No announcements
Found 512 threads
-
1 Votes
Configuring DISA STIG Group Policy Settings for Windows 10
I am looking at the best way to configure the DISA STIG group policy settings for Windows 10 Enterprise. Ideally DISA would provide a official group policy backup /template file with all the settings ...Proposed | 10 Replies | 30232 Views | Created by Ender3 - Friday, March 4, 2016 1:49 AM | Last reply by josh451 - Thursday, April 23, 2020 7:03 PM -
0 Votes
Use sensitivity labels in combination with DLP
Currently I have set up several sensitivity labels in the Security & Compliance center. I want to use these sensitivity labels in DLP policies to block content based on certain conditions. I have ... -
0 Votes
GDPR and data copy request, how you deal with reviewing the data from eDiscovery?
Hi Everyone, Let's suppose your client got a request to provide copy of the data to someone. The question from my side is - how to you deal with it? I ...Unanswered | 1 Replies | 666 Views | Created by Pawel Jarosz aka Zaicnupagadi - Friday, April 10, 2020 11:33 AM | Last reply by Pawel Jarosz aka Zaicnupagadi - Friday, April 10, 2020 12:12 PM -
0 Votes
DLP not working with Teams files for Guest accounts
Hi, We recently started wirh Teams and we want to work with external users but we want DLP to block certain files from being downloaded. The problem i am running into is that ...Unanswered | 2 Replies | 661 Views | Created by Hans van Maanen - Thursday, April 9, 2020 10:54 AM | Last reply by Hans van Maanen - Thursday, April 9, 2020 12:17 PM -
0 Votes
message trace reports
I have exported a message trace report from the security and compliance admin center in Office 365. In the report the recipient_status column is grouping all the recipients into the same cell ... -
2 Votes
I want to change the Ost file in to PST file but I can not do this ?
Hello I want to Convert a Ost file in to PST file Format but I can not Convert this. pleas help me, A proficient tool for ...Unanswered | 5 Replies | 1849 Views | Created by Parkar Layn - Tuesday, November 19, 2019 11:05 AM | Last reply by - Saturday, March 28, 2020 3:14 AM -
3 Votes
I tried to change the Ost file to PST file but I can not do this
Answered | 30 Replies | 2988 Views | Created by grown fill - Tuesday, July 17, 2018 11:25 AM | Last reply by - Monday, March 16, 2020 12:26 PM -
0 Votes
Creating search query offline
Is it possible to compose a search query offline and then run it without going through the tedious steps of filling out the request in the browser? I ... -
0 Votes
Unable to Export S&C Content Search Results
Hi folks, wondering if anyone else has seen this / has a fix. I can run new content searches via New-ComplianceSearch cmdlet, or through the GUI, and the search show results. ...Unanswered | 2 Replies | 3026 Views | Created by SiIverwolf - Monday, February 24, 2020 9:44 PM | Last reply by SiIverwolf - Tuesday, February 25, 2020 12:32 AM -
0 Votes
Set content hold duration?
expand eDiscovery --> eDiscovery --> Create a case. Created a case called "90 Day Retention". 2. Open "90 Day Retention" --> go to Holds tab and ... -
3 Votes
Remove Password From Excel Files
If you want to remove password from Excel files, so download eSoftTools Excel Password Remover Software, it is the best solution ever to open password protected Excel (.xlsx, .xlsm, .xlsb, ... -
3 Votes
Could this be a backup created corruption to a GPO?
I'm getting this error upon import in to SCM 2 Import GPO had with the following errors. This can result from improper manual modification of GPO backup files. ...Proposed | 14 Replies | 13919 Views | Created by brainfuelmedia - Wednesday, September 28, 2011 4:07 PM | Last reply by all done - Friday, January 31, 2020 9:46 PM -
0 Votes
Move and Delete emails based on a Security and Compliance Content Search Export
I am attempting to automate the archival and deletion of emails that are exported from a Security and Compliance Content Search. I want to make sure I only manipulate the emails shown in the ...Unanswered | 0 Replies | 1126 Views | Created by William A Oettmeier - Friday, November 29, 2019 1:23 AM -
0 Votes
find the server not configured as per Microsoft security compliance best practise
Need to know about tools and way to extract all server existing configuration & open vulnerability. so that we can configured server as per Microsoft best practice to maintain ... -
0 Votes
Security / Telemetry Baselines
I'd like to know if the Security Baselines (https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-security-baselines) are backwards compatible? I.e. Can I put version ... -
0 Votes
HIPAA Compliance between two Office 365 Companies
We recently acquired a company and both the parent company and the acquired company run Office 365 with E3 licenses. We are a healthcare company so we are concerned that we follow all ... -
0 Votes
Basic understanding of SCM
hi i am trying to understand how to use this tolls. As I have installed & exported log from SCM i come to know that the tool will pull the configuration from servers & ... -
0 Votes
Inconsistency in O365 Secure Score Improvement Action
Good day, Reviewing the Microsoft Secure Score, one of the Improvement actions is as below but I cannot seem to make sense of ...Unanswered | 0 Replies | 1198 Views | Created by - - - Navs - - - - Friday, September 13, 2019 4:49 PM -
0 Votes
delete unknow local policy security option
Hi, how can i remove below unknown policy %...% -
0 Votes
Anti-Phishing Polices
Hi Guys, I have a question regarding Anti-Phishing policies in Office 365. When I create new policy I cannot add all users, I can only add up to 60. Is there no way to protect all ...Unanswered | 1 Replies | 1567 Views | Created by Jaroslav Jagr - Thursday, June 20, 2019 8:29 AM | Last reply by Saurabh_Y - Tuesday, July 16, 2019 9:18 AM
No announcements