Search for: Practical PowerShell

865 Results

Every Meeting Online?

Just as in-person meetings are resuming around the world, Microsoft has begun rolling out improvements to a feature that enables you to make every meeting an online meeting in Teams or Skype for Business. Seen from the perspective of having hybrid meetings be the ‘new norm,’ the ability to have meetings default to online-only is a useful step, Microsoft still has a few rough edges to fix before these updates reach their full potential.

Continue Reading Every Meeting Online?

Protecting Administrator Mailboxes from Phishing and Other Threats

One way to protect administrator mailboxes is not to use them. And if you want administrators to use separate mailboxes for their permissioned and non-permissioned activities, that's what you might do. However, we can be smarter and use transport rules to selectively block email sent to administrator mailboxes to dissuade internal people from sending email and blocking all but the most essential email coming in from external domains.

Continue Reading Protecting Administrator Mailboxes from Phishing and Other Threats

Microsoft Extends Support for Azure AD Graph API for Six Months

Microsoft has announced a six month extension for support of the Azure AD Graph API. The new deadline is the end of 2022, which gives Microsoft 365 tenants some extra time to convert PowerShell scripts which use the Azure AD and MSOL modules. The original deadline for retirement of the Azure AD license management cmdlets remains at June 30, 2022.

Continue Reading Microsoft Extends Support for Azure AD Graph API for Six Months

Use Azure Front Door to Leverage Microsoft’s Global Network for Exchange

With Azure Front Door, you can reduce the strain on Exchange through caching, content compression, and by filtering out malicious bots before traffic even hits the on-premises network. In this article, we demonstrate how you can use Front Door to reduce your Exchange Server load, increase OWA Client performance and provide Microsoft managed certificates.

Continue Reading Use Azure Front Door to Leverage Microsoft’s Global Network for Exchange

Diving into the Details of Microsoft Teams Shared Channels

A year after announcing Teams shared channels, Microsoft is preparing to release the code into public preview in March 2022. The new collaboration mechanism uses Azure AD B2B Direct Connect instead of guest accounts, meaning that external members of shared channels use credentials issued by their home tenant to gain access. You'll need to configure a cross-tenant access policy to allow shared channels to work externally. Once that's done, the collaboration floodgates open.

Continue Reading Diving into the Details of Microsoft Teams Shared Channels

Why Using App Secrets in Production is a Bad Idea

As many organizations adapt legacy scripts to use app authentication instead of traditional service account credentials, security can be compromised if certain risks are overlooked. While app secrets can be great for testing code, there’s a reason they have an enforced expiry date - the longer a secret exists in production, the higher the risk it will become compromised. The methods described in this article will help build a good foundation for app authentication while keeping security top of mind when creating or updating automation scripts.

Continue Reading Why Using App Secrets in Production is a Bad Idea

Attack Simulation Training: RBAC and End User Notifications

Attack Simulations are Microsoft’s foray into a crowded field of competitors who provide a service that trains users to recognize dangerous email with simulated Phishing or malware-infested messages. Microsoft has continually added features and functionality since they released Attack Simulations, including additional simulation types, different payloads, custom payloads, customizable training and more. The most recent upgrades are RBAC permissions and end user notifications. These two additions to Attack Simulation Training are a great incentive to deploy and adopt this functionality, as End User communications are the key enhancement that make this feature worthwhile for an organization.

Continue Reading Attack Simulation Training: RBAC and End User Notifications

Planning for Azure AD Conditional Access Policies

Conditional Access policies provide many security benefits, from the implementation of MFA in a user-friendly way, to the controls that can limit what data users access or download. However, the process of setting up CA policies is daunting to some at first. This article provides some thought processes and best practices to make this security initiative more manageable.

Continue Reading Planning for Azure AD Conditional Access Policies