TEC Tips: Email Protection Basics
Email is a primary target for breaches, making it crucial to have a strong line of defense for your email security. In this blog, we go over some Email Protection basics to help keep your organization safe.
Email is a primary target for breaches, making it crucial to have a strong line of defense for your email security. In this blog, we go over some Email Protection basics to help keep your organization safe.
On February 20, Microsoft announced their intention to remove Application Impersonation for EWS from Exchange Online. If you have existing management role assignments, this article explains how to make the transition to RBAC-based assignments.
In this article, Ingo Gegenwarth shows you how to develop an interface for end-users using Microsoft PowerApps for interacting and rendering data from Exchange Online.
This article serves as a step by step guide on how to build an Azure function to retrieve mailbox permissions for Exchange Online.
Microsoft Certified Master (MCM) and Microsoft Certified Solutions Master (MCSM) Ingo Gegenwarth provides a glimpse into his speaking session at TEC and how to manage ExO at scale with PowerShell.
Ingo Gegenwarth explores the topic of Hybrid Modern Authentication and provides a how-to guide for registering an application.