Anecdotal evidence is that some spam originates from onmicrosoft.com domains. These are the domains used by Microsoft 365 tenants and the spam indicates that attackers sign up for 'disposable' tenants to send their malware. This article describes what onmicrosoft.com domains are and how to use a mail flow rule to control their traffic.
Read about the most insightful coverage of the Microsoft 365 ecosystem presented in practical articles which make a difference.
If you’re interested in protecting your SharePoint Online, OneDrive for Business, or Exchange Online data, it is useful to understand how Microsoft 365 Backup works and what the software can and cannot do. In this article, Paul Robichaux walks through how to set up and test the preview version of Microsoft 365 Backup.
User consent is a great example of the tension between improved security and user convenience. Users want to be able to consent to applications without requiring the help of IT, which also allows the potential for a breach. In this blog, Paul reviews your options to solving the user consent problem.
This article describes how to include user license costs in a Microsoft 365 tenant licensing report created with the Microsoft Graph PowerShell SDK. The report includes annual costs for all licenses assigned to each user plus an overall licensing summary for the tenant. It even reports how effective the tenant is at assigning licenses!
In this article, Jaap Wesselius reviews the different types of Exchange Server certificates, their uses, and how to manage them.
In this article, Sean McAvinue explains what an Azure AD Assessment is and how it can assess and report on your Entra ID configuration, as well as plan the remediation of any discovered issues.
In this article, Sean McAvinue explains how to use PowerShell and Azure Automation runbook to create a Daily Microsoft Entra Risk Report.