How Exchange Uses SSL Certificates
In this article, Jaap Wesselius reviews the different types of Exchange Server certificates, their uses, and how to manage them.
In this article, Jaap Wesselius reviews the different types of Exchange Server certificates, their uses, and how to manage them.
Microsoft 365 Tenant-to-Tenant Migrations are more than just a data transfer! In this blog, Karin Skapski explores practical steps and scripts to establish cohesive visual branding in a Microsoft 365 tenant, ensuring a seamless transition for both your team and data.
Unfortunately, attacks happen... But a post-attack investigation is paramount to stopping the next attack. In this blog, Paul Robichaux reviews what to do after an attack has taken place, with practical tips along the way.
Microsoft doesn't provide a PowerShell cmdlet to return an accurate MFA status for Entra ID user accounts, but by combining data from multiple sources we can write a script to generate a report showing details of user password settings and MFA status.
In this article, Sean McAvinue explains what an Azure AD Assessment is and how it can assess and report on your Entra ID configuration, as well as plan the remediation of any discovered issues.
Patching your systems manually can be complicated and require a lot of overhead. Luckily, Microsoft has a new solution to help with this. In this blog, Paul Robichaux reviews the new Windows Autopatch tool and what it has to offer.
In this week's episode of the Practical 365 Podcast, Steve Goodman and Rich Dean welcome Microsoft CVP, Yonatan Zunger to talk through AI Security & Safety, including how you can get Copilot today.
The tenant block list controls traffic that Exchange Online blocks from different domains. The block list is an important tool but maintaining it can take a lot of time. This article discusses how to automate the process using a combination of SharePoint Online, Exchange Online, and the Microsoft Graph PowerShell SDK.
You might be at risk for a similar attack to Microsoft's Midnight Blizzard attack. In this blog, Paul Robichaux discusses what happened and how to avoid this in your organization.
In this article, Sean McAvinue explains how to use PowerShell and Azure Automation runbook to create a Daily Microsoft Entra Risk Report.
A January 19 report from the Microsoft Security Response Center (MSRC) tells of an attack by Russian state actor Midnight Blizzard against Microsoft corporate systems. The attack resulted in the exfiltration of some email and documents from email accounts owned by senior Microsoft employees.
It’s time to review your security baselines! In this blog, Jon Jarvis provides his thoughts on Security Baselines for Microsoft 365 and Intune, including some tools to help secure Microsoft 365 tenants.