Configuring Enterprise SSO in Apple Devices
In this blog, James Yip explains how to Configure Enterprise SSO in Apple Devices when conducting a macOS deployment.
In this blog, James Yip explains how to Configure Enterprise SSO in Apple Devices when conducting a macOS deployment.
A beta version of a Graph API to delete Teams chat threads allows administrators to remove unwanted chats. This article reviews how the API requests work to delete, list, and undo deleted chat threads using cmdlets from the Microsoft Graph PowerShell SDK. The first step is to find chats to remove, so we wrote a script to report all the chat threads for the signed-in user.
We hope that you never have to perform a full AD forest recovery in production, but it is something that you’ll want to be well prepared for. Check out this blog and learn what you should be including in your AD recovery plan.
Although there is not a single definitive right answer on how to leverage Microsoft's solutions to support your cybersecurity strategy, there is much to be learned from how certain challenges are typically overcome by others. In this Blog, Michael Van Horenbeeck discusses the importance of a Well-Thought out Security Strategy with some helpful tips along the way!
In this blog, Becky Cross dives into the Lifecyle of a User Identity during a Migration and provides some useful tips along the way.
Many questions arose from the announcement of the Microsoft 365 multi-tenant organization (MTO) feature, In this article, I examine some practical aspects of multi-tenant organizations and examine why MTO does not replace the need for tenant-to-tenant migrations.
Sometimes simulation testing is the best way to see how your org would react to threats, but at what cost? Check out this article, and see what testing would best fit your org.
Storm-0558 is a China-originated attack against sensitive Exchange Online mailboxes. The attack exposed several flaws in Microsoft's processing of data. Microsoft says that the holes are now closed, but it's still a good idea to check that your tenant is not being attacked in the same way.
On the show this week, we're talking about Microsoft unbundling Microsoft Teams in response to Slack, new features coming to Teams that are long awaited, plus Justin Kohler from SpecterOps joins us on the show to talk about his TEC session.
In this article, Damian Scoles discusses what DNS records should be in place for Exchange Online, why these records are needed, and how to validate that DNS is properly configured.
Microsoft has changed the way that the Search-UnifiedAuditLog cmdlet works without saying anything to Microsoft 365 customers. The results is that some scripts don't work and others won't return the expected results. This article explains what's happened and offers a workaround. Microsoft's actions are unexplainable, but it's the norm in this area where audit log changes happen without communication all the time.
A reader asked how to use a CSV file for bulk license assignment with the Microsoft Graph PowerShell SDK. We didn't have one to hand, so we wrote a new script to illustrate the principles of how to process license assignments for a set of user accounts (which don't necessarily have to come from a CSV file). We even included some error handling!