The Storm Around Microsoft 365, Office 2016, and Office 2019
Microsoft is not doing a good job to communicate how long Office 2016 and Office 2019 can be used with Microsoft 365.
Microsoft is not doing a good job to communicate how long Office 2016 and Office 2019 can be used with Microsoft 365.
Viva Engage As promised on the last show, we take a dive into the latest announcements for Microsoft Viva, beginning…
In this article, we will discuss the Analysis phase of an Exchange Online domain move project. Please refer to our previous post for a brief overview of the five best practices for Microsoft 365 Exchange Online Domain Transfers.
This article describes how to write a PowerShell script to search user mailboxes for items matching criteria. The items can then be reported or deleted.
Managing inactive devices is a confusing concept for an administrator just starting with Microsoft Defender for Endpoint. This article will provide key insights on how organizations can handle inactive devices within Microsoft Defender for Endpoint.
Expert outlines steps to setting up Microsoft Tunnel to help control access to client’s Microsoft 365 mobile devices.
Microsoft has extended the deprecation date for the Azure AD license management cmdlets to March 31, 2023. After that time, the cmdlets won't work.
Many organizations have data residency requirements. With Microsoft 365 Multi-Geo, organizations can fully embrace the cloud while meeting strict compliance regulations for data location.
In episode 3 of season two, Paul Robichaux and Steve Goodman chat about a flurry of new Microsoft Teams features - including the long-awaited Teams Connect shared channels going into general availability, plus Microsoft's headline conference for IT professionals is back in-person - but will it be the same?
Dive deep into Azure AD Connect and Azure Group Writeback to understand how it works with the attribute flow and learn some possible use cases for it.
Read how Privileged Identity Manager permissions can be set to help prevent malicious attacks and user errors compromising sensitive resource.
In this article, we consider the best way to use PowerShell to find the set of Microsoft 365 Groups with guest members. And once we find those groups, we can check if they have a suitable sensitivity label.