Many have scripts to manage Microsoft 365 licenses built using the old MSOL and Azure AD modules. We show how to manage licenses using Graph SDK cmdlets
In this article, we explain how to create new Microsoft 365 accounts with PowerShell using the Azure AD and Microsoft Graph PowerShell SDK.
In this article, we describe how to create files in SharePoint Online using PowerShell running in an Azure Automation runbook.
Over the years, the Microsoft security stack has become very feature rich and offers many ways to customize the configuration. Third-party products are available with similar features, but lack the integration capability of the Microsoft stack. In the second part of the "Ten Ways to Harden the Security of Your Microsoft 365 Tenant" series, we look at five ways to secure your environment using controls that require a premium license such as Office E5 or Azure AD Premium.
With Azure Front Door, you can reduce the strain on Exchange through caching, content compression, and by filtering out malicious bots before traffic even hits the on-premises network. In this article, we demonstrate how you can use Front Door to reduce your Exchange Server load, increase OWA Client performance and provide Microsoft managed certificates.
The Microsoft Graph SDK for PowerShell is a good way to execute Microsoft Graph API queries from PowerShell scripts. In this article, we explain how to use the SDK with Azure Automation.
On this week's show, Paul and Steve are joined by Microsoft MVP Tom Morgan to discuss Teams Development. As an IT Pro, find out why it's worth expanding your skillset - plus we've all the latest news in the world of Microsoft 365 as always.
Microsoft Defender for Office 365 (plan 2) contains the Threat Explorer feature. It's a useful way to investigate problematic messages which arrive in a tenant.
As many organizations adapt legacy scripts to use app authentication instead of traditional service account credentials, security can be compromised if certain risks are overlooked. While app secrets can be great for testing code, there’s a reason they have an enforced expiry date - the longer a secret exists in production, the higher the risk it will become compromised. The methods described in this article will help build a good foundation for app authentication while keeping security top of mind when creating or updating automation scripts.