Product
Cyber resilience
Solution overview
Zero trust assurance
Enforce secure access
M365 posture management
Find risks across 8000+ settings
Config backup & restore
Rewind tenant to a previous state
Change auditing
Audit who did what and when
Complex tenant management
Solution overview
Multi-tenant configuration
Centralized management
Integrate on-prem Microsoft
Unify AD and Exchange
Virtual tenant segmentation
Segment tenants by your needs
Tenant consolidation
Merge tenants without risk
Governance & lifecycle
Solution overview
Lifecycle management
Automate user and sprawl control
Config change management
Standardize Dev, Test, and Prod
Entra app governance
Full control of Entra apps
License optimization
Eliminate waste and cut costs
Technology
CoreView ONE platform
Configuration management
Policy enforcement
Delegation management
Pricing
Resources
Resources
Resource center
Blog
Free tools
Knowledge base
Webinars and events
Customer
Reviews
Case studies
Partners
Why partner with us
Become a partner
Find a partner
Partner Center log-in
Register a deal
Company
About us
Leadership
Newsroom
Careers
Contact us
Get a demo
Contact sales
Product
Cyber resilience
Solution overview
Zero trust assurance
Enforce secure access
M365 posture management
Find risks across 8000+ settings
Config backup & restore
Rewind tenant to a previous state
Change auditing
Audit who did what and when
Complex tenant management
Solution overview
Multi-tenant configuration
Centralized management
Integrate on-prem Microsoft
Unify AD and Exchange
Virtual tenant segmentation
Segment tenants by your needs
Tenant consolidation
Merge tenants without risk
Governance & lifecycle
Solution overview
Lifecycle management
Automate user and sprawl control
Config change management
Standardize Dev, Test, and Prod
Entra app governance
Full control of Entra apps
License optimization
Eliminate waste and cut costs
Technology
CoreView ONE platform
Configuration management
Policy enforcement
Delegation management
Pricing
Resources
Resource center
Blog
Case studies
Free tools
Knowledge base
Webinars and events
Reviews
Partners
Why partner with us
Become a partner
Find a partner
Partner Center log-in
Register a deal
Company
About us
Leadership
Newsroom
Careers
Contact us
Get a demo
Contact sales
Get a demo
Blog library
Most Microsoft 365 security best practices are outdated. Here’s the 2025 Playbook.
This guide cuts through outdated advice with modern steps to secure your identities, data, and devices.
Read now
Your Microsoft 365 tenant will be breached. How fast can you recover?
Follow the four-part NIST model to contain damage, recover fast, and adapt your defenses so a single breach never becomes a full crisis.
Read now
Your Microsoft 365 data is backed up… but your business is still at risk.
Without configuration backups, restoring after a tenant outage can take weeks. Learn how to recover fast and keep business moving.
Read now
A high Microsoft Secure Score doesn’t mean you’re secure.
Boards and regulators love metrics, but a high Secure Score creates a false sense of security. Learn how to use your score to actually reduce risk.
Read now
Blog topic
AI and automation
Adoption
Backup and restore
Configurations
Delegated administration
Governance
Hybrid environments
Identity and access control
Licensing
Market insights and news
Monitor and reporting
Product capabilities
Security and compliance
Tenant management
Monitor and reporting
August 11, 2023
By:
Josh Wittman
What Is Office 365 Reporting? A Beginner's Guide to Tools, Best Practices, And More
Read now
Adoption
Delegated administration
Tenant management
August 9, 2023
By:
Kas Nowicka
Achieve Microsoft 365 Tenant Segmentation with Azure AD (Entra) Administrative Units
Read now
Tenant management
August 8, 2023
By:
Josh Wittman
Entra & Azure AD Tenant Management: Best Practices for Managing Multiple Tenants
Read now
Monitor and reporting
July 31, 2023
By:
Josh Wittman
Azure Active Directory Logs: A Guide to Monitoring and Reporting in Microsoft Azure AD
Read now
Monitor and reporting
July 24, 2023
By:
Josh Wittman
Intune Logs: How to Monitor and Track Events in Microsoft Intune
Read now
Monitor and reporting
July 17, 2023
By:
Josh Wittman
How to Navigate and Interpret Microsoft Office 365 Audit Logs
Read now
Configurations
July 14, 2023
By:
Josh Wittman
Intune Data Retention Guide: Know How to Secure Your Intune Configurations
Read now
AI and automation
July 4, 2023
By:
David Nevins
How to Use Automation to Sync Multiple Tenants Inside Microsoft Azure AD
Read now
Tenant management
June 30, 2023
By:
Josh Wittman
Managing Multiple Tenants in Azure AD: A Handbook for Enterprise IT Managers & System Administrators
Read now
Backup and restore
June 2, 2023
By:
Josh Wittman
How to Backup Office 365 Settings and Policies Using a Third-Party Configuration Tool
Read now
Backup and restore
May 1, 2023
By:
Josh Wittman
How to Back Up and Restore Azure Active Directory: A Guide for System Administrators
Read now
Backup and restore
April 24, 2023
By:
Josh Wittman
All the Different Ways to Backup and Restore Your Microsoft Intune Configuration Policies
Read now
Tenant management
April 13, 2023
By:
Josh Wittman
Why Should I Back Up My Organization's Azure AD Tenants in Microsoft 365?
Read now
Security and compliance
April 6, 2023
By:
David Nevins
9 Must-Know Microsoft Intune Security Best Practices for Advanced Users
Read now
Security and compliance
March 31, 2023
By:
David Nevins
Entra ID Security: Best Practices for Compliance and Security
Read now
Identity and access control
March 3, 2023
By:
Josh Wittman
How to Migrate from On-Premises Active Directory to Azure AD: A Guide
Read now
Configurations
Security and compliance
February 27, 2023
By:
Josh Wittman
10 Actionable Mobile Device Management Best Practices for Microsoft Intune
Read now
Identity and access control
February 20, 2023
By:
Josh Wittman
An Overview of Every Single Azure AD Authentication Method (Which One's Right for You?)
Read now
Security and compliance
February 6, 2023
By:
David Nevins
Office 365 Ransomware Protection: How to Secure Your Microsoft Tenants
Read now
Configurations
January 30, 2023
By:
Josh Wittman
The 6 Best Configuration Management Tools for Cloud Ecosystems
Read now
AI and automation
January 6, 2023
By:
Roy Martinez
Active Directory PowerShell Scripts: A Guide for M365 Admins
Read now
Configurations
January 5, 2023
By:
Josh Wittman
What Is Desired State Configuration (DSC)? Using PowerShell to Automate Microsoft 365 Configurations
Read now
AI and automation
December 30, 2022
By:
David Nevins
Azure Tools: Add-Ons for Automating Management and Monitoring for Microsoft Azure
Read now
Governance
December 23, 2022
By:
Kas Nowicka
Decoding Office 365 Identity Management
Read now
Previous
Load more
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.