations of varying sizes. We have recently completed an engagement to review the security configurations of one and decided to create a review framework. This post covers five key configurations that kickstart the security configuration of your M365.
The Blog
News & Thoughts from the Axenic Team