Microsoft has recently made major strides to improve the capability and resiliency of multi-factor authentication in Azure AD; however, this article highlights the four practical ways in which you can take advantage of MFA in your Microsoft 365 estate, and just turn the darn thing on already!
Deleted Azure AD users enter a soft-deleted 30-day period. During this time, administrators can recover accounts. You might want to remove deleted accounts before this period lapses. As explained in this article, this is easily done using PowerShell.
The reality is, remote employees and working situations are here to stay. Unfortunately, many organizations have regressed in terms of endpoint security, partly due to the pandemic as well as the subsequent rush to implement remote work solutions. To help make sense of the many technologies out there and determine the best approach for your organization, this article explores different options from the traditional Active Directory domain membership with group policy management, to co-management with Configuration Manager and Microsoft Intune.
There are many ways in which you can improve the security of your Exchange Online environment. In this article, Sean McAvinue details the most important steps that admins can immediately implement to align Exchange Online tenants with a good security baseline and posture.
Within large organizations utilizing Teams, generating reports on channel storage and then migrating this data is extremely difficult. To help map out how Teams uses SharePoint, this article introduces a simple Graph API/PowerShell script to report Teams channels and their SharePoint locations and walks you through the steps so you can run the report yourself.
Microsoft has announced that they won't support the Azure AD Graph after June 30, 2022. This means that the Azure AD PowerShell module won't be supported either. With that in mind, it's probably a good idea to think about how to upgrade scripts to use Graph API calls instead of Azure AD cmdlets. In this article, we take a script created to count members in distribution lists and convert it to use the Graph. As it turns out, the Graph bit is easy. It's all the housekeeping beforehand that takes the time.
In a frantic rush to enable remote workers at the onset of the pandemic, many organizations were forced to ship devices directly to the user from the supplier without any prior configuration by IT. Administrators must take back control to properly secure and manage these devices. This article will show you how to regain control and prepare for scalable deployments consistent with corporate policy; reviews best practices for long-term management; and gets you thinking about how to protect your organization from this type of unmanaged situation in the future.
Azure AD business-to-business guest user accounts are a terrific way to securely grant access to apps and services for external users and partner organizations. In this article, a script is introduced that can be used to automate the guest user invitation process, integrating it more seamlessly with any custom applications.
A variety of methods exist to block access to a user's Office 365 (Azure AD) account from a complete block to a conditional access policy. In this article, we examine the various methods and debate the worth of each approach. Conditional access policies are the cleanest and most effective long-term solution, but you need Azure AD premium licenses. If you don't have those licenses, maybe one of the other approaches will work for you.
Over the past year, the pandemic has disrupted traditional work patterns. With many working from home, many organizations now focus on how to help employees manage their work/life balance. Platforms like Microsoft Viva Insights can help, but there are many steps admins can take using existing technology to support a wellbeing mindset in their organization. An easy and effective change is to implement a transport rule that reminds people they have the “Right to Disconnect” when an email is received outside work hours. This article walks you through how to implement a timed disclaimer in Exchange Online with Azure Automation.
In the second iteration of a two-part series about FIDO2 and passwordless authentication, we walk you through how to facilitate your passwordless deployment for Azure AD identities. Once passwordless authentication is achieved, users can authenticate up to 3x faster and helpdesks should receive fewer requests for password resets, saving your organization time and money.
Many apps are created in the Azure AD for a tenant. Those apps have permissions to allow them to access data, and consent for those permissions are granted by administrators and users. How often do you check what apps are known in your Azure AD and what permissions those apps have? In this article, we review how to use the Graph API and PowerShell to create a report inventorying apps and permissions. What you do with that data is up to you!