Change Log

The change log contains an overview of the changes we’ve made to the book since its release on July 13, 2020. We normally push content updates once a month; smaller updates and fixes may be pushed at irregular intervals, however.

Content updates are usually delivered on the 1st of the month. This may change once in a while if life and/or other elements such as conferences interfere with that schedule.

Current version

We have released two (2) updates since the book released on July 13th, 2020.

The current version of the book is the 2021 Edition, 2020-11 release; published on November 1st, 2020.

Next update

The next update is slated for December 1st, 2020. However, considering that this is right after Microsoft’s Ignite conference we might need an additional couple of days to process any and all new information that may have been presented.

Chapter update details for Microsoft 365 Security for IT Pros, 2021 Edition

2020-09IntroAdded Foreword by Nicholas DiCola, Group PM Cyber Security at Microsoft.
2020-091Updated information on the Cyber Kill Chain ®, Confidentiality, Integrity, and Availability (CIA) and the Assume Breach-mindset
2020-092Added the following elements/new content to the book: Security Defaults, Terms of Use, How to enable Password Reset with Conditional Access + real-world scenario, using Administrative Units. Fixed some typo’s too.
2020-093Added information on Microsoft Defender ATP for Android, Android Enterprise for corporate-owned devices with a work profile, how conflicts are handled between different (types) of policies (like GPO vs. Intune policies), how to deal with unlicensed administrators, and some information about reporting from Intune.
2020-094The chapter now includes information on EDR in Block Mode, Event tagging in the Device Timeline, new ASR rule(s), Web Content Filtering and Device Value(s). Moved Advanced Hunting information to Chapter 6.
2020-095Fixed an issue with content being duplicated in two placed (copy error). Elaborated on Session Control policies and how the MCAS proxy functionality works.
2020-096Updated chapter with more insights about the use case and value proposition of Microsoft Threat Protection. Added Advanced Hunting information, specific for Microsoft Threat Protection, included cross-workstream hunting. Updated the example to highlight more efficient way of hunting. Updated information about how Microsoft Threat Protection works, and how Incidents should be interpreted as well as handled. Removed stale information with regards to enablement of MTP.
2020-097Updated contents to include the latest version of Office 365 for IT Pros.
2020-112Added info on blocking of legacy authentication protocols and Continuous Access Evaluation.
2020-113Elaborated on device ownership (personal vs. corporate-owned), and what happens upon removal of configuration profiles.
2020-114Brand new chapter on securing email, covering Exchange Online, Exchange Online Protection and more.
2020-115Brand new chapter on Microsoft Defender for Office 365.
2020-116Added information around device groups, RBAC, API permissions and more.
2020-117Added real-world scenario leveraging session policies for Office 365 workload(s).
2020-118Included additional example on advanced hunting scenario.

Fun facts

The following table an overview of the number of updates per chapter to date.

Ch. 1Ch. 2Ch. 3Ch. 4
Ch. 5Ch. 6Ch. 7Ch. 8
Ch. 9