У нас вы можете посмотреть бесплатно Are Your Microsoft 365 Settings DANGEROUS? (Default Risks) | Behind the Tenant Ep. 1 или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Your Microsoft 365 environment might have "dangerous defaults" that put your data and organization at risk. Many default settings for sharing and more across SharePoint, Teams, and the Power Platform are open by default, and it's critical to know how to lock them down. In this inaugural episode of 'Behind the Tenant,' hosts and Microsoft MVPs Richard Harbridge and Diego Domingos da Silva dive into the M365 settings you need to check today. In this episode, we cover: Important updates that deploy the Microsoft 365 Copilot app to desktops How to provide feedback to Microsoft and explore that feedback as a tenant admin The risks of default External Sharing and site-level settings Teams external access vs. app permissions Power Platform governance and Data Loss Prevention (DLP) Real-world stories on why governance matters How to audit your settings and more This episode is essential for M365 Admins, IT Pros, and even power users who want to ensure their tenant is secure and well-governed. 🔗 Connect with the Hosts Richard Harbridge: / rharbridge | https://www.x.com/rharbridge Diego Silva: / diegodasilva 🔔 Subscribe for more M365 tips: / @behindthetenant 👇 Got a question about M365? Ask us in the comments! Don't forget to like, subscribe, and share! ⏰ Timestamps / Chapters 00:00 Introduction and Opening Joke 00:49 Microsoft 365 Copilot App Update 02:26 Sending Feedback to Microsoft & Your Own Admins 06:26 Dangerous Defaults in Microsoft 365 07:30 External Sharing and Site-Level Settings 12:55 Teams External Access and App Permissions 19:51 Power Platform and Data Loss Prevention 23:32 Auditing and Continuous Updates 25:04 Conclusion and Final Thoughts