Product
Cyber resilience
Solution overview
Zero trust assurance
Enforce secure access
M365 posture management
Find risks across 8000+ settings
Config backup & restore
Rewind tenant to a previous state
Change auditing
Audit who did what and when
Complex tenant management
Solution overview
Multi-tenant configuration
Centralized management
Integrate on-prem Microsoft
Unify AD and Exchange
Virtual tenant segmentation
Segment tenants by your needs
Tenant consolidation
Merge tenants without risk
Governance & lifecycle
Solution overview
Lifecycle management
Automate user and sprawl control
Config change management
Standardize Dev, Test, and Prod
Entra app governance
Full control of Entra apps
License optimization
Eliminate waste and cut costs
Technology
CoreView ONE platform
Configuration management
Policy enforcement
Delegation management
Pricing
Resources
Resources
Resource center
Blog
Free tools
Knowledge base
Webinars and events
Customer
Reviews
Case studies
Partners
Why partner with us
Become a partner
Find a partner
Partner Center log-in
Register a deal
Company
About us
Leadership
Newsroom
Careers
Contact us
Get a demo
Contact sales
Product
Cyber resilience
Solution overview
Zero trust assurance
Enforce secure access
M365 posture management
Find risks across 8000+ settings
Config backup & restore
Rewind tenant to a previous state
Change auditing
Audit who did what and when
Complex tenant management
Solution overview
Multi-tenant configuration
Centralized management
Integrate on-prem Microsoft
Unify AD and Exchange
Virtual tenant segmentation
Segment tenants by your needs
Tenant consolidation
Merge tenants without risk
Governance & lifecycle
Solution overview
Lifecycle management
Automate user and sprawl control
Config change management
Standardize Dev, Test, and Prod
Entra app governance
Full control of Entra apps
License optimization
Eliminate waste and cut costs
Technology
CoreView ONE platform
Configuration management
Policy enforcement
Delegation management
Pricing
Resources
Resource center
Blog
Case studies
Free tools
Knowledge base
Webinars and events
Reviews
Partners
Why partner with us
Become a partner
Find a partner
Partner Center log-in
Register a deal
Company
About us
Leadership
Newsroom
Careers
Contact us
Get a demo
Contact sales
Get a demo
Blog library
Most Microsoft 365 security best practices are outdated. Here’s the 2025 Playbook.
This guide cuts through outdated advice with modern steps to secure your identities, data, and devices.
Read now
Your Microsoft 365 tenant will be breached. How fast can you recover?
Follow the four-part NIST model to contain damage, recover fast, and adapt your defenses so a single breach never becomes a full crisis.
Read now
Your Microsoft 365 data is backed up… but your business is still at risk.
Without configuration backups, restoring after a tenant outage can take weeks. Learn how to recover fast and keep business moving.
Read now
A high Microsoft Secure Score doesn’t mean you’re secure.
Boards and regulators love metrics, but a high Secure Score creates a false sense of security. Learn how to use your score to actually reduce risk.
Read now
Blog topic
AI and automation
Adoption
Backup and restore
Configurations
Delegated administration
Governance
Hybrid environments
Identity and access control
Licensing
Market insights and news
Monitor and reporting
Product capabilities
Security and compliance
Tenant management
Security and compliance
December 18, 2022
By:
David Nevins
8 Essential Microsoft Exchange Online Security Tips and Best Practices
Read now
Governance
December 13, 2022
By:
Kas Nowicka
Why Azure Privileged Identity Management Isn’t Always the Answer
Read now
Security and compliance
December 5, 2022
By:
David Nevins
Should You Rely on Azure AD (Entra ID) Security Defaults for Your Enterprise?
Read now
Market insights and news
December 5, 2022
By:
Kas Nowicka
What is the Microsoft Office 365 Admin Center?
Read now
Governance
December 3, 2022
By:
David Nevins
Microsoft Purview: Here’s Everything IT Admins Need to Know About Microsoft’s New Data Governance Platform
Read now
Configurations
December 1, 2022
By:
Josh Wittman
5 Office 365 Management Tools Every Microsoft Admin Should Consider
Read now
Delegated administration
November 30, 2022
By:
The CoreView Team
4 Ways to Approach Delegated Administration and Security
Read now
Delegated administration
November 25, 2022
By:
The CoreView Team
What is Role-Based Access Control or RBAC?
Read now
AI and automation
November 22, 2022
By:
The CoreView Team
How to Leverage PowerShell New-Team Template
Read now
Monitor and reporting
November 21, 2022
By:
The CoreView Team
Top 5 Most Powerful Reports to Leverage in Microsoft
Read now
Delegated administration
November 16, 2022
By:
Vasil Michev
Azure AD Administrative Units: Dynamic Membership Rules
Read now
Monitor and reporting
November 14, 2022
By:
Kas Nowicka
How to View a Detailed Report of Inactive Users in Office 365
Read now
Monitor and reporting
November 14, 2022
By:
Kas Nowicka
A Guide to Tracking User Activity in Microsoft 365
Read now
Monitor and reporting
November 11, 2022
By:
Kas Nowicka
How to Audit Log-On Reports in Active Directory
Read now
Identity and access control
November 9, 2022
By:
Josh Wittman
What Is Azure AD Authentication Strength? New Grant Control for Azure AD
Read now
AI and automation
November 9, 2022
By:
The CoreView Team
How to Enhance PowerShell Scripts for Help Desk Admins
Read now
Governance
November 8, 2022
By:
David Nevins
How to Automate Microsoft Teams Governance for Enterprises (+ Best Practices to Live By)
Read now
Monitor and reporting
November 8, 2022
By:
Roy Martinez
An Admin's Guide to Navigating Audit Logs in Office 365
Read now
Security and compliance
November 8, 2022
By:
The CoreView Team
How To Protect Your M365 Resources from Increased Cyber Threats
Read now
AI and automation
November 8, 2022
By:
Roy Martinez
Office 365 Onboarding Template Steps
Read now
Security and compliance
November 7, 2022
By:
Ivan Fioravanti
Zero Trust Security in Microsoft 365: A Quick Guide for IT and Security Leaders
Read now
Adoption
November 6, 2022
By:
Roy Martinez
Office 365 Onboarding and Offboarding Best Practices
Read now
Identity and access control
November 2, 2022
By:
Josh Wittman
A Guide to the New Conditional Access Policy Templates in Microsoft Azure AD
Read now
Delegated administration
November 2, 2022
By:
Kas Nowicka
How Can I Limit Admin Access?
Read now
Previous
Load more
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.