Email message p1 and p2 headers
Learn the basics about message headers and how they can play a big role in anti-spam filtering and message routing. https://blog.ahasayen.com/email-message-p1-and-p2-headers/
View ArticleExchange Online Protection EOP headers
This table shows the different header value used by Exchange Online Protection or EOP, and what each value means , and whether it is bypassing anti-spam filtering or not. Blog Post:...
View ArticleExchange Online Protection SCL SFV and other headers
Learn how Exchange Online Protection or EOP uses message headers to stamp a message and decide how to deal with each incoming email. Full blog post: https://blog.ahasayen.com/exchange-scl-eop-headers/
View ArticleWhat is microsoft 365
Microsoft 365 is a complete, intelligent solution, including Office 365, Windows 10, and Enterprise Mobility + Security, that empowers everyone to be creative and work together, securely.
View ArticleEra of disruption with Microsoft 365
Microsoft 365 is a complete, intelligent solution, including Office 365, Windows 10, and Enterprise Mobility + Security, that empowers everyone to be creative and work together, securely. You can...
View ArticleEmail edge security architecture EOP
Exchange Online Protection EOP full architecture view showing the full EOP inspection pipeline in great details. Full post can be found...
View ArticleMicrosoft EMS Enterprise Mobility and Security Architecture Poster
Microsoft Cloud Security and Mobility Architecture Deep Dive showing Azure Active Directory, EMS, Azure Information Protection AIP, device management, DLP , CASB and more. Poster. Full blog post:...
View ArticleModern Workplace Deep Dive infographic
Modern Workplace Architecture Poster with Azure Active Directory , Intune, AIP, OMS, Windows 10, Office 365, Federation services and more. Full blog post here:...
View ArticleMicrosoft 365 Threat Management and security - EMS E5
Going through Microsoft Office 365 Security, Threat Management, Windows ATP, Defense in Depth, EMS E5, and M365.
View ArticleStrict KDC Validation
What is Strict KDC Validation and what risks does it mitigate? In this blog post, we will uncover how smart cards and digital certificates work with domain controllers (KDC), and how life looks like...
View ArticleMigrating your certification authority hashing algorithm from sha 1 to sha-2
A practical guide on how to migrate your certification authority hashing algorithm from SHA-1 to SHA-2, and guidance on cryptographic providers, what makes your CA SHA-2 capable, and step by step...
View ArticleOffice 365 periodic table - editable
Office 365 periodic table in your PowerPoint presentation. This is not a picture, but built piece by piece so you can edit the writing and re-arrange blocks as you wish....
View ArticleMicrosoft Cloud App Security CASB
Microsoft cloud app security or CASB is a critical component of the Microsoft cloud security stack. It provides a comprehensive solution to give organizations improved visibility into cloud...
View ArticleSecure Modern Workplace With Microsoft 365 Threat Protection
Join me as I walk you through alll what Microsoft 365 has to offer to protect your business and organization. I am going to cover every security feature and how it fits in the big picture. Whether you...
View ArticleHow to plan your Modern Workplace Project - SPS Denver October 2018
Join Ammar Hasayen as he speaks at the SharePoint Saturday Denver, Colorado - October 2018 about how big organizations should plan their modern workplace project. Learn how to get executive...
View ArticleMillennials Arrival And The Evolution Of The Modern Workplace
The Millennials arrival and the evolution of the Modern Workplace is about discussing the demographic change in the workplace, and how Millennials are taking over and shaping the future worker. This...
View ArticleThe Emerge Of The Modern Workplace
The workplace is undergoing some fundamental changes. In this video, we will talk about the trends happening in the workplace, demographic changes, the Millennials arrival, and explore how we might be...
View ArticleWindows Advance Threats - BSides Amman 2019
Learn how to hack Windows machines and reveal the password of the domain admin by hacking into the memory and Windows Services. This is Level 400 content with a lot of demos and it covers many...
View ArticleMicrosoft 365 Certification - How to become Enterprise Administrator Expert
Learn how to become Microsoft 365 Certified Enterprise Administrator Expert, what exams you should pass, and what is the best certification path for your specific job role and skill sets. Microsoft is...
View ArticleIntroducing Azure Bastion
am going to introduce you to Azure Bastion in Microsoft Azure and teach you how to create your first Azure bastion host, connect to a virtual machine and work a virtual machine session. Watch on...
View Article
More Pages to Explore .....