Pricing
|
Industries
|
Careers
|
Support
|
Corey AI
Platform
CoreView ONE platform
Technology
Configuration management
Policy enforcement
Delegation management
Use cases
Tenant Resilience
Solution overview
Tenant hardening
Harden M365 against attacks
M365 posture management
Find risks across 8000+ settings
Config backup and restore
Rewind tenant to a previous state
Remove excess privilege
Don't manage privilege, remove it
Complex tenant management
Solution overview
Multi-tenant configuration
Centralized management
Integrate on-prem Microsoft
Unify AD and Exchange
Virtual tenant segmentation
Segment tenants by your needs
Tenant consolidation
Merge tenants without risk
Governance and lifecycle
Solution overview
Lifecycle management
Automate user and sprawl control
Config change management
Standardize Dev, Test, and Prod
Entra app governance
Full control of Entra apps
License optimization
Eliminate waste and cut costs
Meet Corey: the AI for M365 that's built to follow your rules
Pricing
Resources
Resources
Resource center
Blog
Free tools
Knowledge base
Webinars and events
ROI calculator
Customer
Reviews
Case studies
Partners
Partner with us
Find a partner
Partner Center log-in
Register a deal
Company
About us
Leadership
Newsroom
Careers
Contact us
Security & compliance
Get a demo
Contact sales
Platform
CoreView ONE platform
Technology
Configuration management
Policy enforcement
Delegation management
Use cases
Tenant Resilience
Solution overview
Tenant hardening
Harden M365 against attacks
M365 posture management
Find risks across 8000+ settings
Config backup and restore
Rewind tenant to a previous state
Remove excess privilege
Don’t manage privilege, remove it
Complex tenant management
Solution overview
Multi-tenant configuration
Centralized management
Integrate on-prem Microsoft
Unify AD and Exchange
Virtual tenant segmentation
Segment tenants by your needs
Tenant consolidation
Merge tenants without risk
Governance and lifecycle
Solution overview
Lifecycle management
Automate user and sprawl control
Config change management
Standardize Dev, Test, and Prod
Entra app governance
Full control of Entra apps
License optimization
Eliminate waste and cut costs
Pricing
Industries
Resources
Resource center
Blog
Case studies
Free tools
Knowledge base
Webinars and events
ROI calculator
Reviews
Partners
Partner with us
Find a partner
Partner Center log-in
Register a deal
Company
About us
Leadership
Newsroom
Careers
Contact us
Security & compliance
Corey AI
Get a demo
Contact sales
Get a demo
Blog library
When Your Management Plane Becomes the Attack Surface
A compromised admin account is all it takes to turn Microsoft Intune into a destructive weapon.
Read now
Intune Logs: How to Monitor and Track Events in Microsoft Intune
How to monitor Intune logs with Azure Monitor, SIEM, and Power BI – and where CoreView fits for backup, drift detection, and restore.
Read now
Least Privilege for AI in Microsoft 365: Why “Shadow AI” Is a Real Risk
Without least privilege, a single over‑privileged agent can turn one bad prompt into tenant‑wide damage.
Read now
Blog topic
Adoption
AI and automation
Backup and restore
Configurations
Delegated administration
Governance
Hybrid environments
Identity and access control
Licensing
Market insights and news
Monitor and reporting
Product capabilities
Security and compliance
Tenant management
Delegated administration
June 18, 2025
By:
Ivan Fioravanti
How to Review and Manage Exchange Online Mailbox Permissions
Read now
Delegated administration
June 16, 2025
By:
Kas Nowicka
The Most Powerful Microsoft 365 Admin Roles (and Least Privilege Alternatives)
Read now
Tenant management
June 12, 2025
By:
Alberto Brianza
How to Merge Microsoft 365 Tenants: Basic Process and Step-by-Step Process for M&A Scenarios
Read now
Tenant management
June 5, 2025
By:
Alberto Brianza
How to Create a Shared Mailbox in Microsoft 365
Read now
Security and compliance
June 4, 2025
By:
Vasil Michev
How to Create Security Groups in Microsoft 365
Read now
Identity and access control
June 4, 2025
By:
Carmine Punella
How to Verify if a User Has Updated Their Password
Read now
Identity and access control
June 4, 2025
By:
Carmine Punella
How to Check a the MFA Status of a User
Read now
Security and compliance
Configurations
June 3, 2025
By:
Ivan Fioravanti
Advanced Threat Detection in Microsoft 365: Find and Remove Attackers
Read now
Security and compliance
June 3, 2025
By:
David Nevins
9 Must-Know Microsoft Intune Security Best Practices for Advanced Users
Read now
Delegated administration
June 2, 2025
By:
Vasil Michev
How to Remove Delegates from a Microsoft 365 Mailbox
Read now
Delegated administration
June 2, 2025
By:
Vasil Michev
How to View and Create Teams Private Channels
Read now
Delegated administration
June 2, 2025
By:
Vasil Michev
How to Identify the Owners of a Teams Group
Read now
Security and compliance
May 29, 2025
By:
David Nevins
How to Create a Disaster Recovery Plan for Entra ID
Read now
AI and automation
May 27, 2025
By:
Vasil Michev
Working With Extension Attributes for Device Objects in Microsoft 365
Read now
Security and compliance
May 21, 2025
By:
David Nevins
Back to Basics: Microsoft Teams and Teams Security
Read now
Security and compliance
May 21, 2025
By:
David Nevins
Manage, Secure, and Backup for Entra ID (previously Azure AD)
Read now
Security and compliance
May 21, 2025
By:
Vasil Michev
Cyber Attack Vectors in Microsoft 365: Detect and Prevent Entry
Read now
Configurations
May 21, 2025
By:
Josh Wittman
Intune Data Retention Guide: Know How to Secure Your Intune Configurations
Read now
Security and compliance
May 21, 2025
By:
David Nevins
Office 365 Ransomware Protection: How to Secure Your Microsoft Tenants
Read now
Security and compliance
May 21, 2025
By:
David Nevins
How to Establish Security Baselines for Microsoft 365
Read now
Security and compliance
May 21, 2025
By:
David Nevins
Should You Rely on Azure AD (Entra ID) Security Defaults for Your Enterprise?
Read now
Security and compliance
May 21, 2025
By:
David Nevins
8 Essential Microsoft Exchange Online Security Tips and Best Practices
Read now
Security and compliance
Tenant management
May 21, 2025
By:
Ivan Fioravanti
Entra Security: App Permissions Threats in Microsoft 365
Read now
Security and compliance
May 21, 2025
By:
Ivan Fioravanti
Securing Microsoft 365 from Data Breaches and Cyber Attacks
Read now
Previous
Load more
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.