It's time to armor up for battle with Microsoft's DMARC. In this article, Damian Scoles talks about new improvements to DMARC and how you can use them to protect against email attacks.
User Submissions is a valuable Microsoft 365 feature that helps add an extra layer of defense in your organization. In this article, Damian Scoles discusses the importance of User Submissions and how to set up your configuration.
If you are stuck using your on-premises resources to manage a cloud infrastructure, it is an opportune time to change that with the availability of tools and functions that are now available. In this article, we focus on how to use PowerShell to manage Microsoft 365. In addition, we consider how to use cloud services to manage PowerShell code, testing, security controls, and more.
PowerShell uses a concept called pipelining to combine two or more cmdlets to perform a cohesive task. The PowerShell pipeline combines singularly useful cmdlets together to process data. Used intelligently, the pipeline is a great way to process data through a series of steps to automate common administrative operations. Mastering the pipeline, or at least becoming comfortable with pipelining cmdlets, is an essential skill for anyone using PowerShell to manage Microsoft 365 tenants.
Attack Simulations are Microsoft’s foray into a crowded field of competitors who provide a service that trains users to recognize dangerous email with simulated Phishing or malware-infested messages. Microsoft has continually added features and functionality since they released Attack Simulations, including additional simulation types, different payloads, custom payloads, customizable training and more. The most recent upgrades are RBAC permissions and end user notifications. These two additions to Attack Simulation Training are a great incentive to deploy and adopt this functionality, as End User communications are the key enhancement that make this feature worthwhile for an organization.
Ever wondered how to perform selective deletion of OneDrive documents found in Content Searches? While you can remove email using a content search action, Office 365 doesn’t include a method to cleanup OneDrive documents found by content searches. This article demonstrates how to use PowerShell to view the set of files, and then select files to remove.
Microsoft provides many methods to manage a tenant’s data and users. PowerShell is a powerful tool to manage resources, including Conditional Access Policies using a set of cmdlets in the AzureAD module. In this article, Microsoft MVP Damian Scoles reviews the eight PowerShell cmdlets and how to use them.