J. Peter Bruzzese runs Exclusively Exchange where he has created 150 training videos for Exchange Server 2007, totalling more than 7 hours of viewing.

Link: ExclusivelyExchange.com
You may withdraw your consent at any time. Please visit our Privacy Statement for additional information
J. Peter Bruzzese runs Exclusively Exchange where he has created 150 training videos for Exchange Server 2007, totalling more than 7 hours of viewing.

Link: ExclusivelyExchange.com

Understanding the set of registered and enterprise apps active in a Microsoft 365 tenant is important. Attackers can sneak in and plant an app to exfiltrate or otherwise steal data. This article explains how to use PowerShell to create a service principal analysis report that highlights common problems and gives tenant administrators the data needed to manage apps.

In this blog, we review Microsoft’s 2025 Digital Defense Report and highlight the trends you need to know. From a surge in ransomware targeting hybrid environments to identity-based attacks at record levels, the report makes one thing clear: resilience and strong identity protection are critical.

Managing devices across large organizations can be complex. Administrative Units (AUs) help scope admin rights, but what about newly registered devices? In this article, we explain how to automate adding devices to the correct AU using Microsoft Graph and Azure Automation runbooks with managed identities—eliminating manual steps and improving security.
I agree to the Policy
I agree to the Policy
I agree to the policy
I agree to the policy