We all know to turn on MFA but sometimes we need to share our stories to get corporate buy-in to do it. In this Fun Friday post, Mike Weaver, Chris Cahill and Bryan Patton get real on what happens when MFA isn’t enabled.
The Exchange Recipient Admin Center (ERAC) is a free local web UI to help you manage Exchange-related attributes after you remove the last Exchange Server and install Microsoft's supported Management Tools onto your administrator workstation.
The Microsoft 365 Groups Ownership Governance policy is now generally available. Also known as the ownerless group policy, this capability allows organizations to make sure that all groups have owners by detecting ownerless groups and extending invitations to active group members to become owners. It's a useful capability, especially in large tenants with many groups.
Can you remove the last Exchange Server? Perhaps - but not without a few caveats. Read our take on this new capability and what it offers.
Exchange Online boasts a set of mailbox permissions that allow delegate access to some (or all) content. In this article, we describe how to notify mailbox owners when administrators assign new permissions over their mailbox. Naturally, the notification is via email, but there are some twists along the way.
It's great to be able to run PowerShell scripts using Azure Automation. It's even better when you can create output files in SharePoint Online. In this article, we explain how to create a report of Microsoft 365 Groups subject to the Group expiration policy and generate an HTML report in SharePoint Online using an Azure Automation runbook. Running this kind of job in the background is a great way of processing intensive jobs while you get on with more important tasks.
One way to protect administrator mailboxes is not to use them. And if you want administrators to use separate mailboxes for their permissioned and non-permissioned activities, that's what you might do. However, we can be smarter and use transport rules to selectively block email sent to administrator mailboxes to dissuade internal people from sending email and blocking all but the most essential email coming in from external domains.
The Microsoft Graph PowerShell SDK is a good way to execute Microsoft Graph API queries from PowerShell scripts. In this article, we explain how to use cmdlets from the SDK with a Azure Automation runbook. The example we use is a script to send a welcome email to new employees.
Microsoft Defender for Office 365 (plan 2) contains the Threat Explorer feature. It's a useful way to investigate problematic messages which arrive in a tenant. The automated investigations feature can highlight messages containing malware by assembling evidence about warning signs in the message or its contents, and administrators can then action the recommendations up to and including the removal of messages already delivered to user mailboxes. Automating investigations is a good thing, if you afford Defender for Office 365 Plan 2.
As many organizations adapt legacy scripts to use app authentication instead of traditional service account credentials, security can be compromised if certain risks are overlooked. While app secrets can be great for testing code, there’s a reason they have an enforced expiry date - the longer a secret exists in production, the higher the risk it will become compromised. The methods described in this article will help build a good foundation for app authentication while keeping security top of mind when creating or updating automation scripts.