{"id":17478,"date":"2022-12-20T09:31:59","date_gmt":"2022-12-20T14:31:59","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=17478"},"modified":"2022-12-21T14:47:34","modified_gmt":"2022-12-21T19:47:34","slug":"microsoft-365-security-features","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-security-features\/","title":{"rendered":"Top Microsoft 365 security features you should know"},"content":{"rendered":"<p>It doesn\u2019t matter whether you run a small business or are part of the IT team at a multinational corporation\u2014if your organization has data in the cloud, attackers will eventually <a href=\"https:\/\/www.sherweb.com\/blog\/security\/why-are-msps-targeted-hackers\/\">try to target it<\/a>. Fortunately, <a href=\"https:\/\/www.sherweb.com\/productivity\/microsoft-365\/\">Microsoft 365<\/a> has you covered.<\/p>\n<p>Many people know Microsoft 365 for its suite of business productivity and collaboration tools. Not as many are familiar with its equally powerful security tools, however. Let\u2019s explore some of the Microsoft 365 security features you should definitely know whether you\u2019re shopping around or you\u2019re an existing business user looking to upgrade your security program.<br \/>\n&nbsp;<\/p>\n<h2>Microsoft Defender<\/h2>\n<p>Microsoft Defender takes a modern \u201cdefense in depth\u201d approach to protect your Microsoft 365 apps and data. Instead of relying on just strong perimeter security, it applies multiple security layers, making it capable of catching a much broader range of threats than purely perimeter security.<\/p>\n<p>That starts with email analysis and filtering at your network&#8217;s edge. On average, Microsoft Defender <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RWSD6b\">blocks over 25% of all malicious messages<\/a> before they even touch your network. Then all mail inside your perimeter is scrutinized using tools that scan for malicious content and the sender&#8217;s authenticity.<\/p>\n<p>Sophisticated attackers know that <a href=\"https:\/\/www.sherweb.com\/security\/\">security tools<\/a> carefully scrutinize mailboxes, so they look to get a toehold on your network by compromising other applications. That\u2019s why Microsoft Defender also includes OneDrive, SharePoint, Teams and <a href=\"https:\/\/www.youtube.com\/watch?v=EXE2VIs7AQs\">Office applications<\/a> protection layers. If Defender detects malicious activity in any of those apps, it immediately locks down the compromised files so users can\u2019t open or share them.<br \/>\n&nbsp;<\/p>\n<h2>Microsoft 365 Data Loss Prevention (DLP)<\/h2>\n<p>Your data is one of your business\u2019s most valuable assets. Its compromise could have long-term devastating effects on both your revenue and reputation. Several Microsoft 365 security features are available to help protect your data integrity.<br \/>\n&nbsp;<\/p>\n<h3>DLP policies<\/h3>\n<p>These policies will help ensure that sensitive information such as credit card numbers or other identification stays secure. It allows you to flag and track sensitive data and set policies around how users can share it.<\/p>\n<h3>Information protection<\/h3>\n<p>This Outlook feature allows you to set policies for how you and your employees share sensitive data over email. For example, you can set policies to prevent copying and pasting into or out of emails or prevent the ability to forward certain messages outside your organization.<\/p>\n<h3>Theft protection<\/h3>\n<p>With BitLocker encryption, Microsoft 365 ensures that your information remains safe even if a device is stolen. You can also remotely wipe any lost device or reset it to its factory settings if you pass it on to a new employee.<br \/>\n&nbsp;<\/p>\n<h2>Multi-factor authentication (MFA)<\/h2>\n<p>Your data is only as safe as your employees&#8217; credentials to access it. Unfortunately, too many people still choose weak, <a href=\"https:\/\/cybernews.com\/security\/weakest-passwords-2022\/\">vulnerable passwords<\/a>. That\u2019s why Microsoft 365 supports <a href=\"https:\/\/www.sherweb.com\/blog\/security\/multi-factor-authentication\/\">multi-factor authentication<\/a>. When you enable MFA, your users must use two or more authentication methods, including passwords, text security codes or verifying requests in a mobile app. You can even use the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/mobile-authenticator-app\">Microsoft Authenticator app<\/a> to secure other business services, like Salesforce, <a href=\"https:\/\/www.sherweb.com\/blog\/g-suite\/reselling-google-workspace\/\">Google Workspace<\/a> and Dropbox.<br \/>\n&nbsp;<\/p>\n<h2>Built-in mobile device management (MDM)<\/h2>\n<p>The rise in <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/next-for-remote-work\/\">remote and hybrid working<\/a> has only expanded popular employer Bring Your Own Device (BYOD) programs, where employees use their own laptops and mobile devices to connect to company apps and shared folders.<\/p>\n<p>You might have the most trustworthy employees in the world, but even the most diligent ones might lose their phones, which can still put your data at risk. That\u2019s why Microsoft 365 offers MDM built right into its cloud platform for employees to access corporate email from their devices. Beyond email, Microsoft InTune secures access from BYOD endpoints to other corporate applications and data.<br \/>\n&nbsp;<\/p>\n<h2>Privileged Identity Management (PIM)<\/h2>\n<p><a href=\"https:\/\/www.microsoft.com\/en-ca\/security\/business\/identity-access\/azure-active-directory-privileged-identity-management-pim\">Privileged Identity Management<\/a> allows you to manage how and when users can access different cloud-based resources. For example, you can set time-limited or approval-limited roles for different users, so they receive elevated privileges only under certain conditions. That helps prevent accidental misuse or malicious use of resources by normal users.<br \/>\n&nbsp;<\/p>\n<h2>Email archiving<\/h2>\n<p>All businesses must abide by data retention regulations that dictate how email communication is handled and retained. <a href=\"https:\/\/www.sherweb.com\/blog\/general\/microsoft-365-business-standard-vs-business-premium\/\">Microsoft 365 Business<\/a> works to address even the most stringent regulations with these email archiving features:<\/p>\n<h3>Litigation holds<\/h3>\n<p>You can use a <a href=\"https:\/\/www.logikcull.com\/guide\/legal-hold\">litigation hold<\/a> to lockdown and retain a user\u2019s mailbox, including deleted items. This will preserve all their inbox content, including original versions of items they may have modified.<\/p>\n<h3>Retention policies<\/h3>\n<p>Exchange allows you to customize your own retention policies according to your regulatory and business needs. For example, you can delete things permanently after a set period or keep them in a separate storage area. These Microsoft 365 security features can also be of tremendous help in case of a security breach or accidental deletion of important data.<br \/>\n&nbsp;<\/p>\n<h2>Azure Information Protection (AIP)<\/h2>\n<p>This cloud-based solution works similarly to Microsoft Defender Information Protection, but for data in your company\u2019s <a href=\"https:\/\/www.sherweb.com\/infrastructure\/microsoft-azure\/\">Azure<\/a> cloud computing tenant. It allows you to apply labels to tag and manage files. Labels can be applied automatically, or users can be given suggestions for how to label certain data.<\/p>\n<p>Some options include:<\/p>\n<ul>\n<li>Do not forward<\/li>\n<li>Confidential<\/li>\n<li>Highly confidential<\/li>\n<li>Encrypt<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Microsoft 365 security dashboard<\/h2>\n<p>All of these features sound great, but how will you manage them? Microsoft 365 Business includes a security dashboard that collects all relevant security information in one place. It\u2019s clear and uncluttered so non-technical users can monitor your security measures.<\/p>\n<p>On the dashboard, you can activate and deactivate features with just the click of a button, set custom policies that make sense for your business, and instantly remote-wipe stolen or lost devices.<br \/>\n&nbsp;<\/p>\n<h2>Microsoft 365 security features that were made for you<\/h2>\n<p>Microsoft 365\u2019s security features are powerful enough for major enterprise security but available for every small business user. They\u2019ll empower you to protect your data and employees from the <a href=\"https:\/\/www.sherweb.com\/blog\/security\/top-cyberthreats\/\">cyberthreats<\/a> faced by modern businesses.<\/p>\n<p>An expert partner can help you make the most out of Microsoft 365. Check out our<a href=\"https:\/\/www.sherweb.com\/partner-guide\/registration\/\" class=\"track-link\"> Partner Guide<\/a> to learn how Sherweb can help you maximize the benefits of your Microsoft relationship.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It doesn\u2019t matter whether you run a small business or are part of the IT team at a multinationa","protected":false},"author":177,"featured_media":24137,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[751],"tags":[717,919],"class_list":["post-17478","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-office-365","tag-microsoft-365","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft 365 security features you should know about<\/title>\n<meta name=\"description\" content=\"Security features added to MIcrosoft 365 can help protect your business from cyberthreats and other security risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-security-features\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft 365 security features you should know about\" \/>\n<meta property=\"og:description\" content=\"Security features added to MIcrosoft 365 can help protect your business from cyberthreats and other security risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-security-features\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-20T14:31:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-21T19:47:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Top-M365-security-features-1200x480-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-security-features\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-security-features\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"Top Microsoft 365 security features you should know\",\"datePublished\":\"2022-12-20T14:31:59+00:00\",\"dateModified\":\"2022-12-21T19:47:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-security-features\\\/\"},\"wordCount\":1014,\"commentCount\":5,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-security-features\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Top-M365-security-features-1200x480-1.jpg\",\"keywords\":[\"Microsoft 365\",\"Cybersecurity\"],\"articleSection\":[\"Microsoft 365\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-security-features\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-security-features\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-security-features\\\/\",\"name\":\"Microsoft 365 security features you should know about\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-security-features\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-security-features\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Top-M365-security-features-1200x480-1.jpg\",\"datePublished\":\"2022-12-20T14:31:59+00:00\",\"dateModified\":\"2022-12-21T19:47:34+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"Security features added to MIcrosoft 365 can help protect your business from cyberthreats and other security risks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-security-features\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-security-features\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-security-features\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Top-M365-security-features-1200x480-1.jpg\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Top-M365-security-features-1200x480-1.jpg\",\"width\":2400,\"height\":920,\"caption\":\"Illustration of security features on a computer screen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-security-features\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Ecosystem\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/microsoft-ecosystem\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft 365\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/microsoft-ecosystem\\\/office-365\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Top Microsoft 365 security features you should know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft 365 security features you should know about","description":"Security features added to MIcrosoft 365 can help protect your business from cyberthreats and other security risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-security-features\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft 365 security features you should know about","og_description":"Security features added to MIcrosoft 365 can help protect your business from cyberthreats and other security risks.","og_url":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-security-features\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2022-12-20T14:31:59+00:00","article_modified_time":"2022-12-21T19:47:34+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Top-M365-security-features-1200x480-1.jpg","type":"image\/jpeg"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-security-features\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-security-features\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"Top Microsoft 365 security features you should know","datePublished":"2022-12-20T14:31:59+00:00","dateModified":"2022-12-21T19:47:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-security-features\/"},"wordCount":1014,"commentCount":5,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-security-features\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Top-M365-security-features-1200x480-1.jpg","keywords":["Microsoft 365","Cybersecurity"],"articleSection":["Microsoft 365"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-security-features\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-security-features\/","url":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-security-features\/","name":"Microsoft 365 security features you should know about","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-security-features\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-security-features\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Top-M365-security-features-1200x480-1.jpg","datePublished":"2022-12-20T14:31:59+00:00","dateModified":"2022-12-21T19:47:34+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"Security features added to MIcrosoft 365 can help protect your business from cyberthreats and other security risks.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-security-features\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-security-features\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-security-features\/#primaryimage","url":"\/blog\/wp-content\/uploads\/Top-M365-security-features-1200x480-1.jpg","contentUrl":"\/blog\/wp-content\/uploads\/Top-M365-security-features-1200x480-1.jpg","width":2400,"height":920,"caption":"Illustration of security features on a computer screen"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-security-features\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft Ecosystem","item":"https:\/\/www.sherweb.com\/blog\/category\/microsoft-ecosystem\/"},{"@type":"ListItem","position":3,"name":"Microsoft 365","item":"https:\/\/www.sherweb.com\/blog\/category\/microsoft-ecosystem\/office-365\/"},{"@type":"ListItem","position":4,"name":"Top Microsoft 365 security features you should know"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Microsoft 365","Cybersecurity"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/17478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=17478"}],"version-history":[{"count":14,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/17478\/revisions"}],"predecessor-version":[{"id":24138,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/17478\/revisions\/24138"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/24137"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=17478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=17478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=17478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}