Change Log

The change log contains an overview of the changes we’ve made to the book since its release on July 13, 2020. We normally push content updates once a month; smaller updates and fixes may be pushed at irregular intervals, however.

Content updates are usually delivered on the 1st of the month. This may change once in a while if life and/or other elements such as conferences interfere with that schedule.

Current version

We have released one (1) updated since the book release on July 13th, 2020.

The current version of the book is the 2021 Edition, 2020-09 release; published on September 1st, 2020.

Next update

The next update is slated for October 1st, 2020. However, considering that this is right after Microsoft’s Ignite conference we might need an additional couple of days to process any and all new information that may have been presented.

Chapter update details for Microsoft 365 Security for IT Pros, 2021 Edition

ReleaseChapterUpdate
2020-09IntroAdded Foreword by Nicholas DiCola, Group PM Cyber Security at Microsoft.
2020-091Updated information on the Cyber Kill Chain ®, Confidentiality, Integrity, and Availability (CIA) and the Assume Breach-mindset
2020-092Added the following elements/new content to the book: Security Defaults, Terms of Use, How to enable Password Reset with Conditional Access + real-world scenario, using Administrative Units. Fixed some typo’s too.
2020-093Added information on Microsoft Defender ATP for Android, Android Enterprise for corporate-owned devices with a work profile, how conflicts are handled between different (types) of policies (like GPO vs. Intune policies), how to deal with unlicensed administrators, and some information about reporting from Intune.
2020-094The chapter now includes information on EDR in Block Mode, Event tagging in the Device Timeline, new ASR rule(s), Web Content Filtering and Device Value(s). Moved Advanced Hunting information to Chapter 6.
2020-095Fixed an issue with content being duplicated in two placed (copy error). Elaborated on Session Control policies and how the MCAS proxy functionality works.
2020-096Updated chapter with more insights about the use case and value proposition of Microsoft Threat Protection. Added Advanced Hunting information, specific for Microsoft Threat Protection, included cross-workstream hunting. Updated the example to highlight more efficient way of hunting. Updated information about how Microsoft Threat Protection works, and how Incidents should be interpreted as well as handled. Removed stale information with regards to enablement of MTP.
2020-097Updated contents to include the latest version of Office 365 for IT Pros.

Fun facts

The following table an overview of the number of updates per chapter to date.

Ch. 1Ch. 2Ch. 3Ch. 4
1111
Ch. 5Ch. 6Ch. 7
111