Search for: Practical PowerShell

865 Results

Using Azure Automation to Monitor Unified Audit Log Events

The Office 365 audit log is a rich source of forensic information. This article explains how to use Azure Automation to search the log for high-priority events. We use the new support for managed identities in V3.0 of the Exchange Online management PowerShell module to search the audit log and end up sending a nice HTML-format message to administrators.

Continue Reading Using Azure Automation to Monitor Unified Audit Log Events

Two Zero-Day Vulnerabilities Hit Exchange Server

The bad news is that Exchange Server has two more day-zero vulnerabilities to cope with. The good is that Microsoft has figured out some mitigations. The ongoing problem remains that attackers like to go after Exchange Server because so many servers are in a poor state of maintenance.

Continue Reading Two Zero-Day Vulnerabilities Hit Exchange Server

Deploying the Microsoft Tunnel VPN Gateway in Enterprise Environments

Tips and Techniques to Avoid Common Issues In a previous post, I discussed how to leverage the Microsoft Tunnel solution to control access to your Microsoft 365 environment. In this article, I discuss deploying the Microsoft Tunnel VPN gateway in an enterprise environment. Basic Deployment The basic steps to deploy the Microsoft Tunnel VPN gateway […]

Continue Reading Deploying the Microsoft Tunnel VPN Gateway in Enterprise Environments

Stay with Exchange ActiveSync or Embrace Outlook Mobile?

Outlook mobile is Microsoft's preferred option for a mobile email client for Exchange Online. However, many still use Exchange ActiveSync (EAS)-based clients like the native iOS mail app. What's the best choice? :Like many things, it all depemds/

Continue Reading Stay with Exchange ActiveSync or Embrace Outlook Mobile?

Heard at TEC: Don’t Feed The Script Kiddies – Enable MFA Now!

At the TEC 2022 conference, Alex Weinert, Microsoft VP for Identity, outlined the need to deploy Azure AD MFA to protect accounts in Microsoft 365 tenants. Only 26.64% of all Azure AD accounts use MFA today, and while that percentage has grown from 1.8% in 2018, it's still disappointing.

Continue Reading Heard at TEC: Don’t Feed The Script Kiddies – Enable MFA Now!

Using Microsoft 365 Desired State Configuration in Tenant-to-Tenant Migrations

Control Your Configuration as Migrations Unfold It can be quite a challenge to maintain workload configurations in a Microsoft 365 tenant. Small to medium size organizations might have administrators responsible for the management of the entire tenant. Large enterprise organizations might assign different people to manage different workloads. All share a common responsibility of keeping […]

Continue Reading Using Microsoft 365 Desired State Configuration in Tenant-to-Tenant Migrations

Explaining Azure AD External Identities

Guest access for your company should be planned and understood by all stakeholders, documented in the company’s Security Policy, and then implemented and reviewed to maintain a clean Azure AD environment.

Continue Reading Explaining Azure AD External Identities